No 4 (2020)
3-10 272
Abstract
The article offers a method for rapid analysis of information security events based on the representation of an incident as a set of events consisting of impacts on files. The method involves using a database of identified impact templates, where initial data is the NTFS volume change log entries - SUsnJrnl. An algorithm for searching and classifying impacts on the files using templates is considered. The proposed method of rapid analysis allows you to determine the order of events within the framework of the incident under investigation, reducing the number of analyzed data arrays to one - SUsnJrnl log.
14-27 448
Abstract
An analytic model of a functioning item is represented under check-out operations with regular period. The idea of the model consists in monitoring and registration of observable technical states of the item. The model is based on the theory of semimarkov processes using matrix methods for mathematical operations. Consideration of the model reveals the influence of the checking conditions on the reliability level.
28-38 218
Abstract
The results in the field of optimization of system software stacks for distributed computing systems based on the process management Interface (PMI) are obtained. Algorithms for synchronizing access to shared memory with a predominance of reading operations, which are typical for PMIx implementations, are considered. The locking schemes N(mutex+signal) and N-MCS are proposed. Experimental estimates have shown a reduction in the overhead of both read and write operations.
39-52 525
Abstract
This study deals with countering interception and analysis of network traffic. The paper covers statistics of information security incidents related to hacker attacks on enterprise information systems, analyses regulatory requirements for ensuring secure data communication over the network and network security in general, and compares existing solutions for ensuring secure data communication and countering unauthorized interception and analysis of network traffic as well as solutions providing concealment of the information system structure and configuration. A new method for secure data communication based on dynamic network topology is presented. This method differs from the existing solutions by hiding the participants of the network interaction. Practical implementation of the method was carried out for hiding architecture and configuration of the sensor network.
53-65 216
Abstract
The article presents the issues of improving and analyzing the activities of the student group’s curator in the context of a permanent cultural crisis in Russia. The approaches for evaluating the curator’s activities and designing the assessment toolkit are considered. Creation process stage of the integrated methodology for the development of educational work in a university via curators’ effective activities organization is described on the example of applied sociological research formalized using the method of a modified risk thermometer.
66-77 239
Abstract
To calculate the reliability of a fiber-optic communication line (FOL), a Markov model is proposed taking into account various effects on the reliability of sudden and gradual failures as well as control type 2 errors. Formulas are obtained for calculating the coefficients of unavailability in predictive control regarding gradual and sudden failures in the case of control type 2 errors. The influence and the choice of the criterion for the transition of FOL to the pre-fault state on the reliability of FOL is evaluated.
78-91 217
Abstract
Models of signals and interference in a spatially distributed information system of radio engineering monitoring (PRISRM) are substantiated. The set of echo signals received by several PRISRM positions when the target is irradiated with one transmitting position is considered in order to solve the problem of detecting an air target. The structure of signal processing algorithms at reception positions with a phased array antenna (PAA) is determined. In this case, the partial interposition decorrelation of interference, noise and a high degree of interference correlation over the PAA aperture are taken into account. The scheme of a target detector built in accordance with this algorithm is proposed. The efficiency of the considered processing algorithms is estimated regarding various consideration degrees of interposition interference decorrelation.
92-97 215
Abstract
An innovative fuzzy model of systemic assessment of educational outcomes based on FSES 3 ++ is examined in this article. The essence of the study is to determine the accuracy of the obtained educational outcomes in comparison with the rates obtained by traditional conservative methods. The results of the study are the rates of the relative evaluation error on the basis of which the validation of the model under study is made. In conclusion, promising directions for further research are indicated aimed at calibrating the fuzzy inference system underlying the estimation model.
98-104 625
Abstract
A mathematical optimization model of the professional efficiency indicators system of scientific and pedagogical workers, including simulation and optimization components is considered. The model is implemented in AnyLogic and allows you to obtain optimal values of rating indicators based on social and economic performance criteria. With fixed performance indicators for the selected target criteria, a trial simulation of the rating technology under consideration with fixed performance indicators for the selected target criteria was carried out.
ISSN 1998-6920 (Print)