homescontents
film izle hd film film
avcilar escort beylikduzu escort esenyurt escort
istanbul escort
bornova escort bornova escort
sakarya escort sakarya escort sakarya escort sakarya escort serdivan escort adapazarı escort sakarya escort bayan sakarya escort bayan sakarya escort bayan sakarya escort bayan sakarya escort bayan sakarya escort bayan sakarya escort bayan sakarya escort bayan sakarya escort bayan sakarya escort bayan sakarya escort bayan sapanca escort
IMPROVING THE METHOD OF SEARCHING DIGITAL ILLEGAL MEANS OBTAINING INFORMATION BASED ON CLUSTER ANALYSIS | Laptiev | Scientific Journal of Astana IT University

IMPROVING THE METHOD OF SEARCHING DIGITAL ILLEGAL MEANS OBTAINING INFORMATION BASED ON CLUSTER ANALYSIS

O. Laptiev, V. Savchenko, Y. Kravchenko, O. Barabash

Аннотация


Іn the article the possibilities of the multipositional technology of searching digital insertion devices are investigated based on clustering. Existing means of detecting radiation of digital illegal means obtaining information reception show that they are ineffective on the background of legal signals of a multiagent medium. The constant improvement of digital illegal means obtaining information, masking their work under the signals of legal transmitters require the search for new approaches to the recognition and localization of these means. Prospects for the development of search technology today are associated with the creation of multi-position permanent detection and localization systems. However, the detection problem requires the recognition of harmful radiation on the set of statistics of signal parameters in the air by solving the problem of clustering. The disadvantages of most classical clustering methods are the need for prior knowledge of the possible number of clusters and a sufficiently high interactiveness, which complicates their practical application, especially in real-time. At the same time, intelligent multi-agent methods are free from these shortcomings, although their application remains quite complicated. The problem of recognizing the harmful signal against the background of similar legal signals is possible by using the method of a bee colony with direct communication between agents. In this case, the agents are individual elements of the multi-machine complex, which scan the ether at different points in space, then exchanging results with other agents, and, finally, come to a common conclusion about the nature of the signal. Full-scale studies have been carried out that confirm the reliability of clusterization by 6 ... 12% compared to the classic k-medium method.

Ключевые слова


information protection, inbound device, multiagent system, clusterization

Полный текст:

PDF (English)

Литература


Yakovliev, A., and Lys, O. (2013). Special technical means of secret gathering of information. Scientific

works [Petro Mohyla Chornomorsk State University of the Kyiv-Mohyla Academy]. Ser.: Computer

technology. T. 229, No. 217, 39-43.

Digital direction finder “Rohde & Schwarz DDF0xE” / Technology for special services, Bureau of Scientific and Technical Information, founded in 1999. [Electronic resource] access mode: http://www.bnti.

ru/des.asp?itm=4446&tbl =04.01.01.01.01.

Holembo, V., & Muliarevych, O. (2011). Modification of the goosebump colony method for the development of traveling salesman tasks by a group of autonomous agents. Bulletin of the National

University “Lvivska Politechnika”. No. 717: Computer systems and systems, 24-30.

Danchuk, V. & Svatko, V. (2010). Optimization of the number of routs according to the graph in problems of logistic by the method of a modified goosebump algorithm. Bulletin of the National Transport

University. No. 20, 109-114. - Access mode: http://nbuv.gov.ua/UJRN/Vntu_2010_20_21.

Khyzhniak, I., Makoveichuk, O., Khudov, R., Podlipaiev, V., Horban, H., & Khudov H. (2018). The

method of swarm intelligence (piece bee colony (ABC)) of thematic segmentation of optical-electronic imaging. Control systems, navigation and communication, issue 2 (48), 91-96. DOI: 10.26906/

SUNZ.2018.2.091

Davidović, T., Teodorović, D., & Selmic, M. (2015). Bee Colony Optimization – part I: The algorithm

overview. Yugoslav Journal of Operations Research, 25, 33-56.

Wahid, A. Subhra, C., & Behera, D. (2015). Mohapatra Artificial Bee colony and its Application: An

Overview. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET),

(4), 1475–1480.

Korotin, S., Kravchenko, Y., Starkova, O., Herasymenko, K., & Mykolaichuk, R. (2019). Analytical determination of the parameters of the self-tuning circuit of the traffic control system on the limit

of vibrational stability, International Scientific-Practical Conference Problems of Infocommunications

Science and Technology, PIC S&T`– Proceedings, 471–476.

Rakushev, M., Permiakov, O., Tarasenko, S., Kovbasiuk, S., Kravchenko, Y., & Lavrinchuk, O. (2019).

Numerical Method of Integration on the Basis of Multidimensional Differential-Taylor Transformations.

In Proceedings of the IEEE International Scientific-Practical Conference Problems of Infocommunications Science and Technology, PIC S&T`2019. Proceedings, 675-678.

Kravchenko, Y., Leshchenko, O., Dakhno, N., Trush, O., & Makhovych O. Evaluating the effectiveness of

cloud services. IEEE International Conference on Advanced Trends in Information Theory, ATIT`2019

– Proceedings, 120–124.

Savchenko, V., Ilin, O., Hnidenko, N., Tkachenko, O., Laptiev, O., & Lehominova, S. (2020). Detection

of Slow DDoS Attacks based on User’s Behavior Forecasting. International Journal of Emerging Trends

in Engineering Research (IJETER), vol. 8. no. 5, – ISSN 2347–3983. 2019–2025.

Savchenko, V., Syrotenko, A., Shchypanskyi, P., Matsko, O., & Laptiev, O. (2020). The Model of Localization Precision for Detection of Hidden Transmitters. International Journal of Innovative Technology

and Exploring Engineering (IJITEE), vol. 9, no.4, ISSN: 2278–3075. 2114–2119.

Barabash, O., Laptiev, O., Tkachev, V., Maystrov, O., Krasikov, O., & Polovinkin, I. (2020). The Indirect

method of obtaining Estimates of the Parameters of Radio Signals of hidden means of obtaining

Information. International Journal of Innovative Technology and Exploring Engineering (IJITEE), Scopus,

(8), 4133–4139.

Stefurak, O., Tikhonov, Y., Laptіev, O., & Zozulya, S. (2020). Improving the stochastic model to identify threats of damage or unauthorized leakage. Modern information protection: scientific and technical

journal. K.: DUT, no. 2 (42), 19-26.

Laptіev, O.A, Babenko, R.V, Pravdyvy, A.M, Zozulya, S.A, Stefurak, O.R. (2020). Improved methodology for selecting the sequence of priorities for servicing information flows. Scientific and practical

journal «Communication». K.: DUT, 4 (146), 45-49.

Oleksandr, L., Biehun, A., Hohoniants, S., Lisnevskyi, R., Pravdyvyi, A., & Lazarenko, S. (2020). Method of detecting signals of means of hidden obtaining of information on the basis of approximation

of T-spectrum. The Intelligent Control System for infocommunication networks. International Journal of Emerging Trends in Engineering Research (IJETER), vol. 8, no. 10, 6835-6841.

Laptiev, O., Savchenko, V., Ablazov, I., Lisnevskyi, R., Kolos, O., & Hudyma, V. (2020). Method of

detecting random signals based on determining the deviations of the main parameters of radio

signals. International Journal of Advanced Trends in Computer Science and Engineering (IJATCSE), vol. 9,

no. 5, 9204–9209.

Yevseiev, S., Korolyov, R., Tkachov, A., Laptiev, O., Opirskyy, I., & Soloviova, O. (2020). Modification

of the algorithm (OFM) S-box, which provides increasing crypto resistance in the post-quantum

period. International Journal of Advanced Trends in Computer Science and Engineering (IJATCSE,) vol. 9,

no. 5, 8725-8729.

Laptev, A.A. Sachenko, V.A., Barabash, O.V. Sachenko, V.V., & Matsko A.I. (2019). The method of

searching for digital means of illegal obtaining of information on the basis cluster analysis. Magyar

Tudományos Journal. Budapest, Hungary, no. 31, 33–37

Laptev, A.A., Barabash, O.V., Savchenko, V.V., Savchenko, V.A., & Sobchuk, V.V. (2019). The method of

searching for digital means of illegal reception of information in information systems in the working range of Wi-Fi. International Journal of Advanced Research in Science, Engineering and Technology.

Indiа, ISSN: 2350-0328, 6 (7), 10101–10105.

Hryshchuk, R., Korobiichuk, S., Ivanchenk, O., Roma, & A. Golishevsky. (2019). The Throughput

of Technical Channels as an Indicator of Protection Discrete Sources from Information Leakage.

Computer Modeling and Intelligent Systems, 2353, 523–532.

Korobiichuk, I., Ivanchenko, S., Havrylenko, O., Golishevsky, A., Hnatiuk, S., & Hryshchuk, R. (2019).

Protection of information from leakage by technical channels for sources with non range distribution of

probability. In CEUR Workshop Proceedings, 992-1003.

Hryshchuk, R., Korobiichuk, I., Horoshko, V., Khokhlacheva, Y. (2019). Microprocessor Means for

Technical Diagnostics of Complex Systems. Computer Modeling and Intelligent Systems, vol. 2353,

–1029.




DOI: http://dx.doi.org/10.37943/AITU.2020.99.72.006

Ссылки

  • Ссылки не определены.


(P): 2707-9031
(E): 2707-904X

Articles are open access under the Creative Commons License  


Нур-Султан
Бизнес-центр EXPO, блок C.1.
Казахстан, 010000

sjaitu@astanait.edu.kz