IMPROVING THE METHOD OF DETECTING RADIO SIGNALS USING TOPOLOGICAL THREAT IDENTIFICATION

Author:

,Tolіupa SerhiiORCID,Laptiev SerhiiORCID,

Abstract

Background. Humanity has entered the era of information value. An era in which information becomes a more important resource than other resources. Therefore, access to information, especially to conference information, especially to information that contains the main competitive advantages, is the primary task of competitive intelligence. Obtaining such information is most often associated with breaking the law and using special technical means. Complex data breaches can now be resolved at a faster pace, but tech intelligence professionals can use new ways to penetrate your system to steal valuable information and cause irreparable damage. Methods. The work examines the methods of detecting dangerous radio signals, which can be signals from radio jamming devices. An improved method of detecting radio signals is proposed, the improvement is based on the use of topological identification of threats. The method is based on the fact that the object of information activity must be divided into fractals, that is, areas of self similarity. Areas of self-similarity are determined by the physical properties of radio signals. In addition to the fractal dimension, in order to significantly increase the probability of detecting dangerous radio signals, introduce the appropriate fractal measures as the identification of radio signals. Fractal measures additionally allow you to determine the zones in which dangerous radio signals are detected. By setting the appropriate reference values of the relevant parameters of radio signals, it is possible to determine the fractal dimensions through the Hurst index and, depending on the obtained dimension value, it is possible to identify dangerous radio signals, signals of radio interceptor devices or other information capture devices that are installed at the facility with conference information. The use of the proposed method allows to increase the efficiency of detection of signals of radio interceptor devices and, in case of detection of such signals, to block the channel of information leakage. Results. According to research by analysts, 76% of international companies and government institutions have encountered industrial intelligence. With the help of technical means, 80-90% of the necessary information is extracted. In this regard, keeping commercially important information secret allows us to successfully compete in the market for production and sales of goods and services. The attacker uses technical means to gain access to commercial information. One of the types of technical means is a radio device. For the transmission of information, a transmission channel of the received information is created. Therefore, the issue of identifying and blocking information leakage channels is very important. Conclusions. It is proved that using the methods of fractal geometry, it is possible to divide the object of information activity into fractals, into areas of self-similarity. The criteria by which these areas are determined are determined by the physical principles of embedded devices. By setting the corresponding reference values of the corresponding parameters, it is possible to determine the fractal dimensions through the Hurst index.

Publisher

Taras Shevchenko National University of Kyiv

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3