No 1 (2016)
4-16 887
Abstract
The article considers the problems of entropy data analysis (EDA) application used for detection of dynamic dependence between different groups of events. Reasons for EDA usage, description of a technique, results of calculating experiment are presented.
17-22 1022
Abstract
This article considers the use of highly reliable biometric authentication based on electroencephalogram in modern cryptographic applications. Three types of technologies to carry out experiments for collecting biometric data are described, the general structure of neural network transformers«Biometry - access code», and the simulation results of this transformer are presented. Based on the results, the range of use of neural network transformers «Biometry - access code» in modern cryptographic applications is identified.
23-29 1452
Abstract
The article describes the issue of appropriate processing of personal data in accordance with Russian legislation. The issue is analyzed in the context of common business changes. The technology is designed for automated generation and actualization of personal data based on business process approach. The technology is well suited for effective management of personal data.
30-37 876
Abstract
This article considers types of electromagnetic interference (EMI) and their temporal characteristics. Capabilities of microcontrollers STM32 for the development of monitoring systems EMI for communication facilities are also discussed.
38-50 985
Abstract
The simplified conceptual model with feedback of functioning of the electronic employment operator in modern labor market for increasing the efficiency of interaction of modern labor market and continuous educational system, quality and efficiency of job placement rendering of services is presented in the article. As a tool, qualification indicator of experts in the field of information security is used.
51-58 881
Abstract
In this article, an overview of the principles of invariant communication systems functioning is provided. The methods of ensuring information security in such communication systems are presented. Analytical expressions for evaluation of its information security are derived.
59-65 717
Abstract
This paper discusses the possibility of using piezoelectric films as elements of information security systems. The results of experimental studies of films Fils Series Co, Ltd (South Korea): their electro-amplitude-frequency characteristics, reverse acoustic-electric conversion, the presence and levels of spurious electromagnetic radiation are provided.
66-73 1289
Abstract
This article considers an approach to the creation of a mathematical model of telecommunication center states in conditions of managing influence of technical equipment failures of telecommunication centers and information security threats. It also assesses the effect of information security facilities on technical specifications and reliability of telecommunication centers.
74-82 870
Abstract
Multiservice telecommunication network with adaptive routing in accordance with LLR method is considered. The influence of information security incidents (SI) on network performance at the stage of the network connection is analyzed. The approach to the calculation of information loss and an estimate of the mean increment of this value caused by incidents SI is defined. The applicability of the proposed mathematical model is demonstrated by numerical results.
83-92 1753
Abstract
Open Flow is the most deployed Software Defined Networking (SDN) protocol, which allows us to decouple the control plane and data plane function of a network. This architecture transfers core functions from the routers and switches to centralized controllers. Due to centralized control, SDN architecture has specific capabilities that can be exploited to improve security tools and mitigate threats of traditional architecture networks more effective. This paper presents an overview of SDN architecture and Open Flow protocol, analysis of related security threats and mitigation techniques. Moreover, the most critical threats for data networks, which may be deployed soon in RF, are determined and mitigation approaches for these threats are proposed.
93-98 1784
Abstract
In this article, the questions of procedures modeling of access control and inside-object modes in crowded places are considered. Features of functioning of such objects and restrictions for using access control and management system application are identified. Identification process model in access control and management systems is developed.
99-107 1639
Abstract
A systematic method of full class bent matrix synthesis of fourth order, based on the operations of permutations of rows and columns, as well as row-cyclic shifts of five basic constructions is proposed. The basic properties of the synthesized bent matrices are found, and the relationship between the complete class of bent matrices of fourth order and bent functions class length n=16 is determined. A method for constructing the infinite sets of bent matrices based on regular dyadic shift operator is designed.
108-117 978
Abstract
In this article, the results of MPLS and OSPF simulation routing protocol in external destructive influence environment on the elements of multiservice communication network are presented. While simulating, Opnet Modeler v 14.0 and Graphical Network Simulator 3 v 1.313 (GNS3) software products were used.
118-133 1382
Abstract
The article focuses on the problems of data mining techniques used for intrusion detection. This question is a key factor in building intrusion detection systems (IDS) including anomaly-based network IDS (NIDS). The article provides an overview of the most popular approaches used for intrusion detection and examples of applications.
ISSN 1998-6920 (Print)