Identification of Subscriber Terminals of Infocommunication Networks based on the Model of Forming Images in Modern Computer Systems

Q3 Mathematics SPIIRAS Proceedings Pub Date : 2020-04-23 DOI:10.15622/sp.2020.19.2.8
K. Sazonov, M. Tatarka, A. Tsyganov, Vitaliy Bessolcev
{"title":"Identification of Subscriber Terminals of Infocommunication Networks based on the Model of Forming Images in Modern Computer Systems","authors":"K. Sazonov, M. Tatarka, A. Tsyganov, Vitaliy Bessolcev","doi":"10.15622/sp.2020.19.2.8","DOIUrl":null,"url":null,"abstract":"One of the important tasks of such theories as theories of pattern recognition and the theory of information security, is the task of identifying terminals of information and telecommunication networks. \nThe relevance of the topic is due to the need to study methods for identifying computer network terminals and build information security systems based on the knowledge gained. \nThe main parameters that allow uniquely identifying subscriber terminals in the network are address-switching information, as well as a number of parameters characterizing the software and hardware of the computer system. Based on the obtained parameters, digital fingerprints of subscriber terminals are generated. \nThe using anonymous networks by users of subscriber terminals and blocking of the methods of generating and collecting digital fingerprint parameters, does not allow to achieve the required degree of identification reliability in some cases. \nBased on the peculiarities of digital image formation in modern computer systems, many transformation parameters make impact on the output graphic primitive, thereby forming a digital fingerprint of the subscriber terminal, which depends on the placement of samples in a pixel, the algorithms used to calculate the degree of pixels influence, and also the procedures used of smoothing images in the graphics subsystem. \nIn this paper an original model of image formation by means of a subscriber terminal web browser that allows to increase the degree of reliability of identification under conditions of anonymization of users of information and telecommunication networks is propesed. \nFeatures of the digital images formation in the graphic subsystems of modern computer systems are substantiated. These features allow identification under a priori uncertainty regarding the modes and parameters of information transfer.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"34 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2020-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"SPIIRAS Proceedings","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.15622/sp.2020.19.2.8","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Mathematics","Score":null,"Total":0}
引用次数: 0

Abstract

One of the important tasks of such theories as theories of pattern recognition and the theory of information security, is the task of identifying terminals of information and telecommunication networks. The relevance of the topic is due to the need to study methods for identifying computer network terminals and build information security systems based on the knowledge gained. The main parameters that allow uniquely identifying subscriber terminals in the network are address-switching information, as well as a number of parameters characterizing the software and hardware of the computer system. Based on the obtained parameters, digital fingerprints of subscriber terminals are generated. The using anonymous networks by users of subscriber terminals and blocking of the methods of generating and collecting digital fingerprint parameters, does not allow to achieve the required degree of identification reliability in some cases. Based on the peculiarities of digital image formation in modern computer systems, many transformation parameters make impact on the output graphic primitive, thereby forming a digital fingerprint of the subscriber terminal, which depends on the placement of samples in a pixel, the algorithms used to calculate the degree of pixels influence, and also the procedures used of smoothing images in the graphics subsystem. In this paper an original model of image formation by means of a subscriber terminal web browser that allows to increase the degree of reliability of identification under conditions of anonymization of users of information and telecommunication networks is propesed. Features of the digital images formation in the graphic subsystems of modern computer systems are substantiated. These features allow identification under a priori uncertainty regarding the modes and parameters of information transfer.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于现代计算机系统图像形成模型的信息通信网络用户终端识别
模式识别理论、信息安全理论等理论的重要任务之一是对信息通信网络的终端进行识别。本课题的相关性是由于需要研究识别计算机网络终端的方法,并根据所获得的知识构建信息安全系统。允许在网络中唯一标识用户终端的主要参数是地址交换信息,以及表征计算机系统的软件和硬件的一些参数。根据获取的参数,生成用户终端的数字指纹。用户终端用户使用匿名网络并阻断数字指纹参数生成和采集的方法,在某些情况下不能达到所要求的识别可靠性程度。基于现代计算机系统中数字图像形成的特点,许多变换参数对输出的图形原语产生影响,从而形成用户终端的数字指纹,这取决于采样在像素中的位置、像素影响程度的计算算法以及图形子系统中对图像进行平滑处理的程序。本文提出了一种基于用户终端web浏览器的图像生成模型,该模型可以在信息和电信网络用户匿名化的条件下提高识别的可靠性。论述了现代计算机系统图形子系统中数字图像形成的特点。这些特征允许在先验不确定性下对信息传递的模式和参数进行识别。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
SPIIRAS Proceedings
SPIIRAS Proceedings Mathematics-Applied Mathematics
CiteScore
1.90
自引率
0.00%
发文量
0
审稿时长
14 weeks
期刊介绍: The SPIIRAS Proceedings journal publishes scientific, scientific-educational, scientific-popular papers relating to computer science, automation, applied mathematics, interdisciplinary research, as well as information technology, the theoretical foundations of computer science (such as mathematical and related to other scientific disciplines), information security and information protection, decision making and artificial intelligence, mathematical modeling, informatization.
期刊最新文献
Applied Aspects of Optimization of Orbital Structures of Satellite Systems by Specifying Parameters of Orbital Motion Mathematical Modeling of Optimal Measures to Counter Economic Sanctions Methodology for Development of Event-driven Software Systems using CIAO Specification Language Complex of Models for Network Security Assessment of Industrial Automated Control Systems Automated Search for Locations of Detention Groups to Reduce Security Activity Risk
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1