Standard

Evaluation of the available wireless remote devices subject to the information impact. / Bazhayev, Nurzhan; Lebedev, Ilya; Krivtsova, Irina; Sukhoparov, Mikhail; Salakhutdinova, Kseniya; Davydov, Alexander; Shaparenko, Yuriy.

Application of Information and Communication Technologies, AICT 2016 - Conference Proceedings. Institute of Electrical and Electronics Engineers Inc., 2017. 7991764 (Application of Information and Communication Technologies, AICT 2016 - Conference Proceedings).

Результаты исследований: Публикации в книгах, отчётах, сборниках, трудах конференцийстатья в сборнике материалов конференциинаучнаяРецензирование

Harvard

Bazhayev, N, Lebedev, I, Krivtsova, I, Sukhoparov, M, Salakhutdinova, K, Davydov, A & Shaparenko, Y 2017, Evaluation of the available wireless remote devices subject to the information impact. в Application of Information and Communication Technologies, AICT 2016 - Conference Proceedings., 7991764, Application of Information and Communication Technologies, AICT 2016 - Conference Proceedings, Institute of Electrical and Electronics Engineers Inc., 10th IEEE International Conference on Application of Information and Communication Technologies, AICT 2016, Baku, Азербайджан, 11/10/16. https://doi.org/10.1109/ICAICT.2016.7991764

APA

Bazhayev, N., Lebedev, I., Krivtsova, I., Sukhoparov, M., Salakhutdinova, K., Davydov, A., & Shaparenko, Y. (2017). Evaluation of the available wireless remote devices subject to the information impact. в Application of Information and Communication Technologies, AICT 2016 - Conference Proceedings [7991764] (Application of Information and Communication Technologies, AICT 2016 - Conference Proceedings). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICAICT.2016.7991764

Vancouver

Bazhayev N, Lebedev I, Krivtsova I, Sukhoparov M, Salakhutdinova K, Davydov A и пр. Evaluation of the available wireless remote devices subject to the information impact. в Application of Information and Communication Technologies, AICT 2016 - Conference Proceedings. Institute of Electrical and Electronics Engineers Inc. 2017. 7991764. (Application of Information and Communication Technologies, AICT 2016 - Conference Proceedings). https://doi.org/10.1109/ICAICT.2016.7991764

Author

Bazhayev, Nurzhan ; Lebedev, Ilya ; Krivtsova, Irina ; Sukhoparov, Mikhail ; Salakhutdinova, Kseniya ; Davydov, Alexander ; Shaparenko, Yuriy. / Evaluation of the available wireless remote devices subject to the information impact. Application of Information and Communication Technologies, AICT 2016 - Conference Proceedings. Institute of Electrical and Electronics Engineers Inc., 2017. (Application of Information and Communication Technologies, AICT 2016 - Conference Proceedings).

BibTeX

@inproceedings{6f4b743c11394c9ebfb4d1c82a3ec620,
title = "Evaluation of the available wireless remote devices subject to the information impact",
abstract = "Considered the remote device is a wireless network as a queuing system. The analysis of a wireless network bridge is under attack, aimed at organizing 'broadcast storm', in order to determine the availability of stand-alone units, the ability to carry out their tasks in the functional impact of the information. It identified a number of conditions for the organization of this type of attack by a potential malefactor of information security. Showing model depending functioning of the system in the normal state and the implementation of an information system on the impact from a potential malefactor. The analytical modeling of wireless network operation in normal mode, and during the attack on the organization of 'broadcast storm.' Disclosed is an experiment that provides obtaining statistical information on the remote wireless devices. The results of the experiment of a typical attack system, to transmit data via a broadcast packet network scan at different values of the noise intensity posts from the violator information security. The proposed model can be used to determine the specifications of the wireless ad hoc network of devices, making recommendations on the node configuration aimed at countering 'broadcast storm.'",
keywords = "accessibility of devices, Information security, information security model, multi-agent systems, vulnerability, wireless networks",
author = "Nurzhan Bazhayev and Ilya Lebedev and Irina Krivtsova and Mikhail Sukhoparov and Kseniya Salakhutdinova and Alexander Davydov and Yuriy Shaparenko",
year = "2017",
month = jul,
day = "25",
doi = "10.1109/ICAICT.2016.7991764",
language = "English",
series = "Application of Information and Communication Technologies, AICT 2016 - Conference Proceedings",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
booktitle = "Application of Information and Communication Technologies, AICT 2016 - Conference Proceedings",
address = "United States",
note = "10th IEEE International Conference on Application of Information and Communication Technologies, AICT 2016 ; Conference date: 11-10-2016 Through 13-10-2016",

}

RIS

TY - GEN

T1 - Evaluation of the available wireless remote devices subject to the information impact

AU - Bazhayev, Nurzhan

AU - Lebedev, Ilya

AU - Krivtsova, Irina

AU - Sukhoparov, Mikhail

AU - Salakhutdinova, Kseniya

AU - Davydov, Alexander

AU - Shaparenko, Yuriy

PY - 2017/7/25

Y1 - 2017/7/25

N2 - Considered the remote device is a wireless network as a queuing system. The analysis of a wireless network bridge is under attack, aimed at organizing 'broadcast storm', in order to determine the availability of stand-alone units, the ability to carry out their tasks in the functional impact of the information. It identified a number of conditions for the organization of this type of attack by a potential malefactor of information security. Showing model depending functioning of the system in the normal state and the implementation of an information system on the impact from a potential malefactor. The analytical modeling of wireless network operation in normal mode, and during the attack on the organization of 'broadcast storm.' Disclosed is an experiment that provides obtaining statistical information on the remote wireless devices. The results of the experiment of a typical attack system, to transmit data via a broadcast packet network scan at different values of the noise intensity posts from the violator information security. The proposed model can be used to determine the specifications of the wireless ad hoc network of devices, making recommendations on the node configuration aimed at countering 'broadcast storm.'

AB - Considered the remote device is a wireless network as a queuing system. The analysis of a wireless network bridge is under attack, aimed at organizing 'broadcast storm', in order to determine the availability of stand-alone units, the ability to carry out their tasks in the functional impact of the information. It identified a number of conditions for the organization of this type of attack by a potential malefactor of information security. Showing model depending functioning of the system in the normal state and the implementation of an information system on the impact from a potential malefactor. The analytical modeling of wireless network operation in normal mode, and during the attack on the organization of 'broadcast storm.' Disclosed is an experiment that provides obtaining statistical information on the remote wireless devices. The results of the experiment of a typical attack system, to transmit data via a broadcast packet network scan at different values of the noise intensity posts from the violator information security. The proposed model can be used to determine the specifications of the wireless ad hoc network of devices, making recommendations on the node configuration aimed at countering 'broadcast storm.'

KW - accessibility of devices

KW - Information security

KW - information security model

KW - multi-agent systems

KW - vulnerability

KW - wireless networks

UR - http://www.scopus.com/inward/record.url?scp=85029347805&partnerID=8YFLogxK

U2 - 10.1109/ICAICT.2016.7991764

DO - 10.1109/ICAICT.2016.7991764

M3 - Conference contribution

AN - SCOPUS:85029347805

T3 - Application of Information and Communication Technologies, AICT 2016 - Conference Proceedings

BT - Application of Information and Communication Technologies, AICT 2016 - Conference Proceedings

PB - Institute of Electrical and Electronics Engineers Inc.

T2 - 10th IEEE International Conference on Application of Information and Communication Technologies, AICT 2016

Y2 - 11 October 2016 through 13 October 2016

ER -

ID: 53919506