METHOD FOR CONSTRUCTING A STABILIZATION FUNCTION FOR MANAGING CYBERSECURITY ON THE BASIS OF THE MATHEMATICAL MODEL OF OSCILLATIONS UNDER THE ACTION OF FORCES WITH A DELAY

Abstract

The article studies cyber security management systems, in which there is a downtime - a separate type of adaptive systems. Made the analysis of the reasons that influence the appearance of delay (downtime) in information security systems in cybernetic attacks. A mathematical model of a quantitative evaluation of the effectiveness of the information protection system is proposed, for example of oscillations that arise under the action of a force with delay. Cybernetic attacks are considered as continuous messages in the form of difference starting counting points, and have the following principles: sequential coding, regeneration, robustness, uncertainty. The firewall attack simulator shows the cyber security management technique. Making an evaluation of effectiveness of data security system must be counted delay (downtime), which attacks were in previous period of time and which managing security features were used. Existing of security windows give a possibility to get new information about disadvantages, which are in security system and in time eliminate them. Work in Internet now a days practical unbelievable without using firewall, which secures computer from outside attack and restrict application work according to task inserted by user his rules. Manufacturers of malicious programs, in turn apply different methods of struggle with firewall. Theme of the article is review of the most widespread methods to fight with firewall. For each method given technology of secure and methods of checking firewalls. The new approach makes it possible to influence the instability of the predator-prey oscillatory process by adjusting the delay time and at the same time to determine the parameters that affect the stability margin.

Authors and Affiliations

Herman Shuklin, Oleh Barabash

Keywords

Related Articles

FEATURES OF QUASICOGERENT SIGNAL PROCESSING IN FREQUENCY MANIPULATION TELECOMMUNICATIONS

The paper represents the principles of analytical description the formation of signals frequency manipulation in telecommunication systems. The peculiarities of quasi-coherent processing of signals of frequency manipulat...

ANALYSIS OF CONDITIONS OF RADIO WAVES PROPAGATION FOR 4G AND 5G TECHNOLOGIES

Impact of the radio waves propagation environment on durability of radio signals which are used in 4G and 5G technologies was analyzed. The of main radio-physical phenomena which take and place at passing of broadband su...

FEATURES OF THE USE OF LINUX OPERATING SYSTEM IN COMPUTER SYSTEMS

This article provides materials that demonstrate the extensive use of Linux in the life of the world society and the rating score of Linux distributions by well-known global companies. Linux, as it is well known, is form...

INVESTIGATION OF PECULIARITIES OF RANGE ALGORITHMS AND DETERMINING OPPORTUNITIES FOR USE IN NGN NETWORKS

The basic properties of ranks and rank statistics are analyzed. The property of invariance of ranks on the example of a harmonic signal with a random initial phase is considered. An example of signal ranking is considere...

OPERATOR MODEL OF THE ANALYSIS PROCESS AND MANAGEMENT BY SLOW STRUCTURED SITUATION IN SOCIO-TECHNICAL SYSTEMS

Based on the study of probable events of the analysis process and the management of a weakly structured situation in social and technical systems, the algorithm of the activity for analysis processing and process managem...

Download PDF file
  • EP ID EP468562
  • DOI -
  • Views 99
  • Downloads 0

How To Cite

Herman Shuklin, Oleh Barabash (2018). METHOD FOR CONSTRUCTING A STABILIZATION FUNCTION FOR MANAGING CYBERSECURITY ON THE BASIS OF THE MATHEMATICAL MODEL OF OSCILLATIONS UNDER THE ACTION OF FORCES WITH A DELAY. Телекомунікаційні та інформаційні технології, 123(2), 110-116. https://europub.co.uk/articles/-A-468562