scholarly journals Identification of Subscriber Terminals of Infocommunication Networks based on the Model of Forming Images in Modern Computer Systems

2020 ◽  
Vol 19 (2) ◽  
pp. 446-474
Author(s):  
Konstantin Sazonov ◽  
Maxim Tatarka ◽  
Andrey Tsyganov ◽  
Vitaliy Bessolcev

One of the important tasks of such theories as theories of pattern recognition and the theory of information security, is the task of identifying terminals of information and telecommunication networks. The relevance of the topic is due to the need to study methods for identifying computer network terminals and build information security systems based on the knowledge gained. The main parameters that allow uniquely identifying subscriber terminals in the network are address-switching information, as well as a number of parameters characterizing the software and hardware of the computer system. Based on the obtained parameters, digital fingerprints of subscriber terminals are generated. The using anonymous networks by users of subscriber terminals and blocking of the methods of generating and collecting digital fingerprint parameters, does not allow to achieve the required degree of identification reliability in some cases. Based on the peculiarities of digital image formation in modern computer systems, many transformation parameters make impact on the output graphic primitive, thereby forming a digital fingerprint of the subscriber terminal, which depends on the placement of samples in a pixel, the algorithms used to calculate the degree of pixels influence, and also the procedures used of smoothing images in the graphics subsystem. In this paper an original model of image formation by means of a subscriber terminal web browser that allows to increase the degree of reliability of identification under conditions of anonymization of users of information and telecommunication networks is propesed. Features of the digital images formation in the graphic subsystems of modern computer systems are substantiated. These features allow identification under a priori uncertainty regarding the modes and parameters of information transfer.

2014 ◽  
Vol 496-500 ◽  
pp. 2162-2165
Author(s):  
Zhen Lu ◽  
Zhen Xiong ◽  
Ke Qin Tu

The modern computer network has been everywhere in our daily life and working. People obtain information from a computer network or use it to improve working efficiency. The computer network becomes more and more important. The information security decides the long-term stable application of the network. Actually, information security receives various security threats during the practical application. If we cannot support effective, reasonable, and comprehensive protection strategy on time, computer network information or data will be stolen and destroyed. This article analyzes and researches various security loopholes that aiming at computer network information security, and provides related protection strategy.


Author(s):  
Alina Hlushko ◽  
Alina Yanko

The problem of increasing the level of information security of the national economy is actualized in the article. Scientific approaches to the concept of "information security of the national economy" are systematized. The dual impact of digitization on the emergence of opportunities and threats to the functioning of the national economy is substantiated, which necessitates the development of tools to improve the level of reliability of economic information. The state of information security in modern computer systems of economic data processing is analyzed; requirements and directions of development of highly reliable computer systems for processing of economic data are substantiated. New scientific and scientific and technical achievements in the field of developing an optimal data backup in the economic sphere were obtained with the use of the non-positioned numerical system in residual classes, which improves the security and reliability of information processing.


Author(s):  
Valerii Zadiraka ◽  
Inna Shvidchenko

Introduction. When solving problems of transcomputational complexity, the problem of evaluating the rounding error is relevant, since it can be dominant in evaluating the accuracy of solving the problem. The ways to reduce it are important, as are the reserves for optimizing the algorithms for solving the problem in terms of accuracy. In this case, you need to take into account the rounding-off rules and calculation modes. The article shows how the estimates of the rounding error can be used in modern computer technologies for solving problems of computational, applied mathematics, as well as information security. The purpose of the article is to draw the attention of the specialists in computational and applied mathematics to the need to take into account the rounding error when analyzing the quality of the approximate solution of problems. This is important for mathematical modeling problems, problems using Bigdata, digital signal and image processing, cybersecurity, and many others. The article demonstrates specific estimates of the rounding error for solving a number of problems: estimating the mathematical expectation, calculating the discrete Fourier transform, using multi-digit arithmetic and using the estimates of the rounding error in algorithms for solving computer steganography problems. The results. The estimates of the rounding error of the algorithms for solving the above-mentioned classes of problems are given for different rounding-off rules and for different calculation modes. For the problem of constructing computer steganography, the use of the estimates of the rounding error in computer technologies for solving problems of hidden information transfer is shown. Conclusions. Taking into account the rounding error is an important factor in assessing the accuracy of the approximate solution of problems of the complexity above average. Keywords: rounding error, computer technology, discrete Fourier transform, multi-digit arithmetic, computer steganography.


Author(s):  
Viacheslav Politanskyi ◽  
Dmytro Lukianov ◽  
Hanna Ponomarova ◽  
Oleh Gyliaka

The article examines the characteristics of the functioning of information security in the e-government system, a phenomenon that is only possible based on the development of the information security infrastructure. The authors analyze information security as a key element of the concept of e-government, as well as various interpretations and ways of explaining the concept of information security. The research team's approach to the definition of the concept of information security is formed from the deep understanding of this concept, in terms of general theoretical analysis. Topics, objects, functions, types, principles, forms, levels of provision and structural elements of information security are studied. It is concluded that the organization of modern computer security of the State is undoubtedly a complex, systemic and multilevel phenomenon, whose state, dynamics, and perspectives are directly influenced by many external and internal factors, the most important being the political situation. In the world the presence of possible external and internal threats; state and level of development of information and communication of the country and internal political situation, among other aspects.


Sign in / Sign up

Export Citation Format

Share Document