scholarly journals Comparative analysis of the effectiveness of existing methods of networks security from DDoS attacks

2020 ◽  
Vol 30 (3) ◽  
pp. 67-74
Author(s):  
N. V. Evglevskaya ◽  
A. Yu. Zuev ◽  
A. O. Karasenko ◽  
O. S. Lauta

At present, issues related to information security are highly relevant. DoS and DDoS attacks are carried out by cybercriminals quite often, because cyberattacks can bring almost any system to failure, leaving no legally significant evidence. At the same time, the failure of the attacked subsystem can be an intermediate stage towards the target system. The most vulnerable to DDoS attacks are online stores, online payment systems, news resources and companies, whose activities depend on the frequency of user access to the resource. The main methods of protection against cyberattacks and DDoS attacks, in particular, are currently antivirus programs and firewalls. The article presents a description of some types of DDoS attacks as well as the results of a comparative analysis of several existing methods of networks security from DDoS attacks, which will simplify the choice of the optimal solution to ensure reliable protection of a telecommunication facility. Considering all the advantages and disadvantages, the method of organizing a network protection system against DDoS attacks based on the technology of artificial neural networks is the most suitable solution for ensuring the information security of networks of various purpose.

2021 ◽  
Vol 2021 (3) ◽  
Author(s):  
Dragan Paunović ◽  

A modern rotating 3D surveillance radars scan azimuth by mechanical rotation, and scan elevation using Active Electronic Scanning Array (AESA) in Multi Beam Receive Mode (MBM). Radars with fixed cylindrical AESA and four-sided prismatic antenna, with 4 flat AESA, scan azimuth electronically, without mechanical rotation. The most significant advantage of electronic scanning is the possibility of Multi-mode operation: surveillance targets in the far zone and targeting targets in the near zone. However, electronic scanning also brings problems. A main beam of planar AESA spreads and lateral lobes increase when the radiating direction increases. An original arrangement of shifted array to reduce lateral lobes has been proposed. The cylindrical array has a constant shape of pattern during azimuth scanning. But, for both prismatic and cylindrical AESA, the beam deforms during scanning in vertical plane, so limits the elevation scan. Also, the complexity and price of fixed AESA is significantly higher compared to the rotating one. In order to enable the selection of the optimal solution for a specific application, the comparative analysis of advantages and disadvantages for cylindrical, prismatic and rotating AESA is done. The original configuration of the cylindrical AESA for Very Fast Scanning in Near-zone has been proposed.


2021 ◽  
Vol 1 (13) ◽  
pp. 81-91
Author(s):  
Valerii Lakhno ◽  
Borys Husiev ◽  
Victor Smolii ◽  
Andrii Blozva ◽  
Dmytro Kasatkin ◽  
...  

Approaches to the application of methods of system analysis to solve problems related to information security of enterprises in transport, which have a complex IT structure with a large number of components. It is shown that the active expansion of the areas of informatization of the transport industry, especially in the segment of mobile, distributed and wireless technologies, is accompanied by the emergence of new threats to information security. It is shown that in order to build an effective information security system, the selection and implementation of adequate technical means of protection should be preceded by a stage of description, analysis and modeling of threats, vulnerabilities, followed by calculation of risks for IS and determining the optimal strategy for information security system. After evaluating the different NIB options according to several criteria, a decision is made: if the recommendations coincide, the optimal solution is chosen with greater confidence. If there is a contradiction of recommendations, the final decision is made taking into account its advantages and disadvantages, for example, the strategy of information security system development is chosen, which turned out to be optimal for at least two criteria. If different NIB development strategies are obtained for all three criteria, it is necessary to vary the values of pessimism-optimism in the Hurwitz criterion or change the data, for example, about possible threats to IP or automated enterprise management system. An algorithm for modeling the decision-making process for selecting the optimal strategy for managing investment design components of the information security system for the transport business entity is proposed.


2021 ◽  
Vol 12 (4) ◽  
pp. 51-60
Author(s):  
Valerii Lakhno ◽  
Borys Husiev ◽  
Victor Smolii ◽  
Andrii Blozva ◽  
Dmytro Kasatkin ◽  
...  

Approaches to the application of methods of system analysis to solve problems related to information security of enterprises in transport, which have a complex IT structure with a large number of components. It is shown that the active expansion of the areas of informatization of the transport industry, especially in the segment of mobile, distributed and wireless technologies, is accompanied by the emergence of new threats to information security. It is shown that in order to build an effective information security system, the selection and implementation of adequate technical means of protection should be preceded by a stage of description, analysis and modeling of threats, vulnerabilities, followed by calculation of risks for IS and determining the optimal strategy for information security system. After evaluating the different NIB options according to several criteria, a decision is made: if the recommendations coincide, the optimal solution is chosen with greater confidence. If there is a contradiction of recommendations, the final decision is made taking into account its advantages and disadvantages, for example, the strategy of information security system development is chosen, which turned out to be optimal for at least two criteria. If different NIB development strategies are obtained for all three criteria, it is necessary to vary the values of pessimism-optimism in the Hurwitz criterion or change the data, for example, about possible threats to IP or automated enterprise management system. An algorithm for modeling the decision-making process for selecting the optimal strategy for managing investment design components of the information security system for the transport business entity is proposed


Author(s):  
Eko Handoyo

Information technology is a very important part of the organization. IT is expected to provide a good profit for the company. However, as technology evolves, it is often exploited by some irresponsible parties that can lead to the emergence of threats and risks from the use of technology. The organization needs to measure the level of information security to identify the system's weaknesses and threats to the organization. Standards for measuring information security are COBIT 5 subdomain manage security services (DSS05) and NIST SP 800-55 revision 1. This study is comparing the two standards. Comparative analysis uses qualitative analysis based on three aspects in information security that are confidentiality, integrity, and availability. Based on the analysis result obtained the advantages and disadvantages of each standard.


Author(s):  
Yuliia Nehoda

The subject of the research – is a set of organizational-economic relations arising in the process of structural transformation of financial and credit relations in the agricultural business. The purpose of the article is a retrospective analysis of structural transformations of financial and credit relations in the agricultural business, evaluation of the effectiveness and feasibility of the introduction of agricultural receipts as a new instrument of lending to the agricultural business of the regions. Methodology of work – system-structural and comparative analyzes (to determine the effectiveness of the crediting mechanism according to the agricultural receipts of the farmers of the region); monographic (when studying the problems of the functioning of the mechanism of lending to agrarians by agrarian receipts) economic analysis (when carrying out a comparative analysis of the mechanism of classical bank lending to the agrarian business and the mechanism of lending to agrarians according to agrarian receipts); modeling and forecasting (when determining ways to overcome the existing deficiencies in the mechanism of lending to agrarian business entities of the region according to agrarian receipts). The results of the work – a retrospective analysis of the structural transformation of financial and credit relations in the agricultural business was carried out. The mechanism of crediting agrarians according to agrarian receipts and the scale of its distribution in the agrarian business of the region are considered. A comparative analysis of the mechanism of classical bank lending to the agrarian business and the mechanism of lending to agrarians according to agrarian receipts was carried out. In the framework of the pilot project “Agrarian receipts in Ukraine” of the international financial corporation (IFC) in partnership with the Swiss Confederation in Ukraine, the example of the Poltava region defined the effectiveness of the crediting mechanism according to the agrarian receipts of the agrarians of the region. The advantages and disadvantages of the mechanism of crediting the subjects of the agrarian business on agrarian receipts are noted. The ways to overcome the existing shortcomings of the mechanism of crediting the subjects of the agrarian business of the region according to agricultural receipts are determined. Conclusions – according to the results of the conducted research, the effectiveness of the mechanism of lending to the agricultural business of the regions according to agricultural receipts was proved, its advantages and disadvantages were noted, and attention was also focused. Proposed in Art. 7 of Law No. 5479-VI clearly delineate cases and restrictions on the debtor’s reimbursement of expenses incurred by the lender with the acquisition of the right to grow and harvest the pledged crop of agricultural products, which will ensure the principle of equality of parties on economic benefits and distribution of credit risks according to agricultural receipts.


2020 ◽  
pp. 29-45
Author(s):  
O.A. Naydis ◽  
I.O. Naydis

The article considers the types, forms, mechanisms and classification of mergers and acquisitions, identifies their positive effects, and studies the tactics of acquisitions. The analysis of anti-capture measures: active and preventive methods of protection against hostile mergers and acquisitions. A comparative analysis of anti-capture measures with acquisitions tactics was carried out, the advantages and disadvantages of their application were identified.


Author(s):  
A.I. Glushchenko ◽  
M.Yu. Serov

В статье рассматривается вопрос совершенствования системы управления параллельно-работающими насосными агрегатами с целью повышения энергоэффективности их работы. Проведено сравнение и выявление недостатков существующих методов решения рассматриваемой проблемы. Предложена идея нового подхода на базе онлайн оптимизации. The problem under consideration is improvement of the energy efficiency of a control system of parallel-running pump units. Known methods used to solve this problem are considered. Their advantages and disadvantages are shown. Finally, the idea of a new approach, which is based on online optimization, is proposed.


Agronomy ◽  
2021 ◽  
Vol 11 (11) ◽  
pp. 2286
Author(s):  
Xiaoman Cao ◽  
Hansheng Yan ◽  
Zhengyan Huang ◽  
Si Ai ◽  
Yongjun Xu ◽  
...  

Stable, efficient and lossless fruit picking has always been a difficult problem, perplexing the development of fruit automatic picking technology. In order to effectively solve this technical problem, this paper establishes a multi-objective trajectory model of the manipulator and proposes an improved multi-objective particle swarm optimization algorithm (represented as GMOPSO). The algorithm combines the methods of mutation operator, annealing factor and feedback mechanism to improve the diversity of the population on the basis of meeting the stable motion, avoiding the local optimal solution and accelerating the convergence speed. By adopting the average optimal evaluation method, the robot arm motion trajectory has been testified to constructively fulfill the picking standards of stability, efficiency and lossless. The performance of the algorithm is verified by ZDT1~ZDT3 benchmark functions, and its competitive advantages and disadvantages with other multi-objective evolutionary algorithms are further elaborated. In this paper, the algorithm is simulated and verified by practical experiments with the optimization objectives of time, energy consumption and pulsation. The simulation results show that the solution set of the algorithm is close to the real Pareto frontier. The optimal solution obtained by the average optimal evaluation method is as follows: the time is 34.20 s, the energy consumption is 61.89 °/S2 and the pulsation is 72.18 °/S3. The actual test results show that the trajectory can effectively complete fruit picking, the average picking time is 25.5 s, and the success rate is 96.67%. The experimental results show that the trajectory of the manipulator obtained by GMOPSO algorithm can make the manipulator run smoothly and facilitates efficient, stable and nondestructive picking.


Sign in / Sign up

Export Citation Format

Share Document