Kuban State Technological University
Author list of organization
List of articles written by the authors of the organization
-
MODEL OF INFORMATION EXPOSURE IN SOCIAL NETWORKS
DescriptionOn the basis of hydrodynamic analogy between turbulent transport of momentum, heat and mass transfer, and information in the conditions of modern electronic social networks, we consider a model of informational influence. The flow of information is represented as a stream of random events with simplest flow properties. In addition to the flow of information impact there were introduced the concepts of density, velocity and viscosity of the information flow. These parameters had been derived from the construction of dimensionless criteria characterizing the balance between inertia and viscosity of the information flow of information influence. This criterion serves as a numeric parameter determining the boundary of the transition from low-intensity to high intensity of information influence the turbulent nature of the attack. We have also analyzed the ranges of changes and the meaning of the entered parameters from the point of the organized network information inserts. The existence of the information in time and procedural nature of the concept of information allow us to focus on the properties of information flow as inertia, dynamics and relaxation
-
MODEL OF INFORMATION SECURITY FOR CONTROL PROCESSES OF COMPUTER NETWORKS
DescriptionIn order to improve the security of information transfer we have offered one of the possible approaches to modeling process control computer networks with elements of intelligent decision support. We proceed from the graph model of network nodes which are network devices with software control agents, and arcs are logical channels of information exchange between the equipment computer systems. We built an addressless sensing technology which ensures the completeness of monitoring of all network equipment. To classify the computer networks state we provided a method for calculating the values of reliability. Development of signal mismatch triggers the control cycle as a result of which the adjustment of the state of network equipment. For existing tools we proposed adding network control expert system consists of a knowledge base, inference mechanism and means of description and fill in the knowledge base
-
PROVIDING INFORMATION SECURITY OF DATA-PROCESSING NETWORK WITH USE OF INTELLIGENT SYSTEM
DescriptionThe article is devoted to creation of intelligent management system of complex data-processing network. This is caused by the fact that modern telecommunication hardware generates growing amount of statistic information. Expert system is offered to be used in management of networks for the purpose of information security
-
USING TECHNOLOGIES OF EXPERT SYSTEMS FOR SECURITY IN INFORMATION SYSTEMS
DescriptionThe article is devoted to the expert systems technology using to monitor the correct operation of the software and databases. It is noted that the main issues of security management in critical information systems is a process of observation and collection of information in a computing environment. Observation results should be evaluated and processed by an expert on security and then recorded in the database of expert systems. One of the possible options for security management of distributed computing network - creating a security machine. It will ensure: minimum response time to external perturbations; the accuracy of the audit protected by S-interface and independent decision-making process of the state of the controlled elements of information systems. After that, the agent is completely worn out; it is destroyed and replaced by a new one. This aging mechanism protects agent from analyzing and from external attacks
-
DIAGNOSTIC OF ANOMALIES IN DATA-PROCESSING NETWORKS WITH USE OF VARIETY OF INFORMATION EXCHANGE
DescriptionThe work is devoted to searching efficient detection methods of anomalous state in data networks. There is a structure of modern informational attacks detecting system. There are short review and analysis of information system network security facilities. Two main technologies of attack detection are described: anomaly detection and misuse detection. It is shown that every detection of anomalies is based on assumption that anomalous behavior is deflection from normal profile of behavior. It is hard to implement this technology, although there is some progress when expert system, fuzzy logic and so on are used for this purpose. Action patterns or symbols assets which describe anomaly activity are used as attack signature in misuse detection method. Author offers to use benefits of both methods for solving the problem
-
SYSTEMS OF REMOVING NETWORK ANOMALIES AND METHODS OF CREATION THEIR ARCHITECTURE
DescriptionDifferent stages of designing architecture of detection systems and opposition to network anomalies are analyzed in this article. It is pointed that common classification can be to determine state of network: “normal”, “critical”, “faulted”. Bases for building architecture of detection and removing anomalies are offered
-
About fragile fracture of solids in the formation of a "narrow" isolated defect
01.00.00 Physical-mathematical sciences
DescriptionWe obtain a macroscopic criterion of fragile fracture (limit curve) when creating an isolated defect in the form of “narrow” undercut, when conformal mapping of the exterior of a unit circle on the plane with de-effect in the form of a recess defined by cut fiber-foam series. It is shown that in this case, the limit curve has the form identical to the case when the defect is set to "narrow" ellipse. The same crack oriented along either the compressive stress or tensile perpendicular stress. From here, we can suggest that the shape and geometric properties of a sufficiently "narrow" defect do not affect the values of the critical loads required to start its distribution
-
01.00.00 Physical-mathematical sciences
DescriptionThe article presents a model for choosing a variety of alternative solutions, in which we have a subset of turns or more alternative options, based on the use of the Bayesian approach, based on the formulated concept of security functions as a priori estimate of the effects of the decision. This reduces the projected parameters and, therefore, increases the values of security. Thus, the considered indicators of data protection reflect the essence of Bayesian approach to decision making and management of GIS, so it allows to generate optimal decision rules
-
STATISTICAL MODELS DECISION SUPPORT FOR INFORMATION SECURITY MANAGEMENT IN AN AUTOMATED SYSTEM
01.00.00 Physical-mathematical sciences
DescriptionThe article deals with mathematical models of management decision-making to select the option to protect the AU, based on sufficient statistical information about attacks on the AU. The amount of a priori uncertainty about the choice of protection option in GIS was described with Boltzmann's entropy. Introduction of the value within Shannon’s definition of mutual information is called the context random variables, it allows removing the uncertainty regarding the actions of the enemy, and it enables decisionmakers to choose protection options. The model of decision for choosing the type of protection of the AIS presented in the article is based on sufficient statistical information about the attacks to the system components. In the ideal case, for decision-making, we use large sample statistical data that provides high accuracy control system for protection of information. Based on the available amount of information available to the IPA, against the acts of SIN, it is possible to choose a decision on the choices you make
-
THE DEFORMATION EFFECT OF VM SLIDER MULTI COMPLEX MACHINE SERIES ON PRECISION MACHINING
DescriptionThe article is devoted to the problems of increasing the economic growth of the Russian Federation, the development of high-tech knowledge-intensive manufacturing industries on the basis of a fundamentally new technological order, new unmanned technologies. The measures to improve the accuracy of manufacturing of complex and large-sized parts. Currently, the technical level of many sectors of the economy is largely determined by the level of production of means of production. The basis of these means is the machine tool industry. On the basis of machine tool development we handle a comprehensive mechanization and automation of production processes in industry, construction, agriculture, transport and other industries. We completed a comprehensive analysis of the errors affecting the manufacturing precision parts. The activities for improving the accuracy of manufacture based on VM 32 multi-machine complex series were proposed. We made the analysis of the cutting forces influence and the cross-sectional shape of the slide on its deformation for various types of processing. We determined the optimal shape of the cross section of the slider to increase stiffness and reduce deformation of the slide in metal cutting