Abstract
Background. Humanity has entered the era of information value. An era in which information becomes a more important resource than other resources. Therefore, access to information, especially to conference information, especially to information that contains the main competitive advantages, is the primary task of competitive intelligence. Obtaining such information is most often associated with breaking the law and using special technical means. Complex data breaches can now be resolved at a faster pace, but tech intelligence professionals can use new ways to penetrate your system to steal valuable information and cause irreparable damage. Methods. The work examines the methods of detecting dangerous radio signals, which can be signals from radio jamming devices. An improved method of detecting radio signals is proposed, the improvement is based on the use of topological identification of threats. The method is based on the fact that the object of information activity must be divided into fractals, that is, areas of self similarity. Areas of self-similarity are determined by the physical properties of radio signals. In addition to the fractal dimension, in order to significantly increase the probability of detecting dangerous radio signals, introduce the appropriate fractal measures as the identification of radio signals. Fractal measures additionally allow you to determine the zones in which dangerous radio signals are detected. By setting the appropriate reference values of the relevant parameters of radio signals, it is possible to determine the fractal dimensions through the Hurst index and, depending on the obtained dimension value, it is possible to identify dangerous radio signals, signals of radio interceptor devices or other information capture devices that are installed at the facility with conference information. The use of the proposed method allows to increase the efficiency of detection of signals of radio interceptor devices and, in case of detection of such signals, to block the channel of information leakage. Results. According to research by analysts, 76% of international companies and government institutions have encountered industrial intelligence. With the help of technical means, 80-90% of the necessary information is extracted. In this regard, keeping commercially important information secret allows us to successfully compete in the market for production and sales of goods and services. The attacker uses technical means to gain access to commercial information. One of the types of technical means is a radio device. For the transmission of information, a transmission channel of the received information is created. Therefore, the issue of identifying and blocking information leakage channels is very important. Conclusions. It is proved that using the methods of fractal geometry, it is possible to divide the object of information activity into fractals, into areas of self-similarity. The criteria by which these areas are determined are determined by the physical principles of embedded devices. By setting the corresponding reference values of the corresponding parameters, it is possible to determine the fractal dimensions through the Hurst index.
Publisher
Taras Shevchenko National University of Kyiv
Reference6 articles.
1. Barabash, O., Lukova-Chuiko, N., Sobchuk, V., & Musienko, A. (2018). Application of petri networks for support of functional stability of information systems. IEEE 1st International Conference on System Analysis and Intelligent Computing, SAIC 2018 - Proceedings, 2018, https: // doi.org/10.1109/ SAIC.2018.8516747.
2. Kozachok, V. (2017). Peculiarities of identification and authorization in modern corporate information and telecommunication systems. Modern information protection, 2(30), 42-48 [in Ukrainian].
3. Improvement of variational-gradient method in dynamical systems of automated control for integro-differential models;Mashkov;Mathematical Modeling and Computing vol,2019
4. Sobchuk, V. (2018). Approximate Homogenized Synthesis for Distributed Optimal Control Problem with Superposition Type Cost Functional. Statistics Optimal Information Computer, 6, 233-239.
5. Sobchuk, V., Barabash, О., Kopiika, О., Zamrii, І., & Musienko, A. (2019). Modern Mathematics and Mechanics: Fundamentals, Problems and Challenges. Fraktal & Differential Properties of the Inversor of Digits of Q_s-Representation of Real Number. Springer.