Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
Evaluation of the available wireless remote devices subject to the information impact. / Bazhayev, Nurzhan; Lebedev, Ilya; Krivtsova, Irina; Sukhoparov, Mikhail; Salakhutdinova, Kseniya; Davydov, Alexander; Shaparenko, Yuriy.
Application of Information and Communication Technologies, AICT 2016 - Conference Proceedings. Institute of Electrical and Electronics Engineers Inc., 2017. 7991764 (Application of Information and Communication Technologies, AICT 2016 - Conference Proceedings).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
}
TY - GEN
T1 - Evaluation of the available wireless remote devices subject to the information impact
AU - Bazhayev, Nurzhan
AU - Lebedev, Ilya
AU - Krivtsova, Irina
AU - Sukhoparov, Mikhail
AU - Salakhutdinova, Kseniya
AU - Davydov, Alexander
AU - Shaparenko, Yuriy
PY - 2017/7/25
Y1 - 2017/7/25
N2 - Considered the remote device is a wireless network as a queuing system. The analysis of a wireless network bridge is under attack, aimed at organizing 'broadcast storm', in order to determine the availability of stand-alone units, the ability to carry out their tasks in the functional impact of the information. It identified a number of conditions for the organization of this type of attack by a potential malefactor of information security. Showing model depending functioning of the system in the normal state and the implementation of an information system on the impact from a potential malefactor. The analytical modeling of wireless network operation in normal mode, and during the attack on the organization of 'broadcast storm.' Disclosed is an experiment that provides obtaining statistical information on the remote wireless devices. The results of the experiment of a typical attack system, to transmit data via a broadcast packet network scan at different values of the noise intensity posts from the violator information security. The proposed model can be used to determine the specifications of the wireless ad hoc network of devices, making recommendations on the node configuration aimed at countering 'broadcast storm.'
AB - Considered the remote device is a wireless network as a queuing system. The analysis of a wireless network bridge is under attack, aimed at organizing 'broadcast storm', in order to determine the availability of stand-alone units, the ability to carry out their tasks in the functional impact of the information. It identified a number of conditions for the organization of this type of attack by a potential malefactor of information security. Showing model depending functioning of the system in the normal state and the implementation of an information system on the impact from a potential malefactor. The analytical modeling of wireless network operation in normal mode, and during the attack on the organization of 'broadcast storm.' Disclosed is an experiment that provides obtaining statistical information on the remote wireless devices. The results of the experiment of a typical attack system, to transmit data via a broadcast packet network scan at different values of the noise intensity posts from the violator information security. The proposed model can be used to determine the specifications of the wireless ad hoc network of devices, making recommendations on the node configuration aimed at countering 'broadcast storm.'
KW - accessibility of devices
KW - Information security
KW - information security model
KW - multi-agent systems
KW - vulnerability
KW - wireless networks
UR - http://www.scopus.com/inward/record.url?scp=85029347805&partnerID=8YFLogxK
U2 - 10.1109/ICAICT.2016.7991764
DO - 10.1109/ICAICT.2016.7991764
M3 - Conference contribution
AN - SCOPUS:85029347805
T3 - Application of Information and Communication Technologies, AICT 2016 - Conference Proceedings
BT - Application of Information and Communication Technologies, AICT 2016 - Conference Proceedings
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 10th IEEE International Conference on Application of Information and Communication Technologies, AICT 2016
Y2 - 11 October 2016 through 13 October 2016
ER -
ID: 53919506