THE PROTECTION OF AVIATION BOARD NETWORKS FROM ATTACKS BY CONFLICT THEORY METHODS WITH HONEY POTS
DOI:
https://doi.org/10.18372/2410-7840.17.9533Keywords:
airborne network, theory of conflict, honeypot, Markovian process, alternating process of renewal.Abstract
The problem of protection of airborne networks fromunauthorized encroachments stands especially sharply inconnection with the necessity of the absolute providing ofsafety of flights, exception of flying incidents and preconditionsto them. For protection of network from theexternal and internal attacks it is necessary not simply toraises power and informative resources, but apply theoptimum methods of fight against a thinking opponent.The mathematical models of conflict co-operation withthe use of "honey pots" – pseudo services tightening anopponent in escalation of attack are offered in work, forcingit to expend the power and informative resources. Theconceptual model of construction of the combined systemof protection with the inculcated additional level ofprotection – network honey pot is developed. The computerdesign is conducted, the results of which testify tohigh efficiency of the developed method of protection ofnetwork.References
Future Aeronautical Communications / Edited by Simon Plass. – Institute of Communications and Navigation, German Aerospace Center (DLR), Germany. – Published by InTech Janeza Trdine 9, 51000 Rijeka, Croatia. – InTech, 2011. – 378 PP.
Tanenbaum, A.S. Computer Networks, 5th Ed. /Andrew S. Tanenbaum, David J. Wetherall. – Prentice Hall, Cloth, 2011. – 960 PP.
Vodopianov S. Optimisation of Network Structures of Air Traffic Control Systems / Proceedings of the 6th International Conference “Advanced Computer Systems and Networks: Design an Application” – ACSN-2013. – Sept. 16 – 18, 2013. – Lviv, Ukraine. –PP. 84 – 85.
Airlines Electronic Engineering Committee (AEEC). ARINC Report 811: Commercial Aircraft Information Security Concepts of Operation and
Process Framework, December 2005.
Mohd. Junedul Haque. An Approach for Intrusion Detection using HoneyPots to Improve Network Security // International Journal for Research in Applied Science & Engineering Technology
(IJRASET). – Volume 3 Issue IV, April 2015. – pp. 1029 – 1033.
Lenny Zeltser. Experimenting with Honeypots Using The Modern Honey Network 20 Feb 2015. – Электронный ресурс. Режим доступа: https://
zeltser.com/modern-honey-network-experiments/
Тихонов В.И., Миронов М.А. Марковские процессы. М.: Советское радио, 1977. – 488 с.
Дружинин В.В., Конторов Д.С., Конторов М.Д. Введение в теорию конфликта. – М.: Радио и связь, 1989. – 288 с.
Виноградов Н. А., Данилина Г. В., Домарев Д. В., Милокум Я. В.Управление псевдосервисами в защищенных информационных системах на основе теории конфликта //Наукові записки Українського науково-дослідного інституту зв’язку. – 2014. – №6(34). – с. 5-12.
Дынкин Е.Б., Юшкевич А.А. Управляемые марковские процессы и их приложения. – М.: Наука,1975. – 338 с.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).