-
A Machine-Synesthetic Approach To DDoS Network Attack Detection
Abstract: In the authors' opinion, anomaly detection systems, or ADS, seem to be the most perspective direction in the subject of attack detection, because these systems can detect, among others, the unknown (zero-day) attacks. To detect anomalies, the authors propose to use machine synesthesia. In this case, machine synesthesia is understood as an interface that allows using image classification algorithms… ▽ More
Submitted 22 March, 2019; v1 submitted 13 January, 2019; originally announced January 2019.
Comments: 12 pages, 2 figures, 5 tables. Accepted to the Intelligent Systems Conference (IntelliSys) 2019
MSC Class: 62H30; 62H35; 94C99; 15A04 ACM Class: C.2.m; I.5.0; I.2.6
-
Analysis Of Congestion Control In Data Channels With Frequent Frame Loss
Abstract: Development of optimal control procedures for congested networks is a key factor in maintaining efficient network utilization. The absence of congestion control mechanism or its failure can lead to the lack of availability for certain network segments, and in severe cases -- for the entire network. The paper presents an analytical model describing the operation of the TCP Reno congestion control a… ▽ More
Submitted 10 October, 2018; originally announced October 2018.
Comments: 5 pages, 4 figures, 2nd European Conference on Electrical Engineering & Computer Science EECS 2018: Bern, Switzerland, December 20-22, 2018
MSC Class: 94C99; 68M12; 68M20; 90B25 ACM Class: C.2.2; C.2.3; C.4
-
Simulation Model Of Functional Stability Of Business Processes
Abstract: Functioning of business processes of high-tech enterprise is in a constant interaction with the environment. Herewith a wide range of such interaction represents a variety of conflicts affecting the achievement of the goals of business processes. All these things lead to the disruption of functioning of business processes. That's why modern enterprises should have mechanisms to provide a new prope… ▽ More
Submitted 25 November, 2013; originally announced November 2013.
Comments: 10 pages, 12 figures
Journal ref: Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp. 819-828
-
The development of the architecture of Distributed Network Intrusion Detection System (D-NIDS)
Abstract: This paper presents the development of the architecture of Distributed Network Intrusion Detection System.
Submitted 27 March, 2013; originally announced March 2013.
-
About the survey of propagandistic messages in contemporary social media
Abstract: This paper presents the research results that have identified a set of characteristic parameters of propagandistic messages. Later these parameters can be used in the algorithm creating special user-oriented propagandistic messages to improve distribution and assimilation of information by users.
Submitted 25 March, 2013; originally announced March 2013.
Comments: 2 pages
ACM Class: H.1.2; J.4
-
Stochastic Models of Misinformation Distribution in Online Social Networks
Abstract: This report contains results of an experimental study of the distribution of misinformation in online social networks (OSNs). We consider the classification of the topologies of OSNs and analyze the parameters identified in order to relate the topology of a real network with one of the classes. We propose an algorithm for conducting a search for the percolation cluster in the social graph.
Submitted 5 December, 2012; originally announced December 2012.
Comments: 4 pages, 1 figure, 1 table
ACM Class: H.1.2; J.4
-
Analytical model of misinformation of a social network node
Abstract: This paper presents the research of the influence of cognitive, behavioral, representational factors on the susceptibility of the participants in social networks to misinformation, as well as on the activity of the nodes in this regard. The importance of this research consists of method of blocking the propaganda. This is very important because when people involuntarily acquire information some of… ▽ More
Submitted 3 December, 2012; originally announced December 2012.
Comments: 3 pages, 1 figure
ACM Class: H.1.2; J.4