scholarly journals Evaluation of firewall performance when ranging a filtration rule set

Author(s):  
Anatoly Y. Botvinko ◽  
Konstantin E. Samouylov

This article is a continuation of a number of works devoted to evaluation of probabilistic-temporal characteristics of firewalls when ranging a filtration rule set. This work considers a problem of the decrease in the information flow filtering efficiency. The problem emerged due to the use of a sequential scheme for checking the compliance of packets with the rules, as well as due to heterogeneity and variability of network traffic. The order of rules is non-optimal, and this, in the high-dimensional list, significantly influences the firewall performance and also may cause a considerable time delay and variation in values of packet service time, which is essentially important for the stable functioning of multimedia protocols. One of the ways to prevent decrease in the performance is to range a rule set according to the characteristics of the incoming information flows. In this work, the problems to be solved are: determination and analysis of an average filtering time for the traffic of main transmitting networks; and assessing the effectiveness of ranging the rules. A method for ranging a filtration rule set is proposed, and a queuing system with a complex request service discipline is built. A certain order is used to describe how requests are processed in the system. This order includes the execution of operations with incoming packets and the logical structure of filtration rule set. These are the elements of information flow processing in the firewall. Such level of detailing is not complete, but it is sufficient for creating a model. The QS characteristics are obtained with the help of simulation modelling methods in the Simulink environment of the matrix computing system MATLAB. Based on the analysis of the results obtained, we made conclusions about the possibility of increasing the firewall performance by ranging the filtration rules for those traffic scripts that are close to real ones.

2021 ◽  
Vol 54 (4) ◽  
pp. 1-39
Author(s):  
Wei Hu ◽  
Armaiti Ardeshiricham ◽  
Ryan Kastner

Information flow tracking (IFT) is a fundamental computer security technique used to understand how information moves through a computing system. Hardware IFT techniques specifically target security vulnerabilities related to the design, verification, testing, manufacturing, and deployment of hardware circuits. Hardware IFT can detect unintentional design flaws, malicious circuit modifications, timing side channels, access control violations, and other insecure hardware behaviors. This article surveys the area of hardware IFT. We start with a discussion on the basics of IFT, whose foundations were introduced by Denning in the 1970s. Building upon this, we develop a taxonomy for hardware IFT. We use this to classify and differentiate hardware IFT tools and techniques. Finally, we discuss the challenges yet to be resolved. The survey shows that hardware IFT provides a powerful technique for identifying hardware security vulnerabilities, as well as verifying and enforcing hardware security properties.


2021 ◽  
Author(s):  
Julya Zuenkova ◽  
◽  
Dmitry Kicha

Patient routing is a key tool for ensuring the availability and quality of cancer care, ensuring early detection of pathology and timely treatment. Mathematical and simulation modeling methods allow to predict the bottlenecks of patient flows and plan the optimal distribution of healthcare resources. Goal to optimize patients’ pathways for oncology care using the simulation modelling methods. Materials and methods Patient routing was presented in the logic of discrete events, the average resource utilization, the patient’s stay time were described, the bottlenecks of the system were determined. Simulation modeling methods were used to build the optimal organization of oncology care services in the region. Results The average waiting time at the pre-hospital stage was 10 days, the average hospitalization time for X-ray therapy was 24 bed days, the throughput of the X-ray therapy room was 6 patients per week, the average duration of the X-ray therapy session per patient was 10 minutes. With the help of simulation modeling methods, a multimodal system of oncodermatology care was created and put into practice, which allowed to reduce the patient’s waiting time for treatment to 0.7 days, increasing the throughput of the entire system.


2019 ◽  
Vol 16 (2) ◽  
pp. 507-511
Author(s):  
C. Kotteeswaran ◽  
V. Khanaa ◽  
A. Rajesh

The problem of bio molecular computing has been well studied and there are number of approaches discussed for the detection of false gene sequences. However, they suffer to achieve higher performance in the detection of false sequences. To improve the performance of detection of fake molecular patterns, an pattern based approach is discussed in this paper. As of the biomolecular strings a set of patterns, the method first identifies the list of sequences available and based on the set of patterns being maintained, the method identifies the list of patterns present in the gene sequence. Based on the sequences, the method identifies the incomplete and fake sequences and performs insertion and deletion using matrix operations. The method maintains number of patterns for the matrix insertion and deletion operation. For each pattern available, the method compute the bio molecular sequence weight. Finally a single sequence has been selected and based on the selected pattern, the method performs insertion and deletion operation. The proposed method produces efficient results on the detection as well as correction.


2020 ◽  
pp. 0021955X2096632
Author(s):  
Anna Hössinger-Kalteis ◽  
Martin Reiter ◽  
Michael Jerabek ◽  
Zoltán Major

Cellular materials, especially foams, are widely used in several applications because of their special mechanical, electrical and thermal properties. Their properties are determined by three factors: bulk material properties, cell topology and shape as well as relative density. The bulk material properties include the mechanical, thermal and electrical properties of the matrix. The cell topology determines if the foam exhibits stretch or bending dominated behaviour. The relative density corresponds to the foaming degree. It is defined by the cell edge length and cell wall thickness. Especially for the linear elastic properties there are many different modelling approaches. In general, these methods can be divided into two groups namely direct modelling, e.g. analytical and finite element models and constitutive modelling, e.g. models which are generated through homogenization methods. This paper presents an overview of the different modelling methods for foams. Furthermore, sensitivity studies are presented which enable the comparison of the models with regard to the estimation of the elastic properties, show the limits of those models and enable the investigation of the influence of the above mentioned factors on the elastic properties. Selected models are validated with experimental data of a low density foam regarding the Young’s modulus.


2012 ◽  
Vol 190-191 ◽  
pp. 360-363
Author(s):  
Xiao Yuan Qu ◽  
Feng Zhang ◽  
Hui Feng Xue

Analyzed integrated logical structure of the cloud, back-end cloud computing systems, tens of thousands of servers, how to organize such a large number of servers is the cloud computing system efficient and stable operation of one of the key issues. We surveyed the requirement of cloud computing networking. Analyzed the architecture of cloud computing networking topology, and thought that the networking topology should be composed of two parts the center switch trunk and some tree shape branch subnet. Then we proposed the Self Adaptive Algorithm for the center swish trunk’s topology design based on the graph theory, optimization theory and classic greedy algorithm. Finally we do some experiments and comparison to verify the algorithm’s usability and advantages.


2018 ◽  
Vol 45 (1) ◽  
pp. 7-23 ◽  
Author(s):  
Ivetta Afanasieva ◽  
Andrii Galkin

The modern person in an era of information breakthrough faces the problem of choosing and processing information coming to her. Human activities in the systems "driver – vehicle - road - environment" - not an exception. The role and importance of information in all spheres of human activity have increased significantly. The paper aims to find and assess the patterns of information flow impact on the driver performance in the "driver - vehicle - road - environment" system. Electrophysiological methods, such as electroencephalography (EEG) and electrocardiography (ECG), are used to study the influence of input information on the work of the brain and driver's heart in laboratory and on-site conditions. Using mathematical modelling methods and methods, mathematical models of EEG and ECG parameters influence on the time of distraction from execution by the driver of the main activity were obtained. The practical significance of obtained results is the possibility to use them in coordinating the location of advertising structures and organizing the work of drivers while driving a vehicle.


2021 ◽  
Vol 12 (4) ◽  
pp. 96-107
Author(s):  
Vitaliy Chubaievskyi ◽  
Valerii Lakhno ◽  
Olena Kryvoruchko ◽  
Dmytro Kasatkin ◽  
Alona Desiatko ◽  
...  

The article analyzes publications on the evaluation of investments in information security (IS) of objects of informatization (OBI). The possibility and necessity of obtaining the necessary data have been substantiated, contributing to a reliable assessment of the effectiveness of measures aimed at increasing the company’s IS. In the study process, the modelling methods have been used. A methodology is proposed for calculating indicators from investment activities in the context of increasing IS metrics of OBI. A specific example of such simulation is described. The proposed methodology provides an assessment of the damage prevention from a cyber-attack. The amount of the damage prevention from a cyber-attack is taken as a basic indicator for calculating the economic effect of investing in information security tools (IST). The performed simulation modelling allowed taking into account the relative uncertainty of the real situation with IS of OBI. The conducted study will help practitioners in the field of IS to obtain informed decisions to increase the efficiency of investment projects in the field of IS for OBI, using the approach outlined in the study. Unlike the existing ones, the proposed methodology takes into account both direct and indirect factors of investment projects in the field of IS of OBI


Biomolecules ◽  
2021 ◽  
Vol 11 (12) ◽  
pp. 1797
Author(s):  
Shaoxia Xu ◽  
Yuan Liu ◽  
Shihua Zhou ◽  
Qiang Zhang ◽  
Nikola K. Kasabov

Numerical computation is a focus of DNA computing, and matrix operations are among the most basic and frequently used operations in numerical computation. As an important computing tool, matrix operations are often used to deal with intensive computing tasks. During calculation, the speed and accuracy of matrix operations directly affect the performance of the entire computing system. Therefore, it is important to find a way to perform matrix calculations that can ensure the speed of calculations and improve the accuracy. This paper proposes a DNA matrix operation method based on the mechanism of the DNAzyme binding to auxiliary strands to cleave the substrate. In this mechanism, the DNAzyme binding substrate requires the connection of two auxiliary strands. Without any of the two auxiliary strands, the DNAzyme does not cleave the substrate. Based on this mechanism, the multiplication operation of two matrices is realized; the two types of auxiliary strands are used as elements of the two matrices, to participate in the operation, and then are combined with the DNAzyme to cut the substrate and output the result of the matrix operation. This research provides a new method of matrix operations and provides ideas for more complex computing systems.


Sign in / Sign up

Export Citation Format

Share Document