Результаты исследований: Публикации в книгах, отчётах, сборниках, трудах конференций › статья в сборнике материалов конференции › научная › Рецензирование
Statistical data analysis for network infrastructure monitoring to recognize aberrant behavior of system local segments. / Sukhoparov, Mikhail; Davydov, Alexander; Lebedev, Ilya; Bazhayev, Nurzhan.
Application of Information and Communication Technologies, AICT 2016 - Conference Proceedings. Institute of Electrical and Electronics Engineers Inc., 2017. 7991834 (Application of Information and Communication Technologies, AICT 2016 - Conference Proceedings).Результаты исследований: Публикации в книгах, отчётах, сборниках, трудах конференций › статья в сборнике материалов конференции › научная › Рецензирование
}
TY - GEN
T1 - Statistical data analysis for network infrastructure monitoring to recognize aberrant behavior of system local segments
AU - Sukhoparov, Mikhail
AU - Davydov, Alexander
AU - Lebedev, Ilya
AU - Bazhayev, Nurzhan
PY - 2017/7/25
Y1 - 2017/7/25
N2 - Wireless network of low-power devices 'Smart Home', 'Internet of things' has been considered. A number of signs of security attacks on behalf of potential information interloper have been identified. We have analyzed the characteristics of a system based on wireless technologies that are obtained as a result of passive surveillance and active polling of devices comprising the network infrastructure. A model is presented for the information security state analysis based on identifying, quantitative, frequency, timing characteristics. In view of the peculiarities of the devices providing network infrastructure, estimation of the information security state is focused on the analysis of the system normal functioning profile, rather than on search of signatures and features of anomalies during various kinds of attacks. An experiment has been disclosed that provides obtaining statistical information about operation of wireless network remote devices where data acquisition for decision-making purposes occurs by comparing statistical signal messages from the leaf nodes in passive and active modes. Experimental results of information onslaught on the standard system have been presented. The proposed model may be used to determine technical characteristics of WLAN ad hoc network devices and to draw recommendations for IS state analysis.
AB - Wireless network of low-power devices 'Smart Home', 'Internet of things' has been considered. A number of signs of security attacks on behalf of potential information interloper have been identified. We have analyzed the characteristics of a system based on wireless technologies that are obtained as a result of passive surveillance and active polling of devices comprising the network infrastructure. A model is presented for the information security state analysis based on identifying, quantitative, frequency, timing characteristics. In view of the peculiarities of the devices providing network infrastructure, estimation of the information security state is focused on the analysis of the system normal functioning profile, rather than on search of signatures and features of anomalies during various kinds of attacks. An experiment has been disclosed that provides obtaining statistical information about operation of wireless network remote devices where data acquisition for decision-making purposes occurs by comparing statistical signal messages from the leaf nodes in passive and active modes. Experimental results of information onslaught on the standard system have been presented. The proposed model may be used to determine technical characteristics of WLAN ad hoc network devices and to draw recommendations for IS state analysis.
KW - 'soft' space wireless networks
KW - device availability
KW - Information security
KW - information security model
KW - vulnerability
UR - http://www.scopus.com/inward/record.url?scp=85034264421&partnerID=8YFLogxK
U2 - 10.1109/ICAICT.2016.7991834
DO - 10.1109/ICAICT.2016.7991834
M3 - Conference contribution
AN - SCOPUS:85034264421
T3 - Application of Information and Communication Technologies, AICT 2016 - Conference Proceedings
BT - Application of Information and Communication Technologies, AICT 2016 - Conference Proceedings
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 10th IEEE International Conference on Application of Information and Communication Technologies, AICT 2016
Y2 - 11 October 2016 through 13 October 2016
ER -
ID: 53919286