Improvement of mathematical model of the protected information and telecommunication system using the theory of sensitivity
Main Article Content
Abstract
Offered approach to the design protected informatively - telecommunication system on the basis of theory of sensitiveness. The research of the existing approaches to the mathematical modeling of complex technical systems. Which showed some of their disadvantages associated with limitations and assumptions are not compatible with the real process of their functioning. A mathematical model is improved by protected informatively - telecommunication system, different from known the account of existent features of ill-intentioned external influences and corresponding changes of internal descriptions of the system. Equalizations and functions of sensitiveness, allowing to take into account possible changes protected informatively, are specified - telecommunication system in the conditions of affecting her ill-intentioned attacks. Developed higher-order sensitivity equation that can improve the accuracy of the description of the change process parameters secure information technology system under the conditions of independent malicious actions. Bibl. 11
Article Details
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
References
A.A. Mozhayev, A.A. Kovalenko, G.A. Kuchuk. (2009), “Collection of scientific labours of the Kharkiv university of Aircrafts”. Collection of scientific labours of the Kharkiv university of Aircrafts. Vol 4(22),pp.89-93.
G. Kuchuk, O. Mozhayev, A. Kovalenko. (2010), “An Approach to Development of Complex Analysis of Commutative Metric for Multiservice Network security Assessment” Statistical Methods of Signal and Data Processing. General Chairman I. Prokopenko.-Kiev: National Aviation University “NAUDruk” Publishing House,.P. 158-160.
Moreva O.D. (2006), “Development of method of estimation of informative protected of the sociotekhnicheskikh systems with the use of functions of sensitiveness”. Voronezh p.151
S.G. Semenov, V.V. Bosko, I.A. Berezyuk. (2011), “Analysis of factors, influencing on the state of defence of ngn-networks” P.72
S.G. Semenov, S.B. Klіmov, S.O. Yengalichev. (2011), “Modern approach in relation to the synthesis
of protected informatively telecommunication systems of computer-integrated type”.
S.G. Semenov, S.Yu. Gavrilenko, V.V. Davydov. (2011), “Safety of real-time executives is in CASS of technological process control”. Aviacionno-kosmicheskaya of tekhnika I tekhnologiya Vol. 8(85),
pp.222-225
S.G. Semenov, V.V. Davydov. (2011), “Dynamic model of the informative system on the basis of the looked after structural-informative portrait”. An announcer of the National technical university is the «Kharkiv polytechnic institute». No.36 pp.156 163
S.G. Semenov. (2011), “Structural-informative portrait of the informative system in the conditions of vagueness on the example of dos-attack”. Allukrainian interdepartmental scientific and technical collection of «Radiotrician». No166, pp.99-106
S.G. Semenov, O.O Sur. (2012), “A mathematical model of the system of cryptographic defence of electronic reports is on the basis of gert-network”. Control system, navigation and connection. Tom.1, No. 1(21), pp.131-137
S.G. Semenov, A.A. Smirnov, Ye.V. Meleshko. (2012), “Models and methods of management network resources are in the telecommunication systems and networks.” Monograph, p.212
R.Tomovich, M.Vukobratovich. (1972), “General theory of sensitiveness”. Moskva, soveckoe radio. P.240