2003), which is vulnerable to attacks on the systems
of network synchronization and time stamping. The
one-time password systems are also "powerless"
against cyberattacks based on modifying a CS’s
system time (Haller, 1998).
4.3 Principles of Network Time
Reliability Insuring
We worked out the following principles of network
time reliability insuring.
The first and fundamental principle of reliable
and correct functioning of the network time system
(NTS) for modern networks and systems is to
achieve the given guarantees of such operation
(Mills, 2010). This principle implies the presence of
a trusted operating environment that provides ser-
vices to ensure cybersecurity as well as other soft-
ware components (modules) supporting NTS opera-
tion and provision of the required services.
The second principle is the creation of an internal
and independent time source that must operate in
stand-alone mode. This principle implies that the
time source should receive the original signal gener-
ated by a system process of a trusted OS. The output
internal clock’s signal can be such a signal. Other-
wise, the signal coming via a USB-interface may be
such a signal.
The third principle means that the whole conver-
sion of the input signal must be carried out only by
the time source. Any interference in the work of the
time source is not acceptable, since any exposure
could affect its reliability.
The fourth principle can be formulated as fol-
lows. If necessary (in case of the abnormal events),
any adjustment of the time source should be carried
out at the user's (client) demand and only in manual
mode via the GUI displayed on the computer screen.
This principle implies the transfer of a specialized
request for certified and protected timestamp from a
trusted time source, determined by the appropriate
security policy. The implementation of this principle
depends on the conditions of the NTS’s usage and
the corporate (specialized) applied cyberspace. In
other words, if such a system is able to provide the
timestamp transmission in protected mode (provid-
ing its confidentiality and/or integrity), then the
client can give a command to automatically update
the time. The need to deliver the timestamp in the
protected mode can be caused by certain statements
of the security policy, aimed at protecting the
LVEDI and this entire system against the insiders.
The fifth principle says that the launch of the
time source should be carried out only at the com-
mand of the NTS’s client and only once at the be-
ginning of its work. This principle implies the auto-
matic transfer of a specialized request for certified
and protected timestamp from a trusted time source,
determined by the appropriate security policy. Oth-
erwise, the initial (current) time value should be
entered by the user. The implementation of this
principle depends on the conditions of NTS’s usage
and the corporate (specialized) applied cyberspace.
In other words, if such a system is able to provide
the timestamp transmission in protected mode (en-
suring its confidentiality and/or integrity), then the
NTS can give a command to get an initial timestamp
during initialization of its work. The need to deliver
the timestamp in protected mode can be caused by
certain statements of the security policy, aimed at
protecting the LVEDI and this entire system against
the insiders.
The sixth principle is the two-module construc-
tion of the time source, including a main time coun-
ter and a back-up counter, wherein the main counter
should operate from the start to the end of the ses-
sion without any interruptions or stops.
The strict implementation of the given principles
will prevent any intentional and accidental actions to
modify and/or falsify the timestamps.
4.4 Reflection of Cyberattacks against
the NTS
The methods proposed (Figures 5 a, b) are actually
based on the principles of cyberattacks against the
NTS (synchronization) reflection (Melnikov and
Jones, 2004). In the first method of reflection of
cyberattacks against the NTS the start time is set
automatically, while in the second method this time
is set manually. The essence of both methods is that
the usage of an internal independent time source
allows to exclude any possibility of timestamps
unauthorized modification and/or tampering. This in
turn will considerably (more than twice) complicate
the task of cryptanalysis based on plaintext selec-
tion, being resolved by a potential intruder (Cooper,
2008), (Kohl and Neuman, 2005).
5 CONCLUSIONS
Thus, from our point of view, the expansion of the
“Three trusts” criterion to any public cyberspace
together with the usage of an independent source of
network time synchronization will allow to imple-
ment the standardized cybertrust assurance require-
ments (being of legal significance) for ELE. It can