NETWORK VIROLOGY: PREDICTION AND REGULATION OF MULTIVIRUS EPIDEMIC PROCESSES

Author(s):  
Александр Григорьевич Остапенко ◽  
Евгений Валерьевич Зарочинцев ◽  
Ольга Александровна Остапенко ◽  
Ксения Владимировна Сибирко ◽  
Виктория Витальевна Сафронова ◽  
...  

Целью исследований является повышение защищённости распределенных компьютерных сетей за счет формализации поливирусных эпидемических процессов в них на основе специально созданного методического поливирусного обеспечения оценки и регулирования рисков. В работе продемонстрированы поливирусные модели, позволяющие моделировать поливирусное воздействие на компьютерную сеть. При помощи представленных моделей было произведено моделирование поливирусного воздействия на сетевую структуру. Полученные результаты могут быть использованы исследователями в области моделирования эпидемических процессов, данные модели позволят более точно и качественно оценивать протекание поливирусных эпидемических процессов в распределённых компьютерных сетях, а также специалистами по защите информации при разработке мер противодействия распространения компьютерных вирусов и реализовать задел к рассмотрению скоростных и качественных особенностей протекания поливирусных эпидемических процессов в компьютерных сетях. The purpose of the research is to increase the security of distributed computer networks by formalizing the multivirus epidemic processes in them on the basis of a specially created methodological multivirus support for risk assessment and management. The work demonstrates polyviral models that allow simulating a polyviral effect on a computer network. The presented models were used to simulate the polyviral effect on the network structure. The results obtained can be used by researchers in the field of modeling epidemic processes, these models will allow for a more accurate and high-quality assessment of the course of polyviral epidemic processes in distributed computer networks, as well as information security specialists in the development of measures to counter the spread of computer viruses, and features of the course of polyviral epidemic processes in computer networks.

2018 ◽  
Vol 1 (1) ◽  
Author(s):  
Long Chen

With the development of society, we have entered the information age.Computer network technology is widely used in people’s life and production, and has played an important role in promoting social progress. However, due to its own nature and characteristics, some security risks have appeared in the process of application in the development of computer network technology, which interferes with the safe use of computer networks. This article combines the information security risk of computer network, making an analysis of the information security architecture of computer network based on WPDRRC model, and the strategy of how to prevent computer network security risk.


Author(s):  
Uri Blumenthal ◽  
Joshua Haines ◽  
William Streilein ◽  
Gerald O’Leary

Situational awareness – the perception of “what is going on” – is crucial in every field of human endeavor, especially so in the cyber world where most of the protections afforded by physical time and distance are taken away. Since ancient times, military science emphasized the importance of preserving your awareness of the battlefield and at the same time preventing your adversary from learning the true situation for as long as possible. Today cyber is officially recognized as a contested military domain like air, land, and sea. Therefore situational awareness in computer networks will be under attacks of military strength and will require military-grade protection. This chapter describes the emerging threats for computer SA, and the potential avenues of defense against them.


Symmetry ◽  
2019 ◽  
Vol 11 (12) ◽  
pp. 1506 ◽  
Author(s):  
Aleksey Novokhrestov ◽  
Anton Konev ◽  
Alexander Shelupanov

This article highlights the issue of identifying information security threats to computer networks. The aim of the study is to increase the number of identified threats. Firstly, it was carried out the analysis of computer network models used to identify threats, as well as in approaches to building computer network threat models. The shortcomings that need to be corrected are highlighted. On the basis of the mathematical apparatus of attributive metagraphs, a computer network model is developed that allows to describe the software components of computer networks and all possible connections between them. On the basis of elementary operations on metagraphs, a model of threats to the security of computer network software is developed, which allows compiling lists of threats to the integrity and confidentiality of computer network software. These lists include more threats in comparison with the considered analogues.


2014 ◽  
Vol 687-691 ◽  
pp. 1806-1809
Author(s):  
Kai Zhang ◽  
Liang Zhao ◽  
Hai Qing Cao

Network not only brings people convenience, but also becomes a hotbed for breeding crime. And it not only brings people efficiency, but also opens a new criminal platform for the computer network criminals. This paper analyzes the performance form and main features of computer networks crime and proposes several control measures based on their form and features.


2017 ◽  
Author(s):  
Andysah Putera Utama Siahaan

Computer viruses are a nightmare for the computer world. It is a threat to any user who uses a computer network. The computer will not be infected by a virus if the computer is not connected to the outside world. In this case, this is the internet. The Internet can be used as a medium for the spread of the virus to the fullest. There are many types of viruses that are spread through the internet. Some of them are aimed at making money, and there are only as a disrupt activity and computer performance. Some techniques are done to prevent the spread of the virus. Here will be explained how to tackle the virus optimally. The benefit is that the computer used will be free from virus attacks and safe to exchange data publicly. Techniques used include the prevention and prevention of viruses against computer networks are to know the characteristics and workings of the virus.


2014 ◽  
Vol 31 (06) ◽  
pp. 1450049
Author(s):  
Shin-Guang Chen

Computer networks are important infrastructures required by many modern corporations today. Maintaining a reliable computer network becomes an important issue in daily business operations. A computer network usually consists of components (including links or vertices) that may have several states due to failure, partial failure or maintenance, making it a multi-state computer network (MCN). This paper proposes a novel approach to create an optimal component quality plan in MCN. Finding the optimal component quality plan for an MCN requires searching for an optimal plan such that each component in the network has the proper level of quality while the network maintains highly reliable functionality. Because the costs of quality components are diversified, an appropriate plan for component quality distribution cannot only greatly reduce the cost of network installation but also maintain the network reliability. Another important consideration is that high-quality and expensive components may not increase network reliability if they are not placed appropriately. A novel heuristic approach is proposed to efficiently search for such plan. A comparison with the implicit enumeration method is conducted. The results show that the proposed approach is very effective and efficient. Some numerical examples are illustrated and explained in detail in this paper.


Sign in / Sign up

Export Citation Format

Share Document