SYNTHESIS OF IDENTIFICATION MEASUREMENTS IN THE COMPUTER SYSTEM OF CRITICAL PURPOSE
DOI:
https://doi.org/10.30837/2522-9818.2019.8.036Keywords:
state identification, computer system of critical purpose, identification dimensions, identification of abusesAbstract
The subject of the study is the methods and means for identifying the state of a computer system of critical purpose. The aim of this article is to conduct an analysis and development of a general scheme for the synthesis of identification measurements in the system of identification of the state of a computer system of critical purpose. The article solves the following tasks. The methods of selection of informative indicators of state identification and methods for the synthesis of identification measurements in a computer system of critical purpose are analyzed. As a result of the analysis, the main optimization problems are formulated and an example of the possible use of the known mathematical device in their solution is given. When solving the tasks, methods of multi-criteria evaluation, discriminant and cluster analysis, mathematical statistics and comparative approach were used. Results obtained. Studies have shown that the general scheme for identifying the state of a computer system of critical purpose should include methods for identifying abnormalities and methods for identifying abuses. The task of identifying anomalies should be solved under very difficult constraints on the authenticity of the results of identification, and the efficiency of the solution to this problem should be worse than the requirements set forth in the guideline documents. As a result, a general scheme for identifying the state of a computer system of critical purpose that differs by the complex use of advanced identification methods and their adaptation to possible changes in input data is synthesized. The set of possible input indicators for state identification was experimentally determined. A comparative analysis of state identification methods was conducted. The timetables for identifying abuses in a computer system of critical purpose, depending on the number of recorded data were received. Conclusion: the complex use of the methods of identification of anomalies allowed to increase the authenticity of identification to 1,9 times, and the complex use of methods for identifying abuses in computer systems of the critical purpose allowed to increase the efficiency of identification up to 2 times.
References
Bezkorovayny, V. V., Dras, O. M., Semenec, V. V. (2018), "Synthesis of models of multicriterion estimation by the method of comparative identification" ["Syntez modeley bahatokryterialʹnoho otsinyuvannya metodom komparatornoyi identyfikatsiyi"], Materials of the articles of the International scientific and practical conference "Information Technologies and Computer Modeling", Ivano-Frankivsk, May 14-19, 2018, Ivano-Frankivsk, P. 266–269.
Kuchuk, G. A., Kovalenko, A. A., Mozhaev, A. A. (2010), "An Approach To Development Of Complex Metric For Multiservice Network Security Assessment", Statistical Methods Of Signal and Data Processing (SMSDP – 2010): Proc. Int. Conf., October 13-14, 2010, Kyiv : NAU, RED, IEEE Ukraine section joint SP, P. 158–160.
Gavrilenko, S. Iu., Gornostal, A. A. (2016), "Development the adaptive templates for fixing of the anomalous behavior of the computer system" ["Razrabotka adaptivnykh shablonov fiksatsii anomalnogo povedeniia kompiuternoi sistemy"], Information Processing Systems, Vol. 3 (140), P. 11–14.
Semenov, S., Gavrilenko, S., Chelack, V. (2016), "Design templates for identification state of computer systems are based on BDS-test", Herald of the National Technical University "KhPI" : Series "Informatics And Modeling", No. 21, P. 118–125. DOI: https://doi.org/10.20998/2411-0558.2016.21.13
Kosenko, V. (2017), "Mathematical model of optimal distribution of applied problems of safety-critical systems over the nodes of the information and telecommunication network", Advanced Information Systems, Vol. 1, No. 2, P. 4–9. DOI: https://doi.org/10. 20998/2522-9052.2017.2.01
Gavrilenko, S., Semenov, S., Chelack, V. (2018), "Development of anomalous computer behavior detection method based on probabilistic automaton", Ukrainian Scientific Journal of Information Security, Vol. 24, No. 3, P. 163–168. DOI: 10.18372/2225-5036.24.13427
Petrov, K. E. (2009), "Comparative identification of the model for the formation of the index of sustainable development" ["Komparatornaya ydentyfykatsyya modely formyrovanyya yndeksa ustoychyvoho razvytyya"], System research and information technology, No. 1, P. 36–46.
Gavrilenko, S., Gavrilenko, S. Yu. (2015), "Formation and study of heuristics in antivirus analyzers using the Mamdani algorithm", Journal of Qafqaz university, Azerbadhan, Mathematics and computer science, Vol. 3, No. 3, P. 116–120.
Semenov, S., Sira, O, Gavrylenko, S., Kuchuk, N. (2019), "Identification of the state of an object under conditions of fuzzy input data", Eastern-European Journal of Enterprise Technologies, Vol. 1, No. 4 (97), P. 22–29. DOI: https://doi.org/10.15587/1729-4061.2019.157085
Semenov, S. H., Havrylenko, S. Yu., Hloba, S. M., Babenko, O. S. (2015), "Development of computer viruses detection system based on ART-1 neural network", Information Processing Systems, Vol. 10 (135), P. 126–129.
Manikandan, V., Porkodi, V., Amin Salih Mohammed, Sivaram, M. (2018), "Privacy preserving data mining using threshold based fuzzy cmeans clustering", ICTACT Journal On Soft Computing, Vol. 09, Issue 01, P. 1813–1816.
Semenov, S., Sira, O, Kuchuk, N. (2018), "Development of graphic-analytical models for the software security testing algorithm", Eastern-European journal of enterprise technologies. No. 2/4 (92), P. 39–46. DOI: https://doi.org/10.15587/1729-4061.2018.127210
Ruban, I., Kuchuk, H., Kovalenko, A. (2017), "Redistribution of base stations load in mobile communication networks", Innovative Technologies and Scientific Solutions for Industries, No. 1 (1), P. 75–81. DOI: https://doi.org/10.30837/2522-9818.2017.1.075
Kovalenko, A., Kuchuk, H., Ruban, I. (2018), "Using time scales while approximating the length of computer networks", Innovative Technologies and Scientific Solutions for Industries, No. 2 (4), P. 12–18. DOI: http://doi.org/10.30837/2522-9818.2018.4.012
Amin Salih Mohammed, Yuvaraj, D., Sivaram Murugan, M., Porkodi, V. (2018), "Detection and removal of black hole attack in mobile ad hoc networks using grp protocol", International Journal of Advanced Computer Research, Vol. 9, No. 6, P. 1–6. DOI: http://doi.org/10.26483/ijarcs.v9i6.6335.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2019 Svitlana Gavrylenko
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Our journal abides by the Creative Commons copyright rights and permissions for open access journals.
Authors who publish with this journal agree to the following terms:
Authors hold the copyright without restrictions and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (CC BY-NC-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
Authors are able to enter into separate, additional contractual arrangements for the non-commercial and non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
Authors are permitted and encouraged to post their published work online (e.g., in institutional repositories or on their website) as it can lead to productive exchanges, as well as earlier and greater citation of published work.