SYNTHESIS OF IDENTIFICATION MEASUREMENTS IN THE COMPUTER SYSTEM OF CRITICAL PURPOSE

Authors

DOI:

https://doi.org/10.30837/2522-9818.2019.8.036

Keywords:

state identification, computer system of critical purpose, identification dimensions, identification of abuses

Abstract

The subject of the study is the methods and means for identifying the state of a computer system of critical purpose. The aim of this article is to conduct an analysis and development of a general scheme for the synthesis of identification measurements in the system of identification of the state of a computer system of critical purpose. The article solves the following tasks. The methods of selection of informative indicators of state identification and methods for the synthesis of identification measurements in a computer system of critical purpose are analyzed. As a result of the analysis, the main optimization problems are formulated and an example of the possible use of the known mathematical device in their solution is given. When solving the tasks, methods of multi-criteria evaluation, discriminant and cluster analysis, mathematical statistics and comparative approach were used. Results obtained. Studies have shown that the general scheme for identifying the state of a computer system of critical purpose should include methods for identifying abnormalities and methods for identifying abuses. The task of identifying anomalies should be solved under very difficult constraints on the authenticity of the results of identification, and the efficiency of the solution to this problem should be worse than the requirements set forth in the guideline documents. As a result, a general scheme for identifying the state of a computer system of critical purpose that differs by the complex use of advanced identification methods and their adaptation to possible changes in input data is synthesized. The set of possible input indicators for state identification was experimentally determined. A comparative analysis of state identification methods was conducted. The timetables for identifying abuses in a computer system of critical purpose, depending on the number of recorded data were received. Conclusion: the complex use of the methods of identification of anomalies allowed to increase the authenticity of identification to 1,9 times, and the complex use of methods for identifying abuses in computer systems of the critical purpose allowed to increase the efficiency of identification up to 2 times.

Author Biography

Svitlana Gavrylenko, National Technical University "Kharkiv Polytechnic Institute"

PhD (Engineering Sciences), Associate Professor, Professor of the Department of Computer Science and Programming

References

Bezkorovayny, V. V., Dras, O. M., Semenec, V. V. (2018), "Synthesis of models of multicriterion estimation by the method of comparative identification" ["Syntez modeley bahatokryterialʹnoho otsinyuvannya metodom komparatornoyi identyfikatsiyi"], Materials of the articles of the International scientific and practical conference "Information Technologies and Computer Modeling", Ivano-Frankivsk, May 14-19, 2018, Ivano-Frankivsk, P. 266–269.

Kuchuk, G. A., Kovalenko, A. A., Mozhaev, A. A. (2010), "An Approach To Development Of Complex Metric For Multiservice Network Security Assessment", Statistical Methods Of Signal and Data Processing (SMSDP – 2010): Proc. Int. Conf., October 13-14, 2010, Kyiv : NAU, RED, IEEE Ukraine section joint SP, P. 158–160.

Gavrilenko, S. Iu., Gornostal, A. A. (2016), "Development the adaptive templates for fixing of the anomalous behavior of the computer system" ["Razrabotka adaptivnykh shablonov fiksatsii anomalnogo povedeniia kompiuternoi sistemy"], Information Processing Systems, Vol. 3 (140), P. 11–14.

Semenov, S., Gavrilenko, S., Chelack, V. (2016), "Design templates for identification state of computer systems are based on BDS-test", Herald of the National Technical University "KhPI" : Series "Informatics And Modeling", No. 21, P. 118–125. DOI: https://doi.org/10.20998/2411-0558.2016.21.13

Kosenko, V. (2017), "Mathematical model of optimal distribution of applied problems of safety-critical systems over the nodes of the information and telecommunication network", Advanced Information Systems, Vol. 1, No. 2, P. 4–9. DOI: https://doi.org/10. 20998/2522-9052.2017.2.01

Gavrilenko, S., Semenov, S., Chelack, V. (2018), "Development of anomalous computer behavior detection method based on probabilistic automaton", Ukrainian Scientific Journal of Information Security, Vol. 24, No. 3, P. 163–168. DOI: 10.18372/2225-5036.24.13427

Petrov, K. E. (2009), "Comparative identification of the model for the formation of the index of sustainable development" ["Komparatornaya ydentyfykatsyya modely formyrovanyya yndeksa ustoychyvoho razvytyya"], System research and information technology, No. 1, P. 36–46.

Gavrilenko, S., Gavrilenko, S. Yu. (2015), "Formation and study of heuristics in antivirus analyzers using the Mamdani algorithm", Journal of Qafqaz university, Azerbadhan, Mathematics and computer science, Vol. 3, No. 3, P. 116–120.

Semenov, S., Sira, O, Gavrylenko, S., Kuchuk, N. (2019), "Identification of the state of an object under conditions of fuzzy input data", Eastern-European Journal of Enterprise Technologies, Vol. 1, No. 4 (97), P. 22–29. DOI: https://doi.org/10.15587/1729-4061.2019.157085

Semenov, S. H., Havrylenko, S. Yu., Hloba, S. M., Babenko, O. S. (2015), "Development of computer viruses detection system based on ART-1 neural network", Information Processing Systems, Vol. 10 (135), P. 126–129.

Manikandan, V., Porkodi, V., Amin Salih Mohammed, Sivaram, M. (2018), "Privacy preserving data mining using threshold based fuzzy cmeans clustering", ICTACT Journal On Soft Computing, Vol. 09, Issue 01, P. 1813–1816.

Semenov, S., Sira, O, Kuchuk, N. (2018), "Development of graphic-analytical models for the software security testing algorithm", Eastern-European journal of enterprise technologies. No. 2/4 (92), P. 39–46. DOI: https://doi.org/10.15587/1729-4061.2018.127210

Ruban, I., Kuchuk, H., Kovalenko, A. (2017), "Redistribution of base stations load in mobile communication networks", Innovative Technologies and Scientific Solutions for Industries, No. 1 (1), P. 75–81. DOI: https://doi.org/10.30837/2522-9818.2017.1.075

Kovalenko, A., Kuchuk, H., Ruban, I. (2018), "Using time scales while approximating the length of computer networks", Innovative Technologies and Scientific Solutions for Industries, No. 2 (4), P. 12–18. DOI: http://doi.org/10.30837/2522-9818.2018.4.012

Amin Salih Mohammed, Yuvaraj, D., Sivaram Murugan, M., Porkodi, V. (2018), "Detection and removal of black hole attack in mobile ad hoc networks using grp protocol", International Journal of Advanced Computer Research, Vol. 9, No. 6, P. 1–6. DOI: http://doi.org/10.26483/ijarcs.v9i6.6335.

Published

2019-06-24

How to Cite

Gavrylenko, S. (2019). SYNTHESIS OF IDENTIFICATION MEASUREMENTS IN THE COMPUTER SYSTEM OF CRITICAL PURPOSE. INNOVATIVE TECHNOLOGIES AND SCIENTIFIC SOLUTIONS FOR INDUSTRIES, (2 (8), 36–43. https://doi.org/10.30837/2522-9818.2019.8.036

Issue

Section

INFORMATION TECHNOLOGY