-
Use of Approaches to the Methodology of Factor Analysis of Information Risks for the Quantitative Assessment of Information Risks Based on the Formation of Cause-And-Effect Links
Abstract: The paper suggests methods to the assessment of information risks, which makes the transition from a qualitative assessment of information risks (according to the factor analysis of information risks methodology) to a quantitative assessment. The development factor analysis of information risks methodology of the methodology was carried out using the mathematical apparatus of probability theory, n… ▽ More
Submitted 16 April, 2019; originally announced April 2019.
Comments: 4 pages, 1 figure, 1 table
MSC Class: 90B18 ACM Class: D.4.6; E.3; C.2
Journal ref: 2018 International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T)
-
Decrypting SSL/TLS traffic for hidden threats detection
Abstract: The paper presents an analysis of the main mechanisms of decryption of SSL/TLS traffic. Methods and technologies for detecting malicious activity in encrypted traffic that are used by leading companies are also considered. Also, the approach for intercepting and decrypting traffic transmitted over SSL/TLS is developed, tested and proposed. The developed approach has been automated and can be used… ▽ More
Submitted 16 April, 2019; originally announced April 2019.
Comments: 4 pages, 1 table, 1 figure
MSC Class: 90B18 ACM Class: D.4.6; E.3; C.2
Journal ref: 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT)
-
Classification of Existing Virtualization Methods Used in Telecommunication Networks
Abstract: This article studies the existing methods of virtualization of different resources. The positive and negative aspects of each of the methods are analyzed, the perspectivity of the approach is noted. It is also made an attempt to classify virtualization methods according to the application domain, which allows us to discover the method weaknesses which are needed to be optimized.
Submitted 16 April, 2019; originally announced April 2019.
Comments: 4 pages, 3 figures
MSC Class: 90B18 ACM Class: D.4.6; E.3; C.2
Journal ref: 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT)
-
Method of Self-Similar Load Balancing in Network Intrusion Detection System
Abstract: In this paper, the problem of load balancing in network intrusion detection system is considered. Load balancing method based on work of several components of network intrusion detection system and on the analysis of multifractal properties of incoming traffic is proposed. The proposed method takes into account a degree of multifractality for calculation of deep packet inspection time, on the basi… ▽ More
Submitted 11 April, 2019; originally announced April 2019.
Comments: 5 pages. 2018 28th International Conference Radioelektronika (RADIOELEKTRONIKA)
MSC Class: 90B18 ACM Class: D.4.6; E.3; C.2
-
Design of Information and Telecommunication Systems with the Usage of the Multi-Layer Graph Model
Abstract: Considered in the paper is the overlaid nature of modern telecommunication networks and expediency of usage the multi-layer graph model for its design. General statement of design problem is given. The design method in general using multi-layer graph model and its application for a typical information and telecommunication system is proposed.
Submitted 5 July, 2013; originally announced July 2013.
Comments: Keywords - Multilayer graph, Overlay network, Information and Telecommunication system, Design, Flow model
Journal ref: in Proc. of XIIth International Conference The Experience of Designing and Application of CAD Systems in Microelectronics (CADSM), Lviv-Polyana, Ukraine, 2013. pp. 1-4
-
Mpls Overlay Network Sinthesis Method With Multilayer Graph Usage
Abstract: l. Introduction Modern network are multi-layer by their structure. This requires the development of new mathematical models, which would allow to adequately describe the existing physical and logical connections between the elements on its different levels, and to effectively solve the problems of design. The paper formulates the problem of synthesis of structure of MPLS network layered with the t… ▽ More
Submitted 19 May, 2012; originally announced May 2012.
Journal ref: Proceeding of 22nd International Crimean Conference Microwave and Telecommunication Technology (CriMiCo), 2012 pp. 385 - 386
-
Describing and Modeling of Video-on-Demand Service with the Usage of Multi-Layer Graph
Abstract: Considered in this paper is the method of describingc of telecommunications systems providing VoD service using multi-layer graph. The paper describes the relations between the structural elements at each hierarchical level of the multi-layer graph. Transfer of video is a resource consuming task, and it requires an optimal configuration of the studied system. The usage of the multi-layer graph mak… ▽ More
Submitted 2 March, 2012; originally announced March 2012.
Comments: 2 pages, 1 figure, 4 references
Journal ref: Proceedings of the XI th International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science TCSET'2012, 2012, pp. 340 - 341
-
Multiservice Telecommunication Systems Parametrical Synthesis by using of Multilayer Graph Mathematical Model
Abstract: This study is devoted to the problem of parametric synthesis of multi-service telecommunication sys-tems. The main characteristics of telecommunication systems, which are brought to account in an article, are multilayer structure formed by the overlayed networks and presence flows with self-similarity effect. For accounting these features of modern telecommunications systems is proposed to use a m… ▽ More
Submitted 2 March, 2012; originally announced March 2012.
Comments: 9 pages, 2 figures, 14 references. In russian
-
Application of Multi-layer Graphs In the Design of MPLS Networks
Abstract: It is suggested to use multi-layer graphs as a mathematical model in the design of MPLS networks. The application of this model makes it possible to design multi-service telecommunication systems simultaneously at several levels and to reduce the problem to the search of the minimum weight graph.
Submitted 2 March, 2012; originally announced March 2012.
Comments: 2 pages
Journal ref: Proceedings of the XIth International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science TCSET'2012, 2012, pp. 336-337
-
Wavelength Assignment in Design DWDM Transport Network Using Algorithm BCO-RWA
Abstract: The main problem in designing DWDM transport networks is the wavelength assignment of light paths. One way of solving this problem is to use the algorithm BCO-RWA. However, BCO-RWA has the following disadvantages: algorithm not solved the problem of choosing the location of the optical convector in the network; base algorithm ignores placement optical convector during calculating route selecting p… ▽ More
Submitted 10 February, 2012; originally announced February 2012.
Comments: 2 pages, 1 figure, 1 table
Journal ref: Proceedings of the ??th International Conference on Modern Problems of Radio Engineering, Telecommunications, and Computer Science, TCSET'2012, 2012, pp. 277 - 278