Assessment of functional efficiency of a corporate scientificeducational network based on the comprehensive indicators of quality of service
DOI:
https://doi.org/10.15587/1729-4061.2017.118329Keywords:
synergistic approach to threat assessment, integrated indicator of quality of service, corporate scientific-educational networkAbstract
In order to evaluate effectiveness of using a corporate scientific-educational network, we propose to apply an integrated indicator of the quality of services for users of CSES based on the combination of main technical and economic indicators (functional efficiency). The assessment techniques, proposed in the present work, for cryptographic procedures, for the formation of an integrated indicator of threats based on the synergistic approach to assessing the impacts on elements of CES, taken together, make it possible to estimate resistance of the applied cryptographic algorithms in technical systems of information protection within a corporate educational network. The devised procedure for estimating the effectiveness of investment into information security of CSES enables effective control over capital investment into effectiveness of technical solutions for information safety based on the proposed technique for assessing investment into TMIP, which takes into consideration the synergy and hybridization of contemporary threats. The obtained expressions for efficiency of using TMIP (their resistance and implementation based on the method of express-analysis), investment into TMIP (based on the proposed procedure) in the comprehensive indicator of assessment of functional efficiency of a corporate scientific-educational network at different techniques for managing data exchange make it possible to obtain comparative estimates to ensure the required indicators of quality of services when using different protocols for managing CSES data exchangeReferences
- Goloshchapov, S., Shahnovich, I. (2011). 100GB Ethernet: osnovnye printsipy. Pervaya milya, 3. Available at: http://www.lastmile.su/files/article_pdf/2/article_2820_580.pdf
- Godovoy analiz rynka promyshlennyh setey 2016 v sootvetstvii s HMS. Available at: http://www.industrialnets.ru/news/2016/godovoj-analiz-rynka-promyshlennykh-setej-2016-v-sootvetstvii-s-hms/
- Ethernet i promyshlennye seti. Available at: https://www.osp.ru/lan/2013/09/13037411/
- Raspredelenie rynka promyshlennyh setey v 2016 g. po dannym HMS Industrial Networks. Available at: http://ua.automation.com/content/raspredelenie-rynka-promyshlennyh-setej-v-2016-g-po-dannym-hms-industrial-networks
- Kucheryaviy, A. E., Kucheryaviy, E. A., Prokop'ev, A. V. (2013). Internet veshchey i setevye protokoly. Internet veshchey i setevye protokoly. Aktual'nye problemy infotelekommunikatsiy v nauke i obrazovani. II-ya Mezhdunarodnaya nauchno-tekhnicheskaya i nauchno-metodicheskaya konferentsiya. Sankt-Peterburg: Sankt-Peterburgskiy gosudarstvennyy universitet telekommunikatsiy im. prof. M. A. Bonch-Bruevicha, 23–29.
- Funktsional'naya effektivnost'. Available at: https://www.ngpedia.ru/id625108p1.html
- Hryshchuk, R. V., Danyk, Yu. H.; Danyk, Yu. H. (Ed.) (2016). Osnovy kibernetychnoi bezpeky. Zhytomyr: ZhNAEU, 636.
- Kiberbezopasnost' 2016–2017: Ot itogov k prognozam. Available at: https://www.ptsecurity.com/upload/corporate/ru-ru/analytics/Cybersecurity-2016-2017-rus.pdf
- Rise of IoT Botnets Showcases Cybercriminals’ Ability to Find New Avenues of Attack. Available at: http://storage.pardot.com/44731/127332/Cybercrime_Trends_Report___2016_Year_in_Review__1_.pdf
- Issledovanie HP: Sredniy godovoy ushcherb ot kiberatak vyros do 15 mln doll. na organizatsiyu. Available at: http://www.connect-wit.ru/issledovanie-hp-crednij-godovoj-ushherb-ot-kiberatak-vyros-do-15-mln-doll-na-organizatsiyu.html
- CISCO: Kiberataki na industrial'nye sistemy usilivayutsya, a doverie k imeyushchimsya sistemam zashchity padaet. Available at: https://www.cisco.com/c/ru_ru/about/press/press-releases/2016/01-21a.html
- Bank dannyh ugroz bezopasnosti informatsii. Available at: http://bdu.fstec.ru/vul
- MSE-T E.800. Opredelenie terminov, otnosyashchihsya k kachestvu obsluzhivaniya. Available at: https://www.itu.int/rec/dologin_pub.asp?lang=e&id=T-REC-E.800-200809-I!!PDF-R&type=items
- Yanovskiy, G. G. (2008). Kachestvo obsluzhivaniya v setyah IP. Vestnik svyazi, 1. Available at: http://niits.ru/public/2008/2008-006.pdf
- Vegeshny, Sh. (2003). Kachestvo obsluzhivaniya v setyah IP. Moscow. Available at: http://it-ebooks.ru/publ/cisco/cisco_ip_quality_of_service/11-1-0-293
- ISO 9000:2015(en). Quality management systems – Fundamentals and vocabulary. International Organization for Standardization. Available at: https://www.iso.org/obp/ui/#iso:std:iso:9000:ed-4:v1:en
- GOST RV 51987. Informatsionnaya tekhnologiya, kompleks standartov na AS (2002). Gosstandart Rossii. Moscow.
- Uskov, A. V., Ivannikov, A. D., Uskov, V. L. (2008). Tekhnologii obespecheniya informatsionnoy bezopasnosti korporativnyh obrazovatel'nyh setey. Educational Technology & Society, 11 (1), 472–479.
- Kondratova, E. G. (2013). Sotsial'nye seti kak kanal utechki korporativnoy informatsii. Bezopasnost' informatsionnyh tekhnologiy, 20 (1). Available at: https://elibrary.ru/item.asp?id=21003147&
- Litvinov, V. A., Lypko, E. V., Yakovleva, A. A. Informatsionnaya bezopasnost' vysshego uchebnogo zavedeniya v ramkah sovremennoy globalizatsii. Available at: http://conference.osu.ru/assets/files/conf_reports/conf13/132.doc
- Sohrabi Safa, N., Von Solms, R., Furnell, S. (2016). Information security policy compliance model in organizations. Computers & Security, 56, 70–82. doi: 10.1016/j.cose.2015.10.006
- Yevseiev, S. P. (2016). For information technologies security evaluation for automated banking systems of Ukraine. Ukrainian Scientific Journal of Information Security, 22 (3), 297–309. doi: 10.18372/2225-5036.22.11103
- Evseev, S. P. (2017). Modelirovanie protsessov upravleniya v informatsionnoy ekonomike. Metodologiya postroeniya modifitsirovannoy sistemy elektronnogo dokumentooborota v universitete na osnove elektronnoy tsifrovoy podpisi standarta H.509. Berdyansk: Izdatel' Tkachuk A.V., 420.
- Petrichenko, G. S., Naryzhnaya, N. Y., Kritskaya, L. M. (2016). The technique of a security tools choice for a corporate network. Polythematic Online Scientific Journal of Kuban State Agrarian University, 121 (07), 1–10. doi: 10.21515/1990-4665-121-130
- Karakus, M., Durresi, A. (2017). Quality of Service (QoS) in Software Defined Networking (SDN): A survey. Journal of Network and Computer Applications, 80, 200–218. doi: 10.1016/j.jnca.2016.12.019
- Hailu, D. H., Lema, G. G., Yekun, E. A., Kebede, S. H. (2017). Unified study of Quality of Service (QoS) in OPS/OBS networks. Optical Fiber Technology, 36, 394–402. doi: 10.1016/j.yofte.2017.05.016
- Han, B., Gopalakrishnan, V., Ji, L., Lee, S. (2015). Network function virtualization: Challenges and opportunities for innovations. IEEE Communications Magazine, 53 (2), 90–97. doi: 10.1109/mcom.2015.7045396
- Emfinger, W., Karsai, G. (2015). Modeling Network Medium Access Protocols for Network Quality of Service Analysis. 2015 IEEE 18th International Symposium on Real-Time Distributed Computing. doi: 10.1109/isorc.2015.47
- Stepanova, I. V., Mohammed Omar, A. A. (2017). Ispol'zovanie perspektivnyh tekhnologiy dlya razvitiya raspredelennyh korporativnyh setey svyazi. T-Comm: Telekommunikatsii i transport, 11 (6), 10–15.
- Borodin, V. V., Rastrelin, E. A. (2015). Some aspects of reliability assessment of the corporative data network with consideration of redundancy management. Systems and Means of Informatics, 25 (4), 150–157. doi: 10.14357/08696527150411
- Yevseiev, S. P., Rzayev, H. N., Ostapov, S. E., Nikolaenko, V. I. (2017). Data exchange evaluation in global networks based on integrated quality indicator of service network. Radio Electronics, Computer Science, Control, 1, 115–128. doi: 10.15588/1607-3274-2017-1-14
- Korol, O. H. (2017). Otsinka yakosti obsluhovuvannia hlobalnoi merezhi na osnovi tekhnolohiy Ethernet za dopomohoiu kompleksnoho pokaznyka. Systemy obrobky informatsiy, 2, 100–110.
- De Nicola, A., Villani, M. L., Brugnoli, M. C., D'Agostino, G. (2016). A methodology for modeling and measuring interdependencies of information and communications systems used for public administration and eGovernment services. International Journal of Critical Infrastructure Protection, 14, 18–27. doi: 10.1016/j.ijcip.2016.06.001
- Ali, H. (2017). Quality of service: Introduction of a new framework and a novel measurement technique. 2017 3rd International Conference on Information Management (ICIM). doi: 10.1109/infoman.2017.7950439
- Kayashev, A. I., Rahman, P. A., Sharipov, M. I. (2013). Analiz pokazateley nadezhnosti lokal'nyh komp'yuternyh setey. Vestnik UGATU, 17 (5 (58)), 140–149.
- Yevseiev, S. P., Sumtsov, D. V., Korol', O. G., Tomashevskiy, B. P. (2010). The analysis of data transfer efficiency in computer systems with usage of the integrated mechanisms of reliability and safety support. Eastern-European Journal of Enterprise Technologies, 2 (2 (44)), 45–49. Available at: http://journals.uran.ua/eejet/article/view/2622/2428
- Yevseiev, S. P., Ostapov, S. E., Korolov, R. V. (2017). Use of mini-versions to evaluate the security of block-symmetric ciphers. Ukrainian Scientific Journal of Information Security, 23 (2), 100–108. doi: 10.18372/2225-5036.23.11796
- Shennon, K. (1963). Raboty po teorii informatsii i kibernetike. Moscow: IL, 333–369.
- Rukhin, A., Sota, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S. et. al. (2000). A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. NIST Special Publication 800-22, 169. doi: 10.6028/nist.sp.800-22
- Yevseiev, S. P. (2017). Model' narushitelya prav dostupa v avtomatizirovannoy bankovskoy sisteme na osnove sinergeticheskogo podhoda. Informatsiyna bezpeka, 2 (26), 110–120.
- Buchyk, S. S. (2015). Metodyka ekspertnoho otsiniuvannia funktsionalnykh profiliv zahroz derzhavnykh informatsiynykh resursiv. Otkrytye informatsionnye i komp'yuternye integrirovannye tekhnologii, 70, 271–280.
- Yevseiev, S. P. (2017). Otsenka effektivnosti investitsiy v bezopasnost' organizatsiy bankovskogo sektora na osnove sinergeticheskoy modeli ugroz. Systemy obrobky informatsiy, 2, 88–94.
- Homyakov, K. G., Kanitskaya, L. V. (2015). Otsenka effektivnosti investitsiy v kompleksnye sistemy zashchity informatsii kompaniy neftegazovogo kompleksa dlya prinyatiya vzveshennogo investitsionnogo resheniya. Ekonomika. Fundamental'nye issledovaniya, 2, 5173–5177.
- Bleyhut, R. (1986). Teoriya i praktika kodov, kontroliruyushchih oshibki. Moscow: Mir, 576.
- Klark, Dzh.-ml.; Tsybakov, B. S. (Ed.) (1987). Kodirovanie s ispravleniem oshibok v sistemah tsifrovoy svyazi. Moscow: Radio i svyaz', 392.
- Mak-Vil'yams, F. Dzh., Sloen, N. Dzh. A. (1979). Teoriya kodov, ispravlyayushchih oshibki. Moscow: Svyaz', 744.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2017 Serhii Yevseiev, Volodymir Ponomarenko, Volodymir Ponomarenko, Olena Rayevnyeva, Olena Rayevnyeva
This work is licensed under a Creative Commons Attribution 4.0 International License.
The consolidation and conditions for the transfer of copyright (identification of authorship) is carried out in the License Agreement. In particular, the authors reserve the right to the authorship of their manuscript and transfer the first publication of this work to the journal under the terms of the Creative Commons CC BY license. At the same time, they have the right to conclude on their own additional agreements concerning the non-exclusive distribution of the work in the form in which it was published by this journal, but provided that the link to the first publication of the article in this journal is preserved.
A license agreement is a document in which the author warrants that he/she owns all copyright for the work (manuscript, article, etc.).
The authors, signing the License Agreement with TECHNOLOGY CENTER PC, have all rights to the further use of their work, provided that they link to our edition in which the work was published.
According to the terms of the License Agreement, the Publisher TECHNOLOGY CENTER PC does not take away your copyrights and receives permission from the authors to use and dissemination of the publication through the world's scientific resources (own electronic resources, scientometric databases, repositories, libraries, etc.).
In the absence of a signed License Agreement or in the absence of this agreement of identifiers allowing to identify the identity of the author, the editors have no right to work with the manuscript.
It is important to remember that there is another type of agreement between authors and publishers – when copyright is transferred from the authors to the publisher. In this case, the authors lose ownership of their work and may not use it in any way.