scholarly journals SECURITY MODEL DISSEMINATION OF FORBIDDEN INFORMATION IN INFORMATION AND TELECOMMUNICATION NETWORKS

Author(s):  
S.V. Lienkov ◽  
V.M. Dzhulij ◽  
A.V. Selyukov ◽  
V.S. Orlenko ◽  
A.V. Atamaniuk

The article proposes an approach to defining a security model for the dissemination of prohibited information in information and telecommunication networks. The most effective prediction of the spread of the prohibited information threat is carried out by modeling this process. Information and telecommunication networks are large-scale networks with an ever-growing number of subscribers. With the rapid growth in the number of ITKS users, there are problems of information security and information protection in them. The analysis of information security problems proved that apart from the problems associated with the use of the global Internet as a distributed information and telecommunication system, it is well known and can be solved, there is a poorly studied problem of prohibited content. Creation of models and algorithms for the spread of the threat of prohibited information is one of the key approaches to solving this problem. The analysis of publications on this topic shows that existing solutions are ineffective. Usually, when modeling the propagation of a threat of prohibited information, the ITKS topology (the network model is a fully connected graph) is not taken into account. When modeling the threat of the spread of prohibited information, it is important to have a topology that reflects the structure of connections in a real network, as well as to use an adequate model of information interaction between nodes. Another important problem is the large-scale ITCS, which makes it difficult to obtain data from the simulation model in a reasonable time. The solution to this problem is to create an analytical model of the threat of the spread of prohibited information in the ITCS. An algorithm has been developed for the implementation of TSPI (threat of the spread of prohibited information) in the ITKS, based on the nature of the processes occurring in real conditions. The simulation model of TSPI in ITKS has been proposed, which takes into account the topological characteristics of the network, as well as the features of information interaction of subscribers as man-machine systems. With its help, experiments have been carried out, the results of which have shown the dependence of the implementation of the RFID on the topological vulnerability of the network. An analytical model of the TSPI has been developed, taking into account the topological vulnerability of the network. The relevance of the results of the analytical solution was confirmed by a series of experiments on the topology of a real network using simulation modeling. In this case, the error for the protection process was no more than 10%, for the attack process - no more than 15%.

Energies ◽  
2021 ◽  
Vol 14 (10) ◽  
pp. 2833
Author(s):  
Paolo Civiero ◽  
Jordi Pascual ◽  
Joaquim Arcas Abella ◽  
Ander Bilbao Figuero ◽  
Jaume Salom

In this paper, we provide a view of the ongoing PEDRERA project, whose main scope is to design a district simulation model able to set and analyze a reliable prediction of potential business scenarios on large scale retrofitting actions, and to evaluate the overall co-benefits resulting from the renovation process of a cluster of buildings. According to this purpose and to a Positive Energy Districts (PEDs) approach, the model combines systemized data—at both building and district scale—from multiple sources and domains. A sensitive analysis of 200 scenarios provided a quick perception on how results will change once inputs are defined, and how attended results will answer to stakeholders’ requirements. In order to enable a clever input analysis and to appraise wide-ranging ranks of Key Performance Indicators (KPIs) suited to each stakeholder and design phase targets, the model is currently under the implementation in the urbanZEB tool’s web platform.


Author(s):  
Yancheng Li ◽  
Jianchun Li

This paper presents a recent research breakthrough on the development of a novel adaptive seismic isolation system as the quest for seismic protection for civil structures, utilizing the field-dependent property of the magnetorheological elastomer (MRE). A highly-adjustable MRE base isolator was developed as the key element to form smart seismic isolation system. The novel isolator contains unique laminated structure of steel and MRE layers, which enable its large-scale civil engineering applications, and a solenoid to provide sufficient and uniform magnetic field for energizing the field-dependent property of MR elastomers. With the controllable shear modulus/damping of the MR elastomer, the developed adaptive base isolator possesses a controllable lateral stiffness while maintaining adequate vertical loading capacity. Experimental results show that the prototypical MRE base isolator provides amazing increase of lateral stiffness up to 1630%. Such range of increase of the controllable stiffness of the base isolator makes it highly practical for developing new adaptive base isolation system utilizing either semi-active or smart passive controls. To facilitate the structural control development using the adaptive MRE base isolator, an analytical model was developed to stimulate its behaviors. Comparison between the analytical model and experimental data proves the effectiveness of such model in reproducing the behavior of MRE base isolator, including the observed strain stiffening effect.


Author(s):  
András Varga ◽  
Ahmet Y. Şekercioğlu Şekercioğlu

This paper reports a new parallel and distributed simulation architecture for OMNeT++, an open-source discrete event simulation environment. The primary application area of OMNeT++ is the simulation of communication networks. Support for a conservative PDES protocol (the Null Message Algorithm) and the relatively novel Ideal Simulation Protocol has been implemented.Placeholder modules, a novel way of distributing the model over several logical processes (LPs) is presented. The OMNeT++ PDES implementation has a modular and extensible architecture, allowing new synchronization protocols and new communication mechanisms to be added easily, which makes it an attractive platform for PDES research, too. We intend touse this framework to harness the computational capacity of highperformance cluster computersfor modeling very large scale telecommunication networks to investigate protocol performance and rare event failure scenarios.


2006 ◽  
Vol 3 (3) ◽  
pp. 819-857
Author(s):  
N. B. Yenigül ◽  
A.T. Hendsbergen ◽  
A. M. M. Elfeki ◽  
F. M. Dekking

Abstract. Contaminant leaks released from landfills are a significant threat to groundwater quality. The groundwater detection monitoring systems installed in the vicinity of such facilities are vital. In this study the detection probability of a contaminant plume released from a landfill has been investigated by means of both a simulation and an analytical model for both homogeneous and heterogeneous aquifer conditions. The results of the two models are compared for homogeneous aquifer conditions to illustrate the errors that might be encountered with the simulation model. For heterogeneous aquifer conditions contaminant transport is modelled by an analytical model using effective (macro) dispersivities. The results of the analysis show that the simulation model gives the concentration values correctly over most of the plume length for homogeneous aquifer conditions, and that the detection probability of a contaminant plume at given monitoring well locations match quite well. For heterogeneous aquifer conditions the approximating analytical model based on effective (macro) dispersivities yields the average concentration distribution satisfactorily. However, it is insufficient in monitoring system design since the discrepancy between the detection probabilities of contaminant plumes at given monitoring well locations computed by the two models is significant, particularly with high dispersivity and heterogeneity.


2007 ◽  
Vol 17 (1) ◽  
pp. 135-144 ◽  
Author(s):  
Milan Markovic ◽  
Milos Ivic ◽  
Norbert Pavlovic ◽  
Sladjana Jankovic

In this paper the idea of treating the operational service workers as the elements of technique systems is suggested and the renewal theory is used to forecast the number of accidents caused by human factor. The analytical model is presented and limitations for its application are quoted. Furthermore, the simulation model is developed and the conditions for its use are given. The model observes each worker separately and establishes the exact time of arisen failures, the number of failures at some moment t, time tn, to the nth failure, inconsistency of failure number and total number of failures of the observed population. The model is tested on the sample of 348 engine drivers in PE "Serbian Railways" who have made at leas one accident, in order to research the parameters necessary for using the renewal theory and simulation. .


Author(s):  
Mykola Ryzhkov ◽  
Anastasiia Siabro

Achievements in the sphere of automatization and telecommunication are an essential component of transformation of the international peace and security system. This article presents, that consequences of changes are of a dual character. On the one hand, new technologies are becoming an important component of society modernization strategies in developing countries, on the other hand, they can be used for armament modernization or creation of new means of confrontation in modern international relations. APR countries face the most relevant issue of information technologies usage. The article deals with the process of discussion of new challenges and threats to international security, emerging as a result of development and large-scale implementation of information-communication technologies. Positions of states regarding the adoption of resolution in the sphere of international information security were studied through examples of Japan, India, and China. It is proved in the article, that information technologies have become an important component of the security system in the world. Technologies usage may lead to steady international development as well as to information arms race. That is why working out a common position on international information security issues is of crucial importance. It is within the framework of the UN, that different states of the world are given an opportunity to express their visions of the problem of international information security and work out common approaches to its solution. The article shows, that states’ positions have similar as well as different features. For instance, all states express concern regarding possible limitation of technology transfer for the establishment of a more controlled international political environment. But states’ positions have major differences as to mechanisms of information security provision. Thus, Japan and India strive to achieve a balanced system of international information security, which should at the same time have preventive mechanisms against the emergence of threats in the information and science and technology spheres and guarantee continuation of scientific-technological development, which is a crucial component of development and modernization strategies in many countries of the world. China came forward with position of strong regulation of international information security issues and suggested framing of corresponding regulations of the states’ conduct in the cyberspace.


2022 ◽  
Vol 1 (13) ◽  
pp. 80-92
Author(s):  
Nguyễn Mạnh Thiên ◽  
Phạm Đăng Khoa ◽  
Nguyễn Đức Vượng ◽  
Nguyễn Việt Hùng

Tóm tắt—Hiện nay, nhiệm vụ đánh giá an toàn thông tin cho các hệ thống thông tin có ý nghĩa quan trọng trong đảm bảo an toàn thông tin. Đánh giá/khai thác lỗ hổng bảo mật cần được thực hiện thường xuyên và ở nhiều cấp độ khác nhau đối với các hệ thống thông tin. Tuy nhiên, nhiệm vụ này đang gặp nhiều khó khăn trong triển khai diện rộng do thiếu hụt đội ngũ chuyên gia kiểm thử chất lượng ở các cấp độ khác nhau. Trong khuôn khổ bài báo này, chúng tôi trình bày nghiên cứu phát triển Framework có khả năng tự động trinh sát thông tin và tự động lựa chọn các mã để tiến hành khai thác mục tiêu dựa trên công nghệ học tăng cường (Reinforcement Learning). Bên cạnh đó Framework còn có khả năng cập nhật nhanh các phương pháp khai thác lỗ hổng bảo mật mới, hỗ trợ tốt cho các cán bộ phụ trách hệ thống thông tin nhưng không phải là chuyên gia bảo mật có thể tự động đánh giá hệ thống của mình, nhằm giảm thiểu nguy cơ từ các cuộc tấn công mạng. Abstract—Currently, security assessment is one of the most important proplem in information security. Vulnerability assessment/exploitation should be performed regularly with different levels of complexity for each information system. However, this task is facing many difficulties in large-scale deployment due to the lack of experienced testing experts. In this paper, we proposed a Framework that can automatically gather information and automatically select suitable module to exploit the target based on reinforcement learning technology. Furthermore, our framework has intergrated many scanning tools, exploited tools that help pentesters doing their work. It also can be easily updated new vulnerabilities exploit techniques.


Sign in / Sign up

Export Citation Format

Share Document