Using statistical traffic analysis to calculate the confidential means of information transmission

The article considers the modeling of security problems in the Internet as stochastic systems. This allows you to find flaws in existing security systems and offer new solutions. Studying the vulnerabilities of existing security tools can prevent cyber-attacks from taking advantage of weak systems....

Full description

Saved in:
Bibliographic Details
Main Author: Нух Таха Насіф
Format: Article
Language:English
Published: Ivan Kozhedub Kharkiv National Air Force University 2021-01-01
Series:Наука і техніка Повітряних Сил Збройних Сил України
Subjects:
Online Access:https://journal-hnups.com.ua/index.php/nitps/article/view/503
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The article considers the modeling of security problems in the Internet as stochastic systems. This allows you to find flaws in existing security systems and offer new solutions. Studying the vulnerabilities of existing security tools can prevent cyber-attacks from taking advantage of weak systems. New, flexible and adaptive security schemes are necessary for emerging security threats elimination. A hybrid network security scheme, including intrusion detection systems and baits, scattered throughout the network is proposed. This combines the advantages of two security technologies. Honeypot is an activity-based network security system that can be a logical addition to the passive detection policies used by the IDS. This integration forces us to balance the safety indicators compared to costs, planning the operation of the device for the proposed system. Formulation of planning problems as a decentralized partially observable Markov decision-making process (DEC-POMDP) allows to make decisions in a distributed manner on each device without the need of centralized management.
ISSN:2223-456X
2518-1505