Using statistical traffic analysis to calculate the confidential means of information transmission

The article considers the modeling of security problems in the Internet as stochastic systems. This allows you to find flaws in existing security systems and offer new solutions. Studying the vulnerabilities of existing security tools can prevent cyber-attacks from taking advantage of weak systems....

Full description

Saved in:
Bibliographic Details
Main Author: Нух Таха Насіф
Format: Article
Language:English
Published: Ivan Kozhedub Kharkiv National Air Force University 2021-01-01
Series:Наука і техніка Повітряних Сил Збройних Сил України
Subjects:
Online Access:https://journal-hnups.com.ua/index.php/nitps/article/view/503
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832570100830437376
author Нух Таха Насіф
author_facet Нух Таха Насіф
author_sort Нух Таха Насіф
collection DOAJ
description The article considers the modeling of security problems in the Internet as stochastic systems. This allows you to find flaws in existing security systems and offer new solutions. Studying the vulnerabilities of existing security tools can prevent cyber-attacks from taking advantage of weak systems. New, flexible and adaptive security schemes are necessary for emerging security threats elimination. A hybrid network security scheme, including intrusion detection systems and baits, scattered throughout the network is proposed. This combines the advantages of two security technologies. Honeypot is an activity-based network security system that can be a logical addition to the passive detection policies used by the IDS. This integration forces us to balance the safety indicators compared to costs, planning the operation of the device for the proposed system. Formulation of planning problems as a decentralized partially observable Markov decision-making process (DEC-POMDP) allows to make decisions in a distributed manner on each device without the need of centralized management.
format Article
id doaj-art-d02ff2d113de4de6be28798b059bd59e
institution Kabale University
issn 2223-456X
2518-1505
language English
publishDate 2021-01-01
publisher Ivan Kozhedub Kharkiv National Air Force University
record_format Article
series Наука і техніка Повітряних Сил Збройних Сил України
spelling doaj-art-d02ff2d113de4de6be28798b059bd59e2025-02-02T17:22:59ZengIvan Kozhedub Kharkiv National Air Force UniversityНаука і техніка Повітряних Сил Збройних Сил України2223-456X2518-15052021-01-011(42,)11812510.30748/nitps.2021.42.15503Using statistical traffic analysis to calculate the confidential means of information transmissionНух Таха Насіф0AL-Nukhba University College, Baghdad, IraqThe article considers the modeling of security problems in the Internet as stochastic systems. This allows you to find flaws in existing security systems and offer new solutions. Studying the vulnerabilities of existing security tools can prevent cyber-attacks from taking advantage of weak systems. New, flexible and adaptive security schemes are necessary for emerging security threats elimination. A hybrid network security scheme, including intrusion detection systems and baits, scattered throughout the network is proposed. This combines the advantages of two security technologies. Honeypot is an activity-based network security system that can be a logical addition to the passive detection policies used by the IDS. This integration forces us to balance the safety indicators compared to costs, planning the operation of the device for the proposed system. Formulation of planning problems as a decentralized partially observable Markov decision-making process (DEC-POMDP) allows to make decisions in a distributed manner on each device without the need of centralized management.https://journal-hnups.com.ua/index.php/nitps/article/view/503security in the system, intrusion detection system, traffic analysis.
spellingShingle Нух Таха Насіф
Using statistical traffic analysis to calculate the confidential means of information transmission
Наука і техніка Повітряних Сил Збройних Сил України
security in the system, intrusion detection system, traffic analysis.
title Using statistical traffic analysis to calculate the confidential means of information transmission
title_full Using statistical traffic analysis to calculate the confidential means of information transmission
title_fullStr Using statistical traffic analysis to calculate the confidential means of information transmission
title_full_unstemmed Using statistical traffic analysis to calculate the confidential means of information transmission
title_short Using statistical traffic analysis to calculate the confidential means of information transmission
title_sort using statistical traffic analysis to calculate the confidential means of information transmission
topic security in the system, intrusion detection system, traffic analysis.
url https://journal-hnups.com.ua/index.php/nitps/article/view/503
work_keys_str_mv AT nuhtahanasíf usingstatisticaltrafficanalysistocalculatetheconfidentialmeansofinformationtransmission