Assessment of functional efficiency of a corporate scientific­educational network based on the comprehensive indicators of quality of service

Authors

DOI:

https://doi.org/10.15587/1729-4061.2017.118329

Keywords:

synergistic approach to threat assessment, integrated indicator of quality of service, corporate scientific-educational network

Abstract

In order to evaluate effectiveness of using a corporate scientific-educational network, we propose to apply an integrated indicator of the quality of services for users of CSES based on the combination of main technical and economic indicators (functional efficiency). The assessment techniques, proposed in the present work, for cryptographic procedures, for the formation of an integrated indicator of threats based on the synergistic approach to assessing the impacts on elements of CES, taken together, make it possible to estimate resistance of the applied cryptographic algorithms in technical systems of information protection within a corporate educational network. The devised procedure for estimating the effectiveness of investment into information security of CSES enables effective control over capital investment into effectiveness of technical solutions for information safety based on the proposed technique for assessing investment into TMIP, which takes into consideration the synergy and hybridization of contemporary threats. The obtained expressions for efficiency of using TMIP (their resistance and implementation based on the method of express-analysis), investment into TMIP (based on the proposed procedure) in the comprehensive indicator of assessment of functional efficiency of a corporate scientific-educational network at different techniques for managing data exchange make it possible to obtain comparative estimates to ensure the required indicators of quality of services when using different protocols for managing CSES data exchange

Author Biographies

Serhii Yevseiev, Simon Kuznets Kharkiv National University of Economics Nauky ave., 9-А, Kharkiv, Ukraine, 61166

PhD, Associate Professor

Department of Information Systems 

Volodymir Ponomarenko, Simon Kuznets Kharkiv National University of Economics Nauky ave., 9-А, Kharkiv, Ukraine, 61166

Doctor of Economic Sciences, Professor, Rector

Olena Rayevnyeva, Simon Kuznets Kharkiv National University of Economics Nauky ave., 9-А, Kharkiv, Ukraine, 61166

Doctor of Economic Sciences, professor, head of department

Department of statistics and economic forecasting 

References

  1. Goloshchapov, S., Shahnovich, I. (2011). 100GB Ethernet: osnovnye printsipy. Pervaya milya, 3. Available at: http://www.lastmile.su/files/article_pdf/2/article_2820_580.pdf
  2. Godovoy analiz rynka promyshlennyh setey 2016 v sootvetstvii s HMS. Available at: http://www.industrialnets.ru/news/2016/godovoj-analiz-rynka-promyshlennykh-setej-2016-v-sootvetstvii-s-hms/
  3. Ethernet i promyshlennye seti. Available at: https://www.osp.ru/lan/2013/09/13037411/
  4. Raspredelenie rynka promyshlennyh setey v 2016 g. po dannym HMS Industrial Networks. Available at: http://ua.automation.com/content/raspredelenie-rynka-promyshlennyh-setej-v-2016-g-po-dannym-hms-industrial-networks
  5. Kucheryaviy, A. E., Kucheryaviy, E. A., Prokop'ev, A. V. (2013). Internet veshchey i setevye protokoly. Internet veshchey i setevye protokoly. Aktual'nye problemy infotelekommunikatsiy v nauke i obrazovani. II-ya Mezhdunarodnaya nauchno-tekhnicheskaya i nauchno-metodicheskaya konferentsiya. Sankt-Peterburg: Sankt-Peterburgskiy gosudarstvennyy universitet telekommunikatsiy im. prof. M. A. Bonch-Bruevicha, 23–29.
  6. Funktsional'naya effektivnost'. Available at: https://www.ngpedia.ru/id625108p1.html
  7. Hryshchuk, R. V., Danyk, Yu. H.; Danyk, Yu. H. (Ed.) (2016). Osnovy kibernetychnoi bezpeky. Zhytomyr: ZhNAEU, 636.
  8. Kiberbezopasnost' 2016–2017: Ot itogov k prognozam. Available at: https://www.ptsecurity.com/upload/corporate/ru-ru/analytics/Cybersecurity-2016-2017-rus.pdf
  9. Rise of IoT Botnets Showcases Cybercriminals’ Ability to Find New Avenues of Attack. Available at: http://storage.pardot.com/44731/127332/Cybercrime_Trends_Report___2016_Year_in_Review__1_.pdf
  10. Issledovanie HP: Sredniy godovoy ushcherb ot kiberatak vyros do 15 mln doll. na organizatsiyu. Available at: http://www.connect-wit.ru/issledovanie-hp-crednij-godovoj-ushherb-ot-kiberatak-vyros-do-15-mln-doll-na-organizatsiyu.html
  11. CISCO: Kiberataki na industrial'nye sistemy usilivayutsya, a doverie k imeyushchimsya sistemam zashchity padaet. Available at: https://www.cisco.com/c/ru_ru/about/press/press-releases/2016/01-21a.html
  12. Bank dannyh ugroz bezopasnosti informatsii. Available at: http://bdu.fstec.ru/vul
  13. MSE-T E.800. Opredelenie terminov, otnosyashchihsya k kachestvu obsluzhivaniya. Available at: https://www.itu.int/rec/dologin_pub.asp?lang=e&id=T-REC-E.800-200809-I!!PDF-R&type=items
  14. Yanovskiy, G. G. (2008). Kachestvo obsluzhivaniya v setyah IP. Vestnik svyazi, 1. Available at: http://niits.ru/public/2008/2008-006.pdf
  15. Vegeshny, Sh. (2003). Kachestvo obsluzhivaniya v setyah IP. Moscow. Available at: http://it-ebooks.ru/publ/cisco/cisco_ip_quality_of_service/11-1-0-293
  16. ISO 9000:2015(en). Quality management systems – Fundamentals and vocabulary. International Organization for Standardization. Available at: https://www.iso.org/obp/ui/#iso:std:iso:9000:ed-4:v1:en
  17. GOST RV 51987. Informatsionnaya tekhnologiya, kompleks standartov na AS (2002). Gosstandart Rossii. Moscow.
  18. Uskov, A. V., Ivannikov, A. D., Uskov, V. L. (2008). Tekhnologii obespecheniya informatsionnoy bezopasnosti korporativnyh obrazovatel'nyh setey. Educational Technology & Society, 11 (1), 472–479.
  19. Kondratova, E. G. (2013). Sotsial'nye seti kak kanal utechki korporativnoy informatsii. Bezopasnost' informatsionnyh tekhnologiy, 20 (1). Available at: https://elibrary.ru/item.asp?id=21003147&
  20. Litvinov, V. A., Lypko, E. V., Yakovleva, A. A. Informatsionnaya bezopasnost' vysshego uchebnogo zavedeniya v ramkah sovremennoy globalizatsii. Available at: http://conference.osu.ru/assets/files/conf_reports/conf13/132.doc
  21. Sohrabi Safa, N., Von Solms, R., Furnell, S. (2016). Information security policy compliance model in organizations. Computers & Security, 56, 70–82. doi: 10.1016/j.cose.2015.10.006
  22. Yevseiev, S. P. (2016). For information technologies security evaluation for automated banking systems of Ukraine. Ukrainian Scientific Journal of Information Security, 22 (3), 297–309. doi: 10.18372/2225-5036.22.11103
  23. Evseev, S. P. (2017). Modelirovanie protsessov upravleniya v informatsionnoy ekonomike. Metodologiya postroeniya modifitsirovannoy sistemy elektronnogo dokumentooborota v universitete na osnove elektronnoy tsifrovoy podpisi standarta H.509. Berdyansk: Izdatel' Tkachuk A.V., 420.
  24. Petrichenko, G. S., Naryzhnaya, N. Y., Kritskaya, L. M. (2016). The technique of a security tools choice for a corporate network. Polythematic Online Scientific Journal of Kuban State Agrarian University, 121 (07), 1–10. doi: 10.21515/1990-4665-121-130
  25. Karakus, M., Durresi, A. (2017). Quality of Service (QoS) in Software Defined Networking (SDN): A survey. Journal of Network and Computer Applications, 80, 200–218. doi: 10.1016/j.jnca.2016.12.019
  26. Hailu, D. H., Lema, G. G., Yekun, E. A., Kebede, S. H. (2017). Unified study of Quality of Service (QoS) in OPS/OBS networks. Optical Fiber Technology, 36, 394–402. doi: 10.1016/j.yofte.2017.05.016
  27. Han, B., Gopalakrishnan, V., Ji, L., Lee, S. (2015). Network function virtualization: Challenges and opportunities for innovations. IEEE Communications Magazine, 53 (2), 90–97. doi: 10.1109/mcom.2015.7045396
  28. Emfinger, W., Karsai, G. (2015). Modeling Network Medium Access Protocols for Network Quality of Service Analysis. 2015 IEEE 18th International Symposium on Real-Time Distributed Computing. doi: 10.1109/isorc.2015.47
  29. Stepanova, I. V., Mohammed Omar, A. A. (2017). Ispol'zovanie perspektivnyh tekhnologiy dlya razvitiya raspredelennyh korporativnyh setey svyazi. T-Comm: Telekommunikatsii i transport, 11 (6), 10–15.
  30. Borodin, V. V., Rastrelin, E. A. (2015). Some aspects of reliability assessment of the corporative data network with consideration of redundancy management. Systems and Means of Informatics, 25 (4), 150–157. doi: 10.14357/08696527150411
  31. Yevseiev, S. P., Rzayev, H. N., Ostapov, S. E., Nikolaenko, V. I. (2017). Data exchange evaluation in global networks based on integrated quality indicator of service network. Radio Electronics, Computer Science, Control, 1, 115–128. doi: 10.15588/1607-3274-2017-1-14
  32. Korol, O. H. (2017). Otsinka yakosti obsluhovuvannia hlobalnoi merezhi na osnovi tekhnolohiy Ethernet za dopomohoiu kompleksnoho pokaznyka. Systemy obrobky informatsiy, 2, 100–110.
  33. De Nicola, A., Villani, M. L., Brugnoli, M. C., D'Agostino, G. (2016). A methodology for modeling and measuring interdependencies of information and communications systems used for public administration and eGovernment services. International Journal of Critical Infrastructure Protection, 14, 18–27. doi: 10.1016/j.ijcip.2016.06.001
  34. Ali, H. (2017). Quality of service: Introduction of a new framework and a novel measurement technique. 2017 3rd International Conference on Information Management (ICIM). doi: 10.1109/infoman.2017.7950439
  35. Kayashev, A. I., Rahman, P. A., Sharipov, M. I. (2013). Analiz pokazateley nadezhnosti lokal'nyh komp'yuternyh setey. Vestnik UGATU, 17 (5 (58)), 140–149.
  36. Yevseiev, S. P., Sumtsov, D. V., Korol', O. G., Tomashevskiy, B. P. (2010). The analysis of data transfer efficiency in computer systems with usage of the integrated mechanisms of reliability and safety support. Eastern-European Journal of Enterprise Technologies, 2 (2 (44)), 45–49. Available at: http://journals.uran.ua/eejet/article/view/2622/2428
  37. Yevseiev, S. P., Ostapov, S. E., Korolov, R. V. (2017). Use of mini-versions to evaluate the security of block-symmetric ciphers. Ukrainian Scientific Journal of Information Security, 23 (2), 100–108. doi: 10.18372/2225-5036.23.11796
  38. Shennon, K. (1963). Raboty po teorii informatsii i kibernetike. Moscow: IL, 333–369.
  39. Rukhin, A., Sota, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S. et. al. (2000). A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. NIST Special Publication 800-22, 169. doi: 10.6028/nist.sp.800-22
  40. Yevseiev, S. P. (2017). Model' narushitelya prav dostupa v avtomatizirovannoy bankovskoy sisteme na osnove sinergeticheskogo podhoda. Informatsiyna bezpeka, 2 (26), 110–120.
  41. Buchyk, S. S. (2015). Metodyka ekspertnoho otsiniuvannia funktsionalnykh profiliv zahroz derzhavnykh informatsiynykh resursiv. Otkrytye informatsionnye i komp'yuternye integrirovannye tekhnologii, 70, 271–280.
  42. Yevseiev, S. P. (2017). Otsenka effektivnosti investitsiy v bezopasnost' organizatsiy bankovskogo sektora na osnove sinergeticheskoy modeli ugroz. Systemy obrobky informatsiy, 2, 88–94.
  43. Homyakov, K. G., Kanitskaya, L. V. (2015). Otsenka effektivnosti investitsiy v kompleksnye sistemy zashchity informatsii kompaniy neftegazovogo kompleksa dlya prinyatiya vzveshennogo investitsionnogo resheniya. Ekonomika. Fundamental'nye issledovaniya, 2, 5173–5177.
  44. Bleyhut, R. (1986). Teoriya i praktika kodov, kontroliruyushchih oshibki. Moscow: Mir, 576.
  45. Klark, Dzh.-ml.; Tsybakov, B. S. (Ed.) (1987). Kodirovanie s ispravleniem oshibok v sistemah tsifrovoy svyazi. Moscow: Radio i svyaz', 392.
  46. Mak-Vil'yams, F. Dzh., Sloen, N. Dzh. A. (1979). Teoriya kodov, ispravlyayushchih oshibki. Moscow: Svyaz', 744.

Downloads

Published

2017-12-13

How to Cite

Yevseiev, S., Ponomarenko, V., & Rayevnyeva, O. (2017). Assessment of functional efficiency of a corporate scientific­educational network based on the comprehensive indicators of quality of service. Eastern-European Journal of Enterprise Technologies, 6(2 (90), 4–15. https://doi.org/10.15587/1729-4061.2017.118329