首页 > 最新文献

Journal of Cyber Security and Mobility最新文献

英文 中文
A Realtime Adaptive Trust Model Based on Artificial Neural Networks for Wireless Sensor Networks 基于人工神经网络的无线传感器网络实时自适应信任模型
Q3 Computer Science Pub Date : 2023-06-30 DOI: 10.13052/jcsm2245-1439.1244
Khaled Hassan, M. Madkour, S. Nouh
Wireless sensor networks (WSNs) are vulnerable to security attacks due to the unbounded nature of the wireless medium, restricted node resources, and cooperative routing. Standard cryptography and authentication mechanisms help protect against external attacks, but a compromised node can easily bypass them. This work aims to protect WSNs against internal attacks, which are mostly launched from compromised nodes to disrupt the network’s operation and/or reduce its performance. The trust and reputation management framework provides a routing cost function for selecting the best secure next hop. Tuning the trust weights is essential to cope with the constant changes in the network environment, such as the sensor nodes’ behaviours and locations. To allow real-time operation, the proposed framework introduces an artificial neural network (ANN) in each sensor node that automatically adjusts the weights of the considered trust metrics according to the WSN state. A large dataset is generated to train and test the ANN using a multitude of simulated cases. A prototype is developed and tested using the J-Sim simulator to show the performance gain resulting from applying the adaptive trust model. The experimental results showed that the adaptive model has robust performance and has achieved an improved packet delivery ratio with reduced power consumption and reduced average packet loss. The results showed that when sensor nodes were static and malicious nodes were present, the average accuracy was 99.6%, while when they were in motion, it was 88.1%.
无线传感器网络由于无线介质的无界性、节点资源的有限性和协同路由等特点,容易受到安全攻击。标准的加密和身份验证机制有助于防止外部攻击,但受损的节点可以很容易地绕过它们。这项工作旨在保护wsn免受内部攻击,这些攻击主要是从受损节点发起的,以破坏网络的运行和/或降低其性能。信任和声誉管理框架提供了选择最佳安全下一跳的路由代价函数。为了适应网络环境的不断变化,如传感器节点的行为和位置,优化信任权值是必要的。为了实现实时操作,该框架在每个传感器节点中引入人工神经网络(ANN),该网络根据WSN的状态自动调整所考虑的信任指标的权重。生成一个大型数据集,使用大量模拟案例来训练和测试人工神经网络。利用J-Sim模拟器开发了一个原型并进行了测试,以展示应用自适应信任模型所带来的性能增益。实验结果表明,该自适应模型具有较好的鲁棒性,在降低功耗和平均丢包率的同时提高了数据包的投递率。结果表明,当传感器节点处于静态且存在恶意节点时,平均准确率为99.6%,而当传感器节点处于运动状态时,平均准确率为88.1%。
{"title":"A Realtime Adaptive Trust Model Based on Artificial Neural Networks for Wireless Sensor Networks","authors":"Khaled Hassan, M. Madkour, S. Nouh","doi":"10.13052/jcsm2245-1439.1244","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1244","url":null,"abstract":"Wireless sensor networks (WSNs) are vulnerable to security attacks due to the unbounded nature of the wireless medium, restricted node resources, and cooperative routing. Standard cryptography and authentication mechanisms help protect against external attacks, but a compromised node can easily bypass them. This work aims to protect WSNs against internal attacks, which are mostly launched from compromised nodes to disrupt the network’s operation and/or reduce its performance. The trust and reputation management framework provides a routing cost function for selecting the best secure next hop. Tuning the trust weights is essential to cope with the constant changes in the network environment, such as the sensor nodes’ behaviours and locations. To allow real-time operation, the proposed framework introduces an artificial neural network (ANN) in each sensor node that automatically adjusts the weights of the considered trust metrics according to the WSN state. A large dataset is generated to train and test the ANN using a multitude of simulated cases. A prototype is developed and tested using the J-Sim simulator to show the performance gain resulting from applying the adaptive trust model. The experimental results showed that the adaptive model has robust performance and has achieved an improved packet delivery ratio with reduced power consumption and reduced average packet loss. The results showed that when sensor nodes were static and malicious nodes were present, the average accuracy was 99.6%, while when they were in motion, it was 88.1%.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"11 1","pages":"519-546"},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88881380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Architectural Framework of Moving Target Defenses Against DDoS Attacks 移动目标防御DDoS攻击的综合体系结构框架
Q3 Computer Science Pub Date : 2023-06-30 DOI: 10.13052/jcsm2245-1439.1248
Belal M. Amro, Saeed Salah, Mohammed Moreb
Distributed Denial-of-Service (DDoS) attacks are among the top toughest security threats in today’s cyberspace. The multitude, diversity, and variety of both the attacks and their countermeasures have the consequence that no optimal solutions exist. However, many mitigation techniques and strategies have been proposed among which is Moving Target Defense (MTD). MTD strategy keeps changing the system states and attack surface dynamically by continually applying various systems reconfigurations aiming at increasing the uncertainty and complexity for attackers. Current proposals of MTD fall into one of three strategies: shuffling, diversity, and redundancy, based on what to move? how to move? and when to move? Despite the existence of such strategies, a comprehensive Framework for MTD techniques against DDoS attacks that can be used for all types of DDoS attacks has not been proposed yet. In this paper, we propose a novel and comprehensive Framework of MTD techniques considering all stages, mechanisms, data sources, and criteria adopted by the research community, the Framework will apply to all DDoS attacks on different systems. To efficiently use our proposed model, a comprehensive taxonomy of MTD mitigation techniques and strategies is also provided and can be used as a reference guide for the best selection of the model’s parameters.
分布式拒绝服务(DDoS)攻击是当今网络空间最严峻的安全威胁之一。攻击及其对策的数量、多样性和多样性导致不存在最优解决方案。然而,人们提出了许多缓解技术和策略,其中包括移动目标防御(MTD)。MTD策略通过不断地应用各种系统重构来动态地改变系统状态和攻击面,从而增加攻击者的不确定性和复杂性。当前的MTD建议分为三种策略之一:洗牌、多样性和冗余,基于什么移动?如何移动?什么时候搬家?尽管存在这样的策略,但针对所有类型的DDoS攻击的MTD技术的综合框架尚未被提出。在本文中,我们提出了一个新颖而全面的MTD技术框架,考虑了研究界采用的所有阶段,机制,数据源和标准,该框架将适用于不同系统上的所有DDoS攻击。为了有效地使用我们提出的模型,还提供了MTD缓解技术和战略的综合分类,可作为最佳选择模型参数的参考指南。
{"title":"A Comprehensive Architectural Framework of Moving Target Defenses Against DDoS Attacks","authors":"Belal M. Amro, Saeed Salah, Mohammed Moreb","doi":"10.13052/jcsm2245-1439.1248","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1248","url":null,"abstract":"Distributed Denial-of-Service (DDoS) attacks are among the top toughest security threats in today’s cyberspace. The multitude, diversity, and variety of both the attacks and their countermeasures have the consequence that no optimal solutions exist. However, many mitigation techniques and strategies have been proposed among which is Moving Target Defense (MTD). MTD strategy keeps changing the system states and attack surface dynamically by continually applying various systems reconfigurations aiming at increasing the uncertainty and complexity for attackers. Current proposals of MTD fall into one of three strategies: shuffling, diversity, and redundancy, based on what to move? how to move? and when to move? Despite the existence of such strategies, a comprehensive Framework for MTD techniques against DDoS attacks that can be used for all types of DDoS attacks has not been proposed yet. In this paper, we propose a novel and comprehensive Framework of MTD techniques considering all stages, mechanisms, data sources, and criteria adopted by the research community, the Framework will apply to all DDoS attacks on different systems. To efficiently use our proposed model, a comprehensive taxonomy of MTD mitigation techniques and strategies is also provided and can be used as a reference guide for the best selection of the model’s parameters.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"23 1","pages":"605-628"},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87938935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wireless Network Safety Status Prediction Based on Fuzzy Logic 基于模糊逻辑的无线网络安全状态预测
Q3 Computer Science Pub Date : 2023-06-30 DOI: 10.13052/jcsm2245-1439.1247
Xiao Xue, Yangbin Zheng, Chao Lu
In WN environment, network safety status means to state of information managing in various WN environments, WN transmission information safety status assessment is one of primary research directions in this territory. Existing network safety status awareness methods are difficult to adapt to real-time changes of network structure, and WN environment is complex and changeable, and they can only analyze the current network safety status, and it is difficult to predict and analyze overall tendency of WN safety status. In order to resist potential attacks, evaluate safety of network and detect attack means in network in a timely manner, this paper introduces fuzzy logic to propose a safety status prediction model for wireless sensor networks, which can help administrators to timely perceive and comprehensively grasp the real-time status of network and predict future advancement direction. In order to assess current network status, a safety status evaluation model for wireless network (WN) depended on fuzzy logic is presented. In cluster head node, neighborhood rough set is used for feature extraction to reduce energy consumption of redundant data on the node. Balance data by synthesizing a few over-sampling techniques, and then use random forest to detect attacks on the network to identify attack types. Combined with the status element acquisition mechanism, three status indicators, namely attack frequency, total number of attacks and threat factor, are extracted. According to the status indicators and status calculation method, the network safety status value is calculated, and current network safety status is evaluated by referring to network safety level divided by National Internet Emergency Response Center. Neighborhood rough set is applied to complete attribute reduction, which can effectively deal with underwater mixed data and obtain feature subsets with same classification capability as initial data. Safety status of WSN is predicted based on random forest. The risk degree of WN status is divided into fuzzy subsets, and the process of dynamic prediction of safety status is designed. Based on test values, highest input signal spectrum of the system is 30 mV, and the lowest input signal spectrum is -15 mV, which is consistent with the selected 120 groups of status data sequence diagram, the fluctuation amplitude of the input signal under 40~62 groups of samples is small, basically unchanged, consistent with the selected 120 groups of status data sequence diagram. Fuzzy logic model represented by star broken line has higher precision than decision tree and the limit learning machine in all five different attack types. mapped network safety status grade can also effectively express the actual network safety status. indicating that the prediction results of the system are accurate.
在无线网络环境下,网络安全状态是指在各种无线网络环境下信息管理的状态,无线网络传输信息安全状态评估是该领域的主要研究方向之一。现有的网络安全状态感知方法难以适应网络结构的实时变化,网络网络环境复杂多变,只能分析当前的网络安全状态,难以预测和分析网络网络安全状态的整体趋势。为了抵御潜在的攻击,及时评估网络的安全性,检测网络中的攻击手段,本文引入模糊逻辑,提出了无线传感器网络的安全状态预测模型,可以帮助管理员及时感知和全面掌握网络的实时状态,预测未来的发展方向。为了对当前网络状态进行评估,提出了一种基于模糊逻辑的无线网络安全状态评估模型。在簇头节点上,采用邻域粗糙集进行特征提取,减少节点上冗余数据的能量消耗。通过综合几种过采样技术平衡数据,然后利用随机森林检测网络上的攻击,识别攻击类型。结合状态元素获取机制,提取攻击频次、攻击总数和威胁因子三个状态指标。根据状态指标和状态计算方法,计算网络安全状态值,参照国家互联网应急响应中心划分的网络安全等级,对当前网络安全状态进行评价。采用邻域粗糙集进行完全属性约简,可以有效地处理水下混合数据,获得与初始数据具有相同分类能力的特征子集。基于随机森林对无线传感器网络的安全状态进行了预测。将WN状态的危险程度划分为模糊子集,设计了安全状态的动态预测过程。从测试值来看,系统的最高输入信号频谱为30 mV,最低输入信号频谱为-15 mV,与所选120组状态数据序列图一致,40~62组样本下输入信号波动幅度较小,基本不变,与所选120组状态数据序列图一致。以星形折线为代表的模糊逻辑模型在五种不同的攻击类型下都比决策树和极限学习机具有更高的精度。映射的网络安全状态等级也能有效地表达实际的网络安全状态。说明系统的预测结果是准确的。
{"title":"Wireless Network Safety Status Prediction Based on Fuzzy Logic","authors":"Xiao Xue, Yangbin Zheng, Chao Lu","doi":"10.13052/jcsm2245-1439.1247","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1247","url":null,"abstract":"In WN environment, network safety status means to state of information managing in various WN environments, WN transmission information safety status assessment is one of primary research directions in this territory. Existing network safety status awareness methods are difficult to adapt to real-time changes of network structure, and WN environment is complex and changeable, and they can only analyze the current network safety status, and it is difficult to predict and analyze overall tendency of WN safety status. In order to resist potential attacks, evaluate safety of network and detect attack means in network in a timely manner, this paper introduces fuzzy logic to propose a safety status prediction model for wireless sensor networks, which can help administrators to timely perceive and comprehensively grasp the real-time status of network and predict future advancement direction. In order to assess current network status, a safety status evaluation model for wireless network (WN) depended on fuzzy logic is presented. In cluster head node, neighborhood rough set is used for feature extraction to reduce energy consumption of redundant data on the node. Balance data by synthesizing a few over-sampling techniques, and then use random forest to detect attacks on the network to identify attack types. Combined with the status element acquisition mechanism, three status indicators, namely attack frequency, total number of attacks and threat factor, are extracted. According to the status indicators and status calculation method, the network safety status value is calculated, and current network safety status is evaluated by referring to network safety level divided by National Internet Emergency Response Center. Neighborhood rough set is applied to complete attribute reduction, which can effectively deal with underwater mixed data and obtain feature subsets with same classification capability as initial data. Safety status of WSN is predicted based on random forest. The risk degree of WN status is divided into fuzzy subsets, and the process of dynamic prediction of safety status is designed. Based on test values, highest input signal spectrum of the system is 30 mV, and the lowest input signal spectrum is -15 mV, which is consistent with the selected 120 groups of status data sequence diagram, the fluctuation amplitude of the input signal under 40~62 groups of samples is small, basically unchanged, consistent with the selected 120 groups of status data sequence diagram. Fuzzy logic model represented by star broken line has higher precision than decision tree and the limit learning machine in all five different attack types. mapped network safety status grade can also effectively express the actual network safety status. indicating that the prediction results of the system are accurate.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"44 1","pages":"589-604"},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76753144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization of LEACH Protocol for WSNs in Terms of Energy Efficient and Network Lifetime 基于能量效率和网络寿命的WSNs LEACH协议优化
Q3 Computer Science Pub Date : 2023-05-18 DOI: 10.13052/jcsm2245-1439.123.2
Fadhil Mohammed Salman, Ahssan Ahmed Mohammed, Ahmed Fakhir Mutar
Wireless Sensor Network (WSN) is a group of small, intelligent sensors with limited resources. WSN has limited energy restrictions, so, the network lifetime is the major challenge that directly affect the efficiency of the network. This work presents an energy-saving clustering hierarchical algorithm for WSNs; it is an improvement of Low-Energy adaptive Clustering Hierarchy (LEACH) algorithm. The aim of this algorithm is to minimize power consumption by the appropriate election of new cluster heads in every data transfer round and avoid network collisions. This goal achieved by using an efficient function to select the best cluster heads nodes in each round, which takes into account the current energy in the sensors. The proposed algorithm improves the cluster formation process by relying on the shorter distance to the base station. The Time Division Multiple Access (TDMA) mechanism also utilized to schedule the transmission of data packets to cluster heads nodes and to avoid data packet collisions at the base station. Experiments conducted in MATLAB R (2020a) software showed that the suggested algorithm extended the network lifetime by 14.5%, and improved the network throughput by 16.8% compared to the LEACH algorithm. That means, the proposed energy-saving clustering hierarchy algorithm has improved the performance of the LEACH algorithm in term of enhancing network lifetime and increasing network throughput.
无线传感器网络(WSN)是一组资源有限的小型智能传感器。无线传感器网络具有有限的能量限制,因此,网络寿命是直接影响网络效率的主要挑战。本文提出了一种节能的wsn聚类分层算法;它是对低能量自适应聚类层次(LEACH)算法的改进。该算法的目标是通过在每轮数据传输中适当选择新的簇头来最小化功耗,并避免网络冲突。这一目标是通过使用一个有效的函数来选择每轮中最佳的簇头节点,该函数考虑了传感器中的当前能量。该算法利用与基站的距离较短,改进了集群的形成过程。时分多址(TDMA)机制还用于调度数据包到集群头节点的传输,并避免基站中的数据包冲突。在MATLAB R (2020a)软件中进行的实验表明,与LEACH算法相比,该算法的网络寿命延长了14.5%,网络吞吐量提高了16.8%。也就是说,本文提出的节能聚类层次算法在提高网络生存期和提高网络吞吐量方面,比LEACH算法有了很大的改进。
{"title":"Optimization of LEACH Protocol for WSNs in Terms of Energy Efficient and Network Lifetime","authors":"Fadhil Mohammed Salman, Ahssan Ahmed Mohammed, Ahmed Fakhir Mutar","doi":"10.13052/jcsm2245-1439.123.2","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.123.2","url":null,"abstract":"Wireless Sensor Network (WSN) is a group of small, intelligent sensors with limited resources. WSN has limited energy restrictions, so, the network lifetime is the major challenge that directly affect the efficiency of the network. This work presents an energy-saving clustering hierarchical algorithm for WSNs; it is an improvement of Low-Energy adaptive Clustering Hierarchy (LEACH) algorithm. The aim of this algorithm is to minimize power consumption by the appropriate election of new cluster heads in every data transfer round and avoid network collisions. This goal achieved by using an efficient function to select the best cluster heads nodes in each round, which takes into account the current energy in the sensors. The proposed algorithm improves the cluster formation process by relying on the shorter distance to the base station. The Time Division Multiple Access (TDMA) mechanism also utilized to schedule the transmission of data packets to cluster heads nodes and to avoid data packet collisions at the base station. Experiments conducted in MATLAB R (2020a) software showed that the suggested algorithm extended the network lifetime by 14.5%, and improved the network throughput by 16.8% compared to the LEACH algorithm. That means, the proposed energy-saving clustering hierarchy algorithm has improved the performance of the LEACH algorithm in term of enhancing network lifetime and increasing network throughput.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"6 1","pages":"275-296"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86863766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Cyber Security Threats of the Printing Enterprise 印刷企业网络安全威胁分析
Q3 Computer Science Pub Date : 2023-05-18 DOI: 10.13052/jcsm2245-1439.123.8
P. Shepita, L. Tupychak, Julia Shepita
The topic of scientific works on the implementation of modern technologies and systems of automated management of the enterprise, its resources and technical means is analyzed, and the insufficient completeness of research on the features of the integrated approach to the design and deployment of innovative means of production order support. Based on the determined factors of the operation of the enterprise in the latest conditions of the fourth industrial revolution, directions for the formation of strategies for the introduction of the elements of Industry 4.0 in modern printing enterprises, as well as information protection systems, are determined with electronic document circulation. The mechanisms of decision of tasks of management informative risks considered in complex control system by printeries in the conditions of vagueness and at co-operation of elements of control system between itself. The necessity of using a web portal for the formation of printing orders is substantiate, the main components are define and the levels of access to them described. The paper examines the use of classic and gray fuzzy cognitive maps to solve the problem of cyber security risk assessment of the intelligent management system of a printing enterprise. It is demonstrate that the average estimate of local risk, which is formed using an ensemble of two heterogeneous fuzzy cognitive maps, decreases compared to the use of individual cognitive maps. In order tî better, highlight the results of the research, an example of the application of the proposed methodology for assessing the risks of ensuring the integrity of telemetric information in the industrial network of the intelligent technological process management system of a printing enterprise given, with the continuity of the technological process of manufacturing printing products. In addition to the classic FCM, the paradigms of two variants of the FCM extension were also use in the study, namely, the gray FCM, which used to solve the problem of assessing cyber security risks of intelligent management systems of printing enterprises. An analysis of the possibility of building FCM ensembles to increase the effectiveness of risk assessment using several options for formalizing the expert’s knowledge and experience performed. A fragment of the enterprise management system was consider and an analysis of possible directions of attacks on the printing enterprise by malicious software was perform. These are attacks such as replacing the executable files of server and ARM software, overwriting PLC projects during system operation, and refusing to service the equipment. Based on the formed list of attack vectors and the consequences of their implementation, the task of analyzing the risks of cyber security of a printing enterprise, taking into account the impact on the system of possible internal threats, was considered, using the cognitive modeling apparatus as a modeling tool. The scenario of cognitive modelin
本课题对企业实施现代自动化管理技术和系统、其资源和技术手段进行了分析,并对集成方法的特点进行了研究,以创新的生产秩序支持手段的设计和部署。根据第四次工业革命最新条件下企业运营的确定因素,确定了在现代印刷企业中引入工业4.0要素的战略形成方向,以及电子文件流通的信息保护系统。研究了印刷企业在控制系统各要素相互协作的模糊条件下,复杂控制系统中管理信息风险任务的决策机制。使用web门户网站形成印刷订单的必要性是有根据的,定义了主要组件,并描述了访问它们的级别。本文研究了利用经典模糊认知图和灰色模糊认知图来解决某印刷企业智能管理系统的网络安全风险评估问题。结果表明,与使用单个认知图相比,使用两个异质模糊认知图集合形成的局部风险平均估计降低。为了更好地突出研究成果,本文以某印刷企业智能工艺流程管理系统工业网络中遥测信息完整性风险评估方法的应用为例,以制造印刷产品的工艺流程的连续性为例。除了经典的FCM之外,本研究还使用了FCM扩展的两种变体范式,即灰色FCM,用于解决印刷企业智能管理系统的网络安全风险评估问题。分析构建FCM集成的可能性,以提高风险评估的有效性,使用几种方案来形式化专家的知识和经验。对企业管理系统的一个片段进行了分析,分析了恶意软件对印刷企业进行攻击的可能方向。这些攻击包括替换服务器和ARM软件的可执行文件、在系统运行期间覆盖PLC项目、拒绝对设备进行维护等。基于形成的攻击向量列表及其实施后果,考虑到可能的内部威胁对系统的影响,使用认知建模设备作为建模工具,考虑了分析印刷企业网络安全风险的任务。考虑了使用FCM构造的给定变体利用控制系统的软件和硬件组件的漏洞的内部犯罪分子的影响的认知建模场景。从目标概念状态评估分散的角度来看,使用认知图集合形成的局部风险平均评估比使用单个fcm更好。综合概念状态估计值的扩散小于使用GFCM的灰色值估计值的扩散,平均为1.4-1.8倍,这表明主观性因素对风险评估结果的影响减小。情景建模表明,使用特定的保护手段和组织措施可以将当地风险评估降低12-18%,这是一个重要指标。该技术允许对风险指标进行定性和定量评估,同时考虑到不确定性的全部客观和主观因素。
{"title":"Analysis of Cyber Security Threats of the Printing Enterprise","authors":"P. Shepita, L. Tupychak, Julia Shepita","doi":"10.13052/jcsm2245-1439.123.8","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.123.8","url":null,"abstract":"The topic of scientific works on the implementation of modern technologies and systems of automated management of the enterprise, its resources and technical means is analyzed, and the insufficient completeness of research on the features of the integrated approach to the design and deployment of innovative means of production order support. Based on the determined factors of the operation of the enterprise in the latest conditions of the fourth industrial revolution, directions for the formation of strategies for the introduction of the elements of Industry 4.0 in modern printing enterprises, as well as information protection systems, are determined with electronic document circulation. The mechanisms of decision of tasks of management informative risks considered in complex control system by printeries in the conditions of vagueness and at co-operation of elements of control system between itself. The necessity of using a web portal for the formation of printing orders is substantiate, the main components are define and the levels of access to them described. The paper examines the use of classic and gray fuzzy cognitive maps to solve the problem of cyber security risk assessment of the intelligent management system of a printing enterprise. It is demonstrate that the average estimate of local risk, which is formed using an ensemble of two heterogeneous fuzzy cognitive maps, decreases compared to the use of individual cognitive maps. In order tî better, highlight the results of the research, an example of the application of the proposed methodology for assessing the risks of ensuring the integrity of telemetric information in the industrial network of the intelligent technological process management system of a printing enterprise given, with the continuity of the technological process of manufacturing printing products. In addition to the classic FCM, the paradigms of two variants of the FCM extension were also use in the study, namely, the gray FCM, which used to solve the problem of assessing cyber security risks of intelligent management systems of printing enterprises. An analysis of the possibility of building FCM ensembles to increase the effectiveness of risk assessment using several options for formalizing the expert’s knowledge and experience performed. A fragment of the enterprise management system was consider and an analysis of possible directions of attacks on the printing enterprise by malicious software was perform. These are attacks such as replacing the executable files of server and ARM software, overwriting PLC projects during system operation, and refusing to service the equipment. Based on the formed list of attack vectors and the consequences of their implementation, the task of analyzing the risks of cyber security of a printing enterprise, taking into account the impact on the system of possible internal threats, was considered, using the cognitive modeling apparatus as a modeling tool. The scenario of cognitive modelin","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"34 1","pages":"415-434"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74171775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-Based Medical Decision Support System 基于区块链的医疗决策支持系统
Q3 Computer Science Pub Date : 2023-05-18 DOI: 10.13052/jcsm2245-1439.123.1
T. Hovorushchenko, Y. Hnatchuk, Vitaliy Osyadlyi, M. Kapustian, A. Boyarchuk
An urgent task at this moment is the use of blockchain technology to ensure the security of medical decision support systems (MDSS). Our research is devoted to development of blockchain-based MDSS (regarding possibility or impossibility of organ and tissue donation/transplantation, regarding possibility or impossibility of using reproductive technologies in the treatment of infertility). The developed blockchain-based medical decision support system provides reliable protection and security of medical information through the use of blockchain technology, provides support of decision regarding possibility or impossibility of organ and tissue donation/transplantation, provides support of decision regarding possibility or impossibility of use of reproductive technologies in the infertility treatment. The proposed blockchain-based medical decision support system: automates medical decision-making processes, minimizes the human factor and its influence on the medical decision process, and takes into account the norms of current legislation when making medical decisions, thereby allowing not to pay for the services of a hired lawyer, and also works with verified and protected medical data entered in the blockchain, which allows you to get rid of leaks of medical information and to ensure reliable protection of medical data.
当前的一项紧迫任务是利用区块链技术确保医疗决策支持系统(MDSS)的安全性。我们的研究致力于开发基于区块链的MDSS(关于器官和组织捐赠/移植的可能性或不可能性,关于使用生殖技术治疗不孕症的可能性或不可能性)。开发的基于区块链的医疗决策支持系统,通过使用区块链技术为医疗信息提供可靠的保护和安全,为器官和组织捐赠/移植的可能性或不可能性提供决策支持,为在不孕症治疗中使用生殖技术的可能性或不可能性提供决策支持。提出的基于区块链的医疗决策支持系统:自动化医疗决策过程,最大限度地减少人为因素及其对医疗决策过程的影响,并在做出医疗决策时考虑现行立法的规范,从而允许不支付聘请律师的服务,并且还使用区块链中输入的经过验证和保护的医疗数据,这可以让您摆脱医疗信息的泄漏,并确保医疗数据的可靠保护。
{"title":"Blockchain-Based Medical Decision Support System","authors":"T. Hovorushchenko, Y. Hnatchuk, Vitaliy Osyadlyi, M. Kapustian, A. Boyarchuk","doi":"10.13052/jcsm2245-1439.123.1","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.123.1","url":null,"abstract":"An urgent task at this moment is the use of blockchain technology to ensure the security of medical decision support systems (MDSS). Our research is devoted to development of blockchain-based MDSS (regarding possibility or impossibility of organ and tissue donation/transplantation, regarding possibility or impossibility of using reproductive technologies in the treatment of infertility). The developed blockchain-based medical decision support system provides reliable protection and security of medical information through the use of blockchain technology, provides support of decision regarding possibility or impossibility of organ and tissue donation/transplantation, provides support of decision regarding possibility or impossibility of use of reproductive technologies in the infertility treatment. The proposed blockchain-based medical decision support system: automates medical decision-making processes, minimizes the human factor and its influence on the medical decision process, and takes into account the norms of current legislation when making medical decisions, thereby allowing not to pay for the services of a hired lawyer, and also works with verified and protected medical data entered in the blockchain, which allows you to get rid of leaks of medical information and to ensure reliable protection of medical data.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"16 1","pages":"253-274"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90152986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Additional Detection of Clones Using Locally Sensitive Hashing 使用局部敏感散列的额外克隆检测
Q3 Computer Science Pub Date : 2023-05-18 DOI: 10.13052/jcsm2245-1439.123.6
Nataliia I. Pravorska
Today, there are many methods for detecting blocks with repetitions and redundancy in the program code. But mostly they turn out to be dependent on the programming language in which the software is developed and try to detect complex types of repeating blocks. Therefore, the goal of the research was to develop a language-independent repetition detector and expand its capabilities. In the development and operation of the language-independent incremental repeater detector, it was decided to conduct experiments for five open source systems for evaluation using the industrial detector SIG (Software Improvement Group), including the use of a tool syntactic analysis. But there was the question of extending the algorithm for additional detection of duplication and redundancy in the code, which was proposed by Hammel, and how improvements can be made to achieve independence from the programming language. Particular attention was paid to the empirical results presented in the original study, as their effectiveness is questionable. The main parameters that were considered when creating the index for LIIRD (Language-independent incremental repeat detector) and its expansion of the LSH (locally sensitive hashing): measuring time, memory and creating an incremental step. Based on the results of experiments conducted by the authors of Hammel’s work, there was a motivation to develop an extended approach. The idea of this approach is that according to the original study, the operation of calculating the entire block index with repeats and redundancy from scratch is very time consuming. Therefore, it is proposed to use LSH to obtain an effective assessment of the similarity of software project files.
目前,有许多方法可以检测程序代码中有重复和冗余的块。但大多数情况下,它们依赖于开发软件的编程语言,并试图检测复杂类型的重复块。因此,本研究的目标是开发一种与语言无关的重复检测器并扩展其功能。在独立于语言的增量中继器检测器的开发和操作中,决定使用工业检测器SIG(软件改进组)对五个开源系统进行实验以进行评估,包括使用语法分析工具。但还有一个问题是,如何扩展算法,以对代码中的重复和冗余进行额外的检测,这是由Hammel提出的,以及如何进行改进以实现与编程语言的独立性。特别注意的是在原始研究中提出的实证结果,因为它们的有效性是值得怀疑的。在为LIIRD(与语言无关的增量重复检测器)创建索引及其对LSH(本地敏感散列)的扩展时,要考虑的主要参数是:测量时间、内存和创建增量步骤。基于哈默尔工作的作者所做的实验结果,有一种动机去开发一种扩展的方法。这种方法的思想是,根据原来的研究,从头开始计算具有重复和冗余的整个块索引的操作非常耗时。因此,提出使用LSH对软件项目文件的相似度进行有效的评估。
{"title":"Additional Detection of Clones Using Locally Sensitive Hashing","authors":"Nataliia I. Pravorska","doi":"10.13052/jcsm2245-1439.123.6","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.123.6","url":null,"abstract":"Today, there are many methods for detecting blocks with repetitions and redundancy in the program code. But mostly they turn out to be dependent on the programming language in which the software is developed and try to detect complex types of repeating blocks. Therefore, the goal of the research was to develop a language-independent repetition detector and expand its capabilities. In the development and operation of the language-independent incremental repeater detector, it was decided to conduct experiments for five open source systems for evaluation using the industrial detector SIG (Software Improvement Group), including the use of a tool syntactic analysis. But there was the question of extending the algorithm for additional detection of duplication and redundancy in the code, which was proposed by Hammel, and how improvements can be made to achieve independence from the programming language. Particular attention was paid to the empirical results presented in the original study, as their effectiveness is questionable. The main parameters that were considered when creating the index for LIIRD (Language-independent incremental repeat detector) and its expansion of the LSH (locally sensitive hashing): measuring time, memory and creating an incremental step. Based on the results of experiments conducted by the authors of Hammel’s work, there was a motivation to develop an extended approach. The idea of this approach is that according to the original study, the operation of calculating the entire block index with repeats and redundancy from scratch is very time consuming. Therefore, it is proposed to use LSH to obtain an effective assessment of the similarity of software project files.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"4 1","pages":"367-388"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90536552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
System-Information and Cognitive Technologies of Man-Made Infrastructure Cyber Security 人工基础设施网络安全的系统信息与认知技术
Q3 Computer Science Pub Date : 2023-05-18 DOI: 10.13052/jcsm2245-1439.123.7
Liubomyr S. Sikora, N. Lysa, Y. Tsikalo, O. Fedevych
The complication of technological processes due to the modernization of complex technological processes aggregates with a distributed spatial infrastructure requires the use of new control systems and computer and information network technologies. Accordingly, this poses the problem of revising the basic concepts of information-measuring systems building, developing software and hardware for the implementation of the target management process. This requires development of new approaches to presentation, processing, and display of data about the aggregates state of energy-active objects and the entire information structure. For management under threat conditions, it is necessary to take into account the features of the information infrastructure, data selection and processing methods, methods and algorithms for classifying the situation, which are formed from blocks of data obtained from each unit and the technological process as a whole.Information about the current state of system and infrastructure is necessary for the formation, adoption and implementation of management decisions which is the basis for coordination strategies synthesis. Appropriate target orientation, reasonable indicators of real process trajectories divergence from the target state determine the probability of object attack. Knowledge and decision-making procedures for the coordination of managerial actions is based on the strategic target orientation of the structure, their professionalism and the level of intellectual, cognitive and scientific training which is the basis for correct situation interpretation of countermeasures against threats formation.In the event of active threats complex on man-made systems in a certain region (resource, cognitive, system, information) and natural disasters or military operations, the threats lead to active destruction or failure of the production process. In order to functionally withstand related production structures, when loyal to the industrial relations concept, they need to integrate at the strategic management level on common goal basis to reduce risks. If necessary, to increase sustainability, they can be integrated at operational management level using interconnections at the production and resource levels. To do this, it is necessary to develop a strategic and goal-oriented management system behaviour line, which requires informational and intelligent data processing at the highest level using cognitive creative methods.For each level of the infrastructure hierarchy, oriented towards strategic goals in the global infrastructure dynamic environment, methods of assessing the situation to detect failures and the actions of attacks have been developed, based on which countermeasures are formed depending on the type of threats.
由于复杂技术过程的现代化与分布式空间基础设施相结合,技术过程的复杂性要求使用新的控制系统以及计算机和信息网络技术。因此,这就提出了修改信息测量系统建设的基本概念、开发实施目标管理过程的软件和硬件的问题。这需要开发新的方法来表示、处理和显示有关能量活动对象和整个信息结构的汇总状态的数据。威胁条件下的管理需要考虑信息基础设施的特点、数据的选择和处理方法、态势分类的方法和算法,这些都是由各个单元获得的数据块和整个工艺过程形成的。关于系统和基础结构现状的资料对于形成、采用和执行管理决定是必要的,而管理决定是协调战略综合的基础。适当的目标方位,合理的指标,真实的过程轨迹偏离目标状态,决定了目标攻击的概率。协调管理行动的知识和决策程序是建立在战略目标导向的结构基础上的,他们的专业精神和智力水平、认知和科学训练是正确解读态势、形成应对威胁对策的基础。在某一区域(资源、认知、系统、信息)的人为系统上发生主动威胁和自然灾害或军事行动时,这些威胁会导致生产过程的主动破坏或失败。为了在功能上承受相关的生产结构,当忠于劳资关系概念时,它们需要在共同目标的基础上在战略管理层面进行整合,以降低风险。如有必要,为了提高可持续性,可以在业务管理一级利用生产和资源一级的相互联系将它们整合起来。要做到这一点,有必要制定一个战略和目标导向的管理系统行为线,这需要在最高水平上使用认知创造性方法进行信息和智能数据处理。对于面向全球基础设施动态环境中的战略目标的基础设施层次的每个级别,已经开发了评估情况以检测故障和攻击行动的方法,并根据威胁类型形成对策。
{"title":"System-Information and Cognitive Technologies of Man-Made Infrastructure Cyber Security","authors":"Liubomyr S. Sikora, N. Lysa, Y. Tsikalo, O. Fedevych","doi":"10.13052/jcsm2245-1439.123.7","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.123.7","url":null,"abstract":"The complication of technological processes due to the modernization of complex technological processes aggregates with a distributed spatial infrastructure requires the use of new control systems and computer and information network technologies. Accordingly, this poses the problem of revising the basic concepts of information-measuring systems building, developing software and hardware for the implementation of the target management process. This requires development of new approaches to presentation, processing, and display of data about the aggregates state of energy-active objects and the entire information structure. For management under threat conditions, it is necessary to take into account the features of the information infrastructure, data selection and processing methods, methods and algorithms for classifying the situation, which are formed from blocks of data obtained from each unit and the technological process as a whole.\u0000Information about the current state of system and infrastructure is necessary for the formation, adoption and implementation of management decisions which is the basis for coordination strategies synthesis. Appropriate target orientation, reasonable indicators of real process trajectories divergence from the target state determine the probability of object attack. Knowledge and decision-making procedures for the coordination of managerial actions is based on the strategic target orientation of the structure, their professionalism and the level of intellectual, cognitive and scientific training which is the basis for correct situation interpretation of countermeasures against threats formation.\u0000In the event of active threats complex on man-made systems in a certain region (resource, cognitive, system, information) and natural disasters or military operations, the threats lead to active destruction or failure of the production process. In order to functionally withstand related production structures, when loyal to the industrial relations concept, they need to integrate at the strategic management level on common goal basis to reduce risks. If necessary, to increase sustainability, they can be integrated at operational management level using interconnections at the production and resource levels. To do this, it is necessary to develop a strategic and goal-oriented management system behaviour line, which requires informational and intelligent data processing at the highest level using cognitive creative methods.\u0000For each level of the infrastructure hierarchy, oriented towards strategic goals in the global infrastructure dynamic environment, methods of assessing the situation to detect failures and the actions of attacks have been developed, based on which countermeasures are formed depending on the type of threats.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"29 1","pages":"389-414"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72941476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Method of Increasing the Security of Smart Parking System 提高智能停车系统安全性的方法
Q3 Computer Science Pub Date : 2023-05-18 DOI: 10.13052/jcsm2245-1439.123.3
T. Hovorushchenko, Olga Pavlova, M. Kostiuk
Currently, the urgent task is developing the methods and tools for increasing Smart Parking software system security. The purpose of this study is conducting analysis of requirements for Smart Parking System software security in order to find the bottlenecks and parts of the software that are most vulnerable to external threats and develop the methods and tools for increasing their security. The paper proposes the method of increasing Smart Parking software system security based on integrating the middleware in Smart Parking System software architecture. The proposed method takes into account all the criteria for Smart Parking System software security, i.e. parameters of safe access to the database, client program security, server security and API security and provides a complex solution for increasing the safety of Smart Parking software system. The proposed method differs from the known ones in that it allows taking into account all the criteria for increasing the Smart Parking System software security in complex using security middleware.
目前,开发提高智能停车软件系统安全性的方法和工具是当务之急。本研究的目的是对智能停车系统软件安全性的需求进行分析,以找到最容易受到外部威胁的软件瓶颈和部分,并开发提高其安全性的方法和工具。提出了在智能停车系统软件体系结构中集成中间件的方法来提高智能停车软件系统的安全性。该方法综合考虑了智能停车系统软件安全的所有标准,即数据库安全访问、客户端程序安全、服务器安全和API安全等参数,为提高智能停车软件系统的安全性提供了一种复杂的解决方案。该方法与现有方法的不同之处在于,它考虑了智能停车系统软件在复杂环境下使用安全中间件提高软件安全性的所有标准。
{"title":"Method of Increasing the Security of Smart Parking System","authors":"T. Hovorushchenko, Olga Pavlova, M. Kostiuk","doi":"10.13052/jcsm2245-1439.123.3","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.123.3","url":null,"abstract":"Currently, the urgent task is developing the methods and tools for increasing Smart Parking software system security. The purpose of this study is conducting analysis of requirements for Smart Parking System software security in order to find the bottlenecks and parts of the software that are most vulnerable to external threats and develop the methods and tools for increasing their security. The paper proposes the method of increasing Smart Parking software system security based on integrating the middleware in Smart Parking System software architecture. The proposed method takes into account all the criteria for Smart Parking System software security, i.e. parameters of safe access to the database, client program security, server security and API security and provides a complex solution for increasing the safety of Smart Parking software system. The proposed method differs from the known ones in that it allows taking into account all the criteria for increasing the Smart Parking System software security in complex using security middleware.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"8 2","pages":"297-314"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72396169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Use of the Kolmogorov-Wiener Filter for Heavy-tail Process Prediction Kolmogorov-Wiener滤波器在重尾过程预测中的应用
Q3 Computer Science Pub Date : 2023-05-18 DOI: 10.13052/jcsm2245-1439.123.4
V. Gorev, A. Gusev, V. Korniienko, Y. Shedlovska
This paper is devoted to the investigation of the applicability of the Kolmogorov–Wiener filter to the prediction of heavy-tail processes. As is known, telecommunication traffic in systems with data packet transfer is considered to be a heavy-tail process. There are a lot of rather sophisticated approaches to traffic prediction; however, in the rather simple case of stationary traffic sophisticated approaches may not be needed, and a simple approach, such as the Kolmogorov–Wiener filter, may be applied. However, as far as we know, this approach has not been considered in recent papers. In our previous papers, we theoretically developed a method for obtaining the filter weight function in the continuous case. The Kolmogorov–Wiener filter may be applied only to stationary processes, but in some models telecommunication traffic is treated as a stationary process, and thus the use of the Kolmogorov–Wiener filter may be of practical interest. In this paper, we generate stationary heavy-tail modeled data similar to fractional Gaussian noise and investigate the applicability of the Kolmogorov–Wiener filter to data prediction. Both non-smoothed and smoothed processes are investigated. It is shown that both the discrete and the continuous Kolmogorov–Wiener filter may be used in a rather accurate short-term prediction of a heavy-tail smoothed stationary random process. The paper results may be used for stationary telecommunication traffic prediction in systems with packet data transfer.
本文研究了柯尔莫哥洛夫-维纳滤波器在重尾过程预测中的适用性。众所周知,在具有数据包传输的系统中,通信业务被认为是一个重尾过程。有很多相当复杂的交通预测方法;然而,在相当简单的静止交通情况下,可能不需要复杂的方法,而可以采用简单的方法,例如Kolmogorov-Wiener滤波器。然而,据我们所知,在最近的论文中并没有考虑到这种方法。在我们之前的论文中,我们从理论上开发了一种在连续情况下获得滤波器权函数的方法。Kolmogorov-Wiener滤波器可能只适用于平稳过程,但在某些模型中,电信业务被视为平稳过程,因此使用Kolmogorov-Wiener滤波器可能具有实际意义。在本文中,我们生成了类似分数阶高斯噪声的平稳重尾模型数据,并研究了Kolmogorov-Wiener滤波器在数据预测中的适用性。研究了非光滑过程和光滑过程。结果表明,离散Kolmogorov-Wiener滤波器和连续Kolmogorov-Wiener滤波器都可用于较精确的重尾平滑平稳随机过程的短期预测。本文的研究结果可用于分组数据传输系统的静态通信流量预测。
{"title":"On the Use of the Kolmogorov-Wiener Filter for Heavy-tail Process Prediction","authors":"V. Gorev, A. Gusev, V. Korniienko, Y. Shedlovska","doi":"10.13052/jcsm2245-1439.123.4","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.123.4","url":null,"abstract":"This paper is devoted to the investigation of the applicability of the Kolmogorov–Wiener filter to the prediction of heavy-tail processes. As is known, telecommunication traffic in systems with data packet transfer is considered to be a heavy-tail process. There are a lot of rather sophisticated approaches to traffic prediction; however, in the rather simple case of stationary traffic sophisticated approaches may not be needed, and a simple approach, such as the Kolmogorov–Wiener filter, may be applied. However, as far as we know, this approach has not been considered in recent papers. In our previous papers, we theoretically developed a method for obtaining the filter weight function in the continuous case. The Kolmogorov–Wiener filter may be applied only to stationary processes, but in some models telecommunication traffic is treated as a stationary process, and thus the use of the Kolmogorov–Wiener filter may be of practical interest. In this paper, we generate stationary heavy-tail modeled data similar to fractional Gaussian noise and investigate the applicability of the Kolmogorov–Wiener filter to data prediction. Both non-smoothed and smoothed processes are investigated. It is shown that both the discrete and the continuous Kolmogorov–Wiener filter may be used in a rather accurate short-term prediction of a heavy-tail smoothed stationary random process. The paper results may be used for stationary telecommunication traffic prediction in systems with packet data transfer.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"148 1","pages":"315-338"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86570552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Journal of Cyber Security and Mobility
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1