SECURITY MODEL DISSEMINATION OF FORBIDDEN INFORMATION IN INFORMATION AND TELECOMMUNICATION NETWORKS

Author:

Lienkov S.V.1,Dzhulij V.M.2,Selyukov A.V.,Orlenko V.S.2,Atamaniuk A.V.

Affiliation:

1. Taras Shevchenko National University of Kyiv

2. Khmelnytskyi National University

Abstract

The article proposes an approach to defining a security model for the dissemination of prohibited information in information and telecommunication networks. The most effective prediction of the spread of the prohibited information threat is carried out by modeling this process. Information and telecommunication networks are large-scale networks with an ever-growing number of subscribers. With the rapid growth in the number of ITKS users, there are problems of information security and information protection in them. The analysis of information security problems proved that apart from the problems associated with the use of the global Internet as a distributed information and telecommunication system, it is well known and can be solved, there is a poorly studied problem of prohibited content. Creation of models and algorithms for the spread of the threat of prohibited information is one of the key approaches to solving this problem. The analysis of publications on this topic shows that existing solutions are ineffective. Usually, when modeling the propagation of a threat of prohibited information, the ITKS topology (the network model is a fully connected graph) is not taken into account. When modeling the threat of the spread of prohibited information, it is important to have a topology that reflects the structure of connections in a real network, as well as to use an adequate model of information interaction between nodes. Another important problem is the large-scale ITCS, which makes it difficult to obtain data from the simulation model in a reasonable time. The solution to this problem is to create an analytical model of the threat of the spread of prohibited information in the ITCS. An algorithm has been developed for the implementation of TSPI (threat of the spread of prohibited information) in the ITKS, based on the nature of the processes occurring in real conditions. The simulation model of TSPI in ITKS has been proposed, which takes into account the topological characteristics of the network, as well as the features of information interaction of subscribers as man-machine systems. With its help, experiments have been carried out, the results of which have shown the dependence of the implementation of the RFID on the topological vulnerability of the network. An analytical model of the TSPI has been developed, taking into account the topological vulnerability of the network. The relevance of the results of the analytical solution was confirmed by a series of experiments on the topology of a real network using simulation modeling. In this case, the error for the protection process was no more than 10%, for the attack process - no more than 15%.

Publisher

Taras Shevchenko National University of Kyiv

Subject

General Earth and Planetary Sciences,General Environmental Science

Reference19 articles.

1. Kryminalʹnyy kodeks Ukrayiny vid [The Crimean Code of Ukraine from] 05.04.2001 No2341-III. Data onovlennya: 25.09.2020. URL: http://zakon2.rada.gov.ua/laws/show/2341-14/page(data zvernennya: 02.09.2020).

2. Pro informatsiyu : Zakon Ukrayiny vid [About information : Law of Ukraine from] 02.10.1992 No2657-XII. Data onovlennya: 16.07.2020. URL: http://zakon2.rada.gov.ua/laws/main/2657-12(data zvernennya: 02.09.2020).

3. Pro naukovo-tekhnichnu informatsiyu : Zakon Ukrayiny vid [About scientific and technical information : Law of Ukraine from] 25.06.1993 No 3322-ХІІ. Data onovlennya: 19.04.2014. URL: http://zakon5.rada.gov.ua/laws/main/3322-12(data zvernennya: 02.09.2020).

4. Pro zakhyst informatsiyi v informatsiyno-telekomunikatsiynykh systemakh : Zakon Ukrayiny vid [On information protection in information and telecommunication systems : Law of Ukraine from] 05.07.1994 No 80/94-VR. Data onovlennya: 04.07.2020. URL: http://zakon5.rada.gov.ua/laws/show/80/94-вр(data zvernennya: 02.09.2020).

5. Pro elektronni dovirchi posluhy : Zakon Ukrayiny vid [About electronic trust services : Law of Ukraine from] 05.10.2017 No 2155-VIII. Data onovlennya: 13.02.2020. URL: https://zakon.rada.gov.ua/laws/show/2155-19#Text(data zvernennya: 02.09.2020).

Cited by 4 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. INFORMATION AND ANALYTICAL FORECASTING SYSTEMS INFORMATION SECURITY VULNERABILITIES AND THREATS;Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University;2023

2. METHOD OF FORECASTING INFORMATION SECURITY VULNERABILITIES BASED ON DATA ANALYSIS OF THEMATIC INTERNET RESOURCES;Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University;2023

3. METHOD OF COUNTERACTION AND DETECTION OF HARMFUL INFORMATION IN SOCIAL NETWORKS;Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University;2022

4. STUDY OF PROBLEMS OF CONSTRUCTION OF SAFE SENSOR NETWORKS;Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University;2022

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3