Standard

Statistical data analysis for network infrastructure monitoring to recognize aberrant behavior of system local segments. / Sukhoparov, Mikhail; Davydov, Alexander; Lebedev, Ilya; Bazhayev, Nurzhan.

Application of Information and Communication Technologies, AICT 2016 - Conference Proceedings. Institute of Electrical and Electronics Engineers Inc., 2017. 7991834 (Application of Information and Communication Technologies, AICT 2016 - Conference Proceedings).

Результаты исследований: Публикации в книгах, отчётах, сборниках, трудах конференцийстатья в сборнике материалов конференциинаучнаяРецензирование

Harvard

Sukhoparov, M, Davydov, A, Lebedev, I & Bazhayev, N 2017, Statistical data analysis for network infrastructure monitoring to recognize aberrant behavior of system local segments. в Application of Information and Communication Technologies, AICT 2016 - Conference Proceedings., 7991834, Application of Information and Communication Technologies, AICT 2016 - Conference Proceedings, Institute of Electrical and Electronics Engineers Inc., 10th IEEE International Conference on Application of Information and Communication Technologies, AICT 2016, Baku, Азербайджан, 11/10/16. https://doi.org/10.1109/ICAICT.2016.7991834

APA

Sukhoparov, M., Davydov, A., Lebedev, I., & Bazhayev, N. (2017). Statistical data analysis for network infrastructure monitoring to recognize aberrant behavior of system local segments. в Application of Information and Communication Technologies, AICT 2016 - Conference Proceedings [7991834] (Application of Information and Communication Technologies, AICT 2016 - Conference Proceedings). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICAICT.2016.7991834

Vancouver

Sukhoparov M, Davydov A, Lebedev I, Bazhayev N. Statistical data analysis for network infrastructure monitoring to recognize aberrant behavior of system local segments. в Application of Information and Communication Technologies, AICT 2016 - Conference Proceedings. Institute of Electrical and Electronics Engineers Inc. 2017. 7991834. (Application of Information and Communication Technologies, AICT 2016 - Conference Proceedings). https://doi.org/10.1109/ICAICT.2016.7991834

Author

Sukhoparov, Mikhail ; Davydov, Alexander ; Lebedev, Ilya ; Bazhayev, Nurzhan. / Statistical data analysis for network infrastructure monitoring to recognize aberrant behavior of system local segments. Application of Information and Communication Technologies, AICT 2016 - Conference Proceedings. Institute of Electrical and Electronics Engineers Inc., 2017. (Application of Information and Communication Technologies, AICT 2016 - Conference Proceedings).

BibTeX

@inproceedings{817d780565294b71a5d0e539db8230a3,
title = "Statistical data analysis for network infrastructure monitoring to recognize aberrant behavior of system local segments",
abstract = "Wireless network of low-power devices 'Smart Home', 'Internet of things' has been considered. A number of signs of security attacks on behalf of potential information interloper have been identified. We have analyzed the characteristics of a system based on wireless technologies that are obtained as a result of passive surveillance and active polling of devices comprising the network infrastructure. A model is presented for the information security state analysis based on identifying, quantitative, frequency, timing characteristics. In view of the peculiarities of the devices providing network infrastructure, estimation of the information security state is focused on the analysis of the system normal functioning profile, rather than on search of signatures and features of anomalies during various kinds of attacks. An experiment has been disclosed that provides obtaining statistical information about operation of wireless network remote devices where data acquisition for decision-making purposes occurs by comparing statistical signal messages from the leaf nodes in passive and active modes. Experimental results of information onslaught on the standard system have been presented. The proposed model may be used to determine technical characteristics of WLAN ad hoc network devices and to draw recommendations for IS state analysis.",
keywords = "'soft' space wireless networks, device availability, Information security, information security model, vulnerability",
author = "Mikhail Sukhoparov and Alexander Davydov and Ilya Lebedev and Nurzhan Bazhayev",
year = "2017",
month = jul,
day = "25",
doi = "10.1109/ICAICT.2016.7991834",
language = "English",
series = "Application of Information and Communication Technologies, AICT 2016 - Conference Proceedings",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
booktitle = "Application of Information and Communication Technologies, AICT 2016 - Conference Proceedings",
address = "United States",
note = "10th IEEE International Conference on Application of Information and Communication Technologies, AICT 2016 ; Conference date: 11-10-2016 Through 13-10-2016",

}

RIS

TY - GEN

T1 - Statistical data analysis for network infrastructure monitoring to recognize aberrant behavior of system local segments

AU - Sukhoparov, Mikhail

AU - Davydov, Alexander

AU - Lebedev, Ilya

AU - Bazhayev, Nurzhan

PY - 2017/7/25

Y1 - 2017/7/25

N2 - Wireless network of low-power devices 'Smart Home', 'Internet of things' has been considered. A number of signs of security attacks on behalf of potential information interloper have been identified. We have analyzed the characteristics of a system based on wireless technologies that are obtained as a result of passive surveillance and active polling of devices comprising the network infrastructure. A model is presented for the information security state analysis based on identifying, quantitative, frequency, timing characteristics. In view of the peculiarities of the devices providing network infrastructure, estimation of the information security state is focused on the analysis of the system normal functioning profile, rather than on search of signatures and features of anomalies during various kinds of attacks. An experiment has been disclosed that provides obtaining statistical information about operation of wireless network remote devices where data acquisition for decision-making purposes occurs by comparing statistical signal messages from the leaf nodes in passive and active modes. Experimental results of information onslaught on the standard system have been presented. The proposed model may be used to determine technical characteristics of WLAN ad hoc network devices and to draw recommendations for IS state analysis.

AB - Wireless network of low-power devices 'Smart Home', 'Internet of things' has been considered. A number of signs of security attacks on behalf of potential information interloper have been identified. We have analyzed the characteristics of a system based on wireless technologies that are obtained as a result of passive surveillance and active polling of devices comprising the network infrastructure. A model is presented for the information security state analysis based on identifying, quantitative, frequency, timing characteristics. In view of the peculiarities of the devices providing network infrastructure, estimation of the information security state is focused on the analysis of the system normal functioning profile, rather than on search of signatures and features of anomalies during various kinds of attacks. An experiment has been disclosed that provides obtaining statistical information about operation of wireless network remote devices where data acquisition for decision-making purposes occurs by comparing statistical signal messages from the leaf nodes in passive and active modes. Experimental results of information onslaught on the standard system have been presented. The proposed model may be used to determine technical characteristics of WLAN ad hoc network devices and to draw recommendations for IS state analysis.

KW - 'soft' space wireless networks

KW - device availability

KW - Information security

KW - information security model

KW - vulnerability

UR - http://www.scopus.com/inward/record.url?scp=85034264421&partnerID=8YFLogxK

U2 - 10.1109/ICAICT.2016.7991834

DO - 10.1109/ICAICT.2016.7991834

M3 - Conference contribution

AN - SCOPUS:85034264421

T3 - Application of Information and Communication Technologies, AICT 2016 - Conference Proceedings

BT - Application of Information and Communication Technologies, AICT 2016 - Conference Proceedings

PB - Institute of Electrical and Electronics Engineers Inc.

T2 - 10th IEEE International Conference on Application of Information and Communication Technologies, AICT 2016

Y2 - 11 October 2016 through 13 October 2016

ER -

ID: 53919286