• Nurzhan Bazhayev
  • Ilya Lebedev
  • Irina Krivtsova
  • Mikhail Sukhoparov
  • Kseniya Salakhutdinova
  • Alexander Davydov
  • Yuriy Shaparenko

Considered the remote device is a wireless network as a queuing system. The analysis of a wireless network bridge is under attack, aimed at organizing 'broadcast storm', in order to determine the availability of stand-alone units, the ability to carry out their tasks in the functional impact of the information. It identified a number of conditions for the organization of this type of attack by a potential malefactor of information security. Showing model depending functioning of the system in the normal state and the implementation of an information system on the impact from a potential malefactor. The analytical modeling of wireless network operation in normal mode, and during the attack on the organization of 'broadcast storm.' Disclosed is an experiment that provides obtaining statistical information on the remote wireless devices. The results of the experiment of a typical attack system, to transmit data via a broadcast packet network scan at different values of the noise intensity posts from the violator information security. The proposed model can be used to determine the specifications of the wireless ad hoc network of devices, making recommendations on the node configuration aimed at countering 'broadcast storm.'

Original languageEnglish
Title of host publicationApplication of Information and Communication Technologies, AICT 2016 - Conference Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781509018406
DOIs
StatePublished - 25 Jul 2017
Event10th IEEE International Conference on Application of Information and Communication Technologies, AICT 2016 - Baku, Azerbaijan
Duration: 11 Oct 201613 Oct 2016

Publication series

NameApplication of Information and Communication Technologies, AICT 2016 - Conference Proceedings

Conference

Conference10th IEEE International Conference on Application of Information and Communication Technologies, AICT 2016
Country/TerritoryAzerbaijan
CityBaku
Period11/10/1613/10/16

    Scopus subject areas

  • Computer Vision and Pattern Recognition
  • Computer Science Applications
  • Computer Networks and Communications
  • Information Systems
  • Modelling and Simulation

    Research areas

  • accessibility of devices, Information security, information security model, multi-agent systems, vulnerability, wireless networks

ID: 53919506