Skip to main content

Showing 1–10 of 10 results for author: Ageyev, D

Searching in archive cs. Search in all archives.
.
  1. Use of Approaches to the Methodology of Factor Analysis of Information Risks for the Quantitative Assessment of Information Risks Based on the Formation of Cause-And-Effect Links

    Authors: Ihor Dobrynin, Tamara Radivilova, Nadiia Maltseva, Dmytro Ageyev

    Abstract: The paper suggests methods to the assessment of information risks, which makes the transition from a qualitative assessment of information risks (according to the factor analysis of information risks methodology) to a quantitative assessment. The development factor analysis of information risks methodology of the methodology was carried out using the mathematical apparatus of probability theory, n… ▽ More

    Submitted 16 April, 2019; originally announced April 2019.

    Comments: 4 pages, 1 figure, 1 table

    MSC Class: 90B18 ACM Class: D.4.6; E.3; C.2

    Journal ref: 2018 International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T)

  2. Decrypting SSL/TLS traffic for hidden threats detection

    Authors: Tamara Radivilova, Lyudmyla Kirichenko, Dmytro Ageyev, Maxim Tawalbeh, Vitalii Bulakh

    Abstract: The paper presents an analysis of the main mechanisms of decryption of SSL/TLS traffic. Methods and technologies for detecting malicious activity in encrypted traffic that are used by leading companies are also considered. Also, the approach for intercepting and decrypting traffic transmitted over SSL/TLS is developed, tested and proposed. The developed approach has been automated and can be used… ▽ More

    Submitted 16 April, 2019; originally announced April 2019.

    Comments: 4 pages, 1 table, 1 figure

    MSC Class: 90B18 ACM Class: D.4.6; E.3; C.2

    Journal ref: 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT)

  3. Classification of Existing Virtualization Methods Used in Telecommunication Networks

    Authors: Dmytro Ageyev, Oleg Bondarenko, Tamara Radivilova, Walla Alfroukh

    Abstract: This article studies the existing methods of virtualization of different resources. The positive and negative aspects of each of the methods are analyzed, the perspectivity of the approach is noted. It is also made an attempt to classify virtualization methods according to the application domain, which allows us to discover the method weaknesses which are needed to be optimized.

    Submitted 16 April, 2019; originally announced April 2019.

    Comments: 4 pages, 3 figures

    MSC Class: 90B18 ACM Class: D.4.6; E.3; C.2

    Journal ref: 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT)

  4. Method of Self-Similar Load Balancing in Network Intrusion Detection System

    Authors: Dmytro Ageyev, Lyudmyla Kirichenko, Tamara Radivilova, Maksym TawalbehRadivilova, Maksym Tawalbeh, Oleksii Baranovskyi

    Abstract: In this paper, the problem of load balancing in network intrusion detection system is considered. Load balancing method based on work of several components of network intrusion detection system and on the analysis of multifractal properties of incoming traffic is proposed. The proposed method takes into account a degree of multifractality for calculation of deep packet inspection time, on the basi… ▽ More

    Submitted 11 April, 2019; originally announced April 2019.

    Comments: 5 pages. 2018 28th International Conference Radioelektronika (RADIOELEKTRONIKA)

    MSC Class: 90B18 ACM Class: D.4.6; E.3; C.2

  5. arXiv:1307.1730  [pdf

    cs.NI

    Design of Information and Telecommunication Systems with the Usage of the Multi-Layer Graph Model

    Authors: D. Ageyev, A. Ignatenko, Fouad Wehbe

    Abstract: Considered in the paper is the overlaid nature of modern telecommunication networks and expediency of usage the multi-layer graph model for its design. General statement of design problem is given. The design method in general using multi-layer graph model and its application for a typical information and telecommunication system is proposed.

    Submitted 5 July, 2013; originally announced July 2013.

    Comments: Keywords - Multilayer graph, Overlay network, Information and Telecommunication system, Design, Flow model

    Journal ref: in Proc. of XIIth International Conference The Experience of Designing and Application of CAD Systems in Microelectronics (CADSM), Lviv-Polyana, Ukraine, 2013. pp. 1-4

  6. arXiv:1205.4318  [pdf

    cs.NI

    Mpls Overlay Network Sinthesis Method With Multilayer Graph Usage

    Authors: Dmytro Ageyev, Haidara Abdalla, O. Starkova

    Abstract: l. Introduction Modern network are multi-layer by their structure. This requires the development of new mathematical models, which would allow to adequately describe the existing physical and logical connections between the elements on its different levels, and to effectively solve the problems of design. The paper formulates the problem of synthesis of structure of MPLS network layered with the t… ▽ More

    Submitted 19 May, 2012; originally announced May 2012.

    Journal ref: Proceeding of 22nd International Crimean Conference Microwave and Telecommunication Technology (CriMiCo), 2012 pp. 385 - 386

  7. arXiv:1203.0516  [pdf

    cs.NI

    Describing and Modeling of Video-on-Demand Service with the Usage of Multi-Layer Graph

    Authors: Dmitry Ageyev, Artem Ignatenko

    Abstract: Considered in this paper is the method of describingc of telecommunications systems providing VoD service using multi-layer graph. The paper describes the relations between the structural elements at each hierarchical level of the multi-layer graph. Transfer of video is a resource consuming task, and it requires an optimal configuration of the studied system. The usage of the multi-layer graph mak… ▽ More

    Submitted 2 March, 2012; originally announced March 2012.

    Comments: 2 pages, 1 figure, 4 references

    Journal ref: Proceedings of the XI th International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science TCSET'2012, 2012, pp. 340 - 341

  8. arXiv:1203.0511  [pdf

    cs.NI

    Multiservice Telecommunication Systems Parametrical Synthesis by using of Multilayer Graph Mathematical Model

    Authors: Dmitry Ageyev, Haidara Abdalla

    Abstract: This study is devoted to the problem of parametric synthesis of multi-service telecommunication sys-tems. The main characteristics of telecommunication systems, which are brought to account in an article, are multilayer structure formed by the overlayed networks and presence flows with self-similarity effect. For accounting these features of modern telecommunications systems is proposed to use a m… ▽ More

    Submitted 2 March, 2012; originally announced March 2012.

    Comments: 9 pages, 2 figures, 14 references. In russian

  9. arXiv:1203.0503  [pdf

    cs.NI

    Application of Multi-layer Graphs In the Design of MPLS Networks

    Authors: Haidara Abdalla, Dmitry Ageyev

    Abstract: It is suggested to use multi-layer graphs as a mathematical model in the design of MPLS networks. The application of this model makes it possible to design multi-service telecommunication systems simultaneously at several levels and to reduce the problem to the search of the minimum weight graph.

    Submitted 2 March, 2012; originally announced March 2012.

    Comments: 2 pages

    Journal ref: Proceedings of the XIth International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science TCSET'2012, 2012, pp. 336-337

  10. arXiv:1202.2214  [pdf

    cs.NI

    Wavelength Assignment in Design DWDM Transport Network Using Algorithm BCO-RWA

    Authors: Dmitry Ageyev, Alexander Pereverzev

    Abstract: The main problem in designing DWDM transport networks is the wavelength assignment of light paths. One way of solving this problem is to use the algorithm BCO-RWA. However, BCO-RWA has the following disadvantages: algorithm not solved the problem of choosing the location of the optical convector in the network; base algorithm ignores placement optical convector during calculating route selecting p… ▽ More

    Submitted 10 February, 2012; originally announced February 2012.

    Comments: 2 pages, 1 figure, 1 table

    Journal ref: Proceedings of the ??th International Conference on Modern Problems of Radio Engineering, Telecommunications, and Computer Science, TCSET'2012, 2012, pp. 277 - 278