Using statistical traffic analysis to calculate the confidential means of information transmission
The article considers the modeling of security problems in the Internet as stochastic systems. This allows you to find flaws in existing security systems and offer new solutions. Studying the vulnerabilities of existing security tools can prevent cyber-attacks from taking advantage of weak systems....
Saved in:
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Ivan Kozhedub Kharkiv National Air Force University
2021-01-01
|
Series: | Наука і техніка Повітряних Сил Збройних Сил України |
Subjects: | |
Online Access: | https://journal-hnups.com.ua/index.php/nitps/article/view/503 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | The article considers the modeling of security problems in the Internet as stochastic systems. This allows you to find flaws in existing security systems and offer new solutions. Studying the vulnerabilities of existing security tools can prevent cyber-attacks from taking advantage of weak systems. New, flexible and adaptive security schemes are necessary for emerging security threats elimination. A hybrid network security scheme, including intrusion detection systems and baits, scattered throughout the network is proposed. This combines the advantages of two security technologies. Honeypot is an activity-based network security system that can be a logical addition to the passive detection policies used by the IDS. This integration forces us to balance the safety indicators compared to costs, planning the operation of the device for the proposed system. Formulation of planning problems as a decentralized partially observable Markov decision-making process (DEC-POMDP) allows to make decisions in a distributed manner on each device without the need of centralized management. |
---|---|
ISSN: | 2223-456X 2518-1505 |