scholarly journals Methods of synthesis and formation of a system of nonlinear discrete signals for modern information and communication systems

Radiotekhnika ◽  
2020 ◽  
pp. 126-132
Author(s):  
I.D. Gorbenko ◽  
A.A. Zamula ◽  
Ho Tri Luc

The paper presents the results of solving the urgent problem of improving the performance indicators of information and communication systems (ICS), in particular, information security, noise immunity, secrecy, the speed of formation and processing of information. The use of the distributed spectrum technology (broadband noise-like signals) is a promising direction for ensuring the security of information resources. The methods used for data formation and processing, as well as the classes of broadband signals used as physical data carriers, do not allow providing the necessary (especially for critical infrastructure facilities) indicators of information security and noise immunity. In this case, as discrete sequences (DS) that expand the spectrum (manipulate the carrier frequency), should be used DS based on nonlinear construction rules and having improved correlation, ensemble and structural properties. Methods for the synthesis and formation of nonlinear discrete complex signals, namely, the so-called cryptographic signals, are proposed. The first method, presented in the article, uses random (pseudo-random) processes. Another method is based on the implementation of the operation of decimation of the original discrete sequence of symbols obtained from the results of the implementation of the first method; it provides the synthesis of an ensemble of signals for a certain signal duration. Analytical expressions are obtained for determining the synthesis time of an ensemble of signals using the proposed methods. It is shown that the speed of the signal generation method based on the decimation operation for a certain signal duration is more than three orders of magnitude higher than the speed of the method based on the random (pseudo-random) processes used. At the same time, based on the carried out computer simulation, it is shown that the signals obtained using the proposed methods have identical correlation, ensemble, and structural properties.

Radiotekhnika ◽  
2021 ◽  
pp. 25-32
Author(s):  
I.D. Gorbenko ◽  
A.A. Zamula

Methods for information exchange, formation and processing of data used in information and communication systems (ICS), as well as classes of broadband signals used as a physical data carrier, do not provide the necessary (for individual ICS applications) indicators of cyber and information security, noise immunity of reception signals and secrecy of IKS functioning. Most of the existing systems use signals, the construction of which is based on linear laws, which allows an attacker, based on the establishment of the parameters of the signals used in the system, to carry out deliberate interference in the operation of the ICS with minimal energy consumption. The article presents conceptual approaches to the construction of secure ICS, which determine the need to cover the entire spectrum of information transformations in the complex, and based on the synthesis of signal systems with improved ensemble, correlation, structural properties. A method is proposed for synthesizing discrete derivatives of signals based on nonlinear discrete complex cryptographic signals (CS) and orthogonal signals formed on the basis of the rows of the Hadamard matrix (initial signals),. Based on computer modeling and the performed calculations, it is shown that the derivative signals formed on the basis of cryptographic sequences and rows of the Hadamard matrix have improved properties compared to orthogonal and linear classes of signals. Approaches to the construction are stated and a general characteristic of the hardware-software complex for synthesis, analysis, study of properties, generation, processing of a number of studied signal classes is given. It is shown that the use of such signals will improve such indicators of the system functioning as information security, noise immunity of signal reception and secrecy of functioning.


Radiotekhnika ◽  
2021 ◽  
pp. 24-29
Author(s):  
I.D. Gorbenko ◽  
O.V. Potii ◽  
A.A. Zamula

The use of broadband signals (BSS) makes it possible to increase the noise immunity of information and communication systems (ICS) when exposed to structural (mutual) and organized interference. The real noise immunity will be lower than the potential one. The reason for the decrease in noise immunity, when entering synchronism and when distinguishing signals, is the presence of side peaks of the correlation functions. Proceeding from this, the NLS used in ICS should have such correlation properties when the side peaks of the NLS CF are as small as possible, i.e. ideally should tend to zero. In this case, it is necessary to determine the influence of side peaks on the characteristics of signal detection, measure their parameters, distinguish signals, and find the conditions for obtaining small side peaks. The problem of synthesizing a class of signals with given correlation, ensemble and structural properties, as well as properties of "blurring" in correlation characteristics, is formulated and solved in general form. The specified property ("fuzziness") means that increasing or decreasing the length of the discrete signal does not change the correlation properties of the discrete sequence on the basis of which the signal is synthesized. The use of many of these signal systems in modern information and communication systems will improve the performance indicators of such systems, first of all, noise immunity, secrecy, information security, noise immunity of signal reception.


Author(s):  
Suchinthi Fernando

This chapter discusses the importance of information security education for everyone, ranging from organizations to professionals and students, all the way through to individual users of information and communication systems. It discusses the different subject areas in information security and shows how instead of being intimidated by it, different categories of users can obtain varying depths of information security education based on their cyber-activities and need for knowledge. Information security professionals would require an in-depth knowledge in all aspects of information security, and information technology professionals and students would require an overall education in these areas, while most users of information and communication systems would only require a basic education to help protect their information assets in cyberspace.


2020 ◽  
Vol 72 (4) ◽  
pp. 162-167
Author(s):  
S.A. Аdiljanova ◽  
◽  
G.A. Тulepberdinova ◽  
M.J. Sakypbekova ◽  
N.A. Тekesbayeva ◽  
...  

The article discusses the possibility of modifying the genetic algorithm (GA) to solve the problems of selection, optimization and management of the dynamic configuration of information security means for the security chain of information and communication systems (ICS). The scientific novelty of the work lies in the fact that GA recommends using the total cost of information loss risks, as well as cost indicators for each class of information security systems as a criterion for optimizing the composition of the information security system. The genetic algorithm is considered as a kind of problem associated with multiple choice when optimizing the choice of information content of information security and solving problems of dynamic management of cybersecurity resources. In this concept, the optimization of the placement of the information security system along the security chain is considered as a modification of the combined backpack problem. The proposed approach allows not only to quickly calculate various versions of software and hardware information systems and their combinations for ICS, but also to dynamically manage the proposed algorithm with existing models and algorithms to optimize the composition of ICS cybersecurity chains and cybersecurity resources of various information objects. It is possible that such a combination of models and algorithms will quickly restore ICS protection by configuring profiles in accordance with the classes of new threats and cyber attacks.


2022 ◽  
pp. 50-72
Author(s):  
Suchinthi Fernando

This chapter discusses the importance of information security education for everyone, ranging from organizations to professionals and students, all the way through to individual users of information and communication systems. It discusses the different subject areas in information security and shows how instead of being intimidated by it, different categories of users can obtain varying depths of information security education based on their cyber-activities and need for knowledge. Information security professionals would require an in-depth knowledge in all aspects of information security, and information technology professionals and students would require an overall education in these areas, while most users of information and communication systems would only require a basic education to help protect their information assets in cyberspace.


2019 ◽  
Vol 30 ◽  
pp. 04018
Author(s):  
Maria Maslova

In the modern world there is a constant growth of information and information technologies, a risk-oriented approach to managing information security of information and communication systems of companies seems increasingly promising. But apart from development, there are threats and risks that affect both the image and the financial component of companies. Therefore, one of the main tasks is to assess, analyze and prevent the risks of information security in information communication systems using modern methods in conjunction with the use of intelligent analysis methods.


Author(s):  
Albert Malikov ◽  
Vladimir Avramenko ◽  
Igor Saenko

Introduction: Models and methods for diagnosing computer incidents recorded in information and communication systems are the most important components in mathematical support of information security systems. The main requirement for the diagnostics is prompt identification of security violation characteristics. This problem is complicated due to the amount and variability of the initial data on information security violation. Purpose: Development of a model for diagnosing a computer incident, along with a method which would allow you to quickly determine the characteristics of a security violation. Results: Security breach characteristics important for making a decision about responding to an identified computer incident can be determined via deep artificial neural networks. A structural feature of the proposed deep artificial neural network is combining the coding part of the autoencoder and a multilayer perceptron. In addition, the method implements a parallel mode of processing information events which have occurred in the information and communication system before the incident was detected, by using a separate proposed artificial neural network for each secondary characteristic of the security breach. The method of determining the values of these secondary characteristics allows you to greatly improve the diagnostics efficiency, having acceptable values of precision and recall for the security violation characteristics to determine. The dependence has been studied of the completeness and classification accuracy on the number of neurons in the hidden layer. A sufficient number of neurons in the hidden layer for achieving the required training efficiency is experimentally determined. Practical relevance: The developed model and method can be implemented using standard software and hardware (servers) of an information and communication system. Their combined use with the existing models and methods of monitoring and diagnostics can significantly improve the efficiency of an information security system.


Author(s):  
Anca Gabriela Petrescu ◽  
Marius Petrescu ◽  
Ioana Panagore ◽  
Florentina Raluca Bîlcan

During the last period, information and communication systems became an essential component of our society that, at its turn, became more and more dependent on these infrastructures. At the same time, these systems are undergoing a convergence and interconnection process which, besides its benefits come to raise specific threats to their users' interests. Due to the high level of interconnectivity, it is essential that all members of the cyber community to be aware of their responsibilities in information security. Rising awareness is the first step towards a more trustful and credible communication information environment that is a pre-requisite of the information society. This chapter demonstrates, on the one hand, how Romanian organizations are able to optimize their information security risk in order to streamline their activities and, on the other hand, how security mechanisms have to be properly designed and commensurate with the specific threats for the specific types of information.


Author(s):  
Alexander Zamula ◽  
Ivan Gorbenko

The paper presents the theoretical foundations of synthesis and analysis of complex nonlinear discrete cryptographic signals, the basis for the synthesis of which are random (pseudo-random) processes, including algorithms for cryptographic transformation of information, as well as methods for optimizing the synthesis of these signals using decimation and discrete programming. namely, the method of branches and boundaries. In order to improve the performance of signal generation and processing, estimates of the effectiveness of the decimation procedure are proposed and presented. It is shown that the use of the studied signal systems will improve the efficiency of modern ICS (speed of data generation and processing devices, noise immunity, information security, secrecy, protection against input (imposition) of false messages, message falsification, data integrity, etc.).


Sign in / Sign up

Export Citation Format

Share Document