FEATURES OF SECURED INFORMATION NETWORK DESIGN

Authors

  • Volodymyr Khoroshko National aviation University, Kiev, Ukraine
  • Oleksandr Laptiev Taras Shevchenko National University of Kyiv, Kyiv, Ukraine
  • Yulia Khokhlachоva National aviation University, Kiev, Ukraine
  • Abdullah Al-Dalvash National aviation University, Kiev, Ukraine
  • Yurii Pepa Head of the Department of Robotics and Technical Systems Educational and Research Institute of Telecommunications.Information on the availability of printed works in national and international databases, Ukraine

DOI:

https://doi.org/10.18372/2310-5461.62.18709

Keywords:

мodeling, information protection, security of information networks, network protection, graph theory, complex systems

Abstract

The article deals with the design problems of secure information networks. The process of introducing new information technologies into all spheres of social life is unthinkable without solving the issues of information security, which is structured in completely different but interconnected aspects. Modern progress in the field of global networks and multimedia tools has led to the development of numerous methods designed to ensure the safe transmission of information through telecommunications channels and their use for undeclared purposes, methods of synthesis of various information objects and the development of their new mathematical models. The mathematical apparatus used in the field of information security has so far remained rather limited. Until now, there is no single mathematical approach to the analysis and processing of data about information objects, information transmission networks and their design methods. Due to the lack of a single mathematical apparatus, until now there were no methods for conducting an a priori analysis of the properties of these objects, comparing different technologies of the functioning of communication systems, which in general deprived the possibility of a reasonable choice of the technology of the functioning of the communication network or the method of its design. Therefore, it is extremely relevant to ensure the possibility of automated analysis of the state and functioning of protected communication networks, including the analysis of the functioning of the information system as a whole, taking into account the possibility of the emergence of both natural and artificial channels of information leakage and various types of influences, automatic processing of the results of such leakage and influences, choosing the way to restore the network after an attack, as well as to solve the issues of synthesis and design of protection systems of communication information networks with the involvement of modern mathematical apparatus is the creation of a unified mathematical approach to the problem of assessing the state of communication information networks, which would avoid their heterogeneous and poor formalizability by means of a computationally simple analysis of only a certain group of mathematical parameters describing the functioning of protected communication networks. This work is dedicated to solving this urgent problem. 

Author Biographies

Volodymyr Khoroshko, National aviation University, Kiev, Ukraine

Professor, Professor of the Department of Security of Information Technologies

Oleksandr Laptiev, Taras Shevchenko National University of Kyiv, Kyiv, Ukraine

doctor of technical sciences, senior researcher, Associate Professor the Department of Cyber Security and Information Protection,Faculty of Information Technology

Yulia Khokhlachоva, National aviation University, Kiev, Ukraine

Candidate of technical sciences, professor of the Department of Security of Information Technologies

Abdullah Al-Dalvash , National aviation University, Kiev, Ukraine

graduate student of the Information Technology Security Department

Yurii Pepa, Head of the Department of Robotics and Technical Systems Educational and Research Institute of Telecommunications.Information on the availability of printed works in national and international databases, Ukraine

сandidate of тechnical sciences, associate professor, нead of the Department of Robotics and Technical Systems

References

Павлов І. М., Хорошко В. О. Проектування комплексних систем захисту інформації. Київ: ВІТІ – ДУІКТ, 2011. 245 с.

Бобало Ю. Я., Дудикевич В. Б., Павлов І. М. та ін. Проектування комплексних систем захисту інформації. Львів: Видавництво «Львівська політехніка», 2020. 320 с.

Кулаков Ю. О., Луцкий Г. М. Комп’ютерні мережі. За ред.

Ю.С. Ковстанюка. Київ: Видавництво «Юніор», 2005. 400 с.

Щербина Ю. В., Казакова Н. Ф., Фразе-Фразенко О. О., Лаптєв О. А., Собчук А. В. Вибір джерела випадковості для комп’ютерного моделювання. Наукоємні технології. Том 59. № 3. 2023. С. 233-238. doi: 10.18372/2310-5461.59.17944

Boryseiko O., Laptiev O., Perehuda O., Ryzhov A. Optimizing Energy Conversion in a Piezo Disk Using a Controlled Supply of Electrical Load. Axioms. 2023. №12, 1074. doi: 10.3390/axioms12121074.

Barabash O., Laptiev O., Grushina O. The conceptual model of the intelligent network. Сучасний захист інформації. 2023. No4 (56). Р. 1-9. doi: 10.31673/2409-7292.2023.030202

Лаптєв О., Зозуля С. Метод виключення відомих сигналів при сканування заданого радіодіапазону. Кібербезпека: освіта, наука, техніка. 2023. Том 2. № 22. С. 31–38. doi: 10.28925/2663-4023.2023.22.3138

Собчук В. В., Циганівська І. М., Лаптєв О. А., Журавльов В. М. Планування технологічних ланцюжків засобами скінченно частково впорядкованих множин. Наукоємні технології. 2023. Том 60. № 4. С. 372- 385. doi: 10.18372/2310-5461.60.18266

Barabash O., Musienko A., Sobchuk V., Lukova-Chuiko N., Svynchuk O. Distribution of Values of Cantor Type Fractal Functions with Specified Restrictions. Chapter in Book “Contemporary Approaches and Methods in Fundamental Mathematics and Mechanics”. Editors Victor A. Sadovnichiy, Michael Z. Zgurovsky. Publisher Name: Springer, Cham, Switzerland AG 2021. Р. 433 – 455. https://link.springer.com/book/10.1007/ 978-3-030-50302-4

Boiko J., Tolubko V., Barabash O., Eromenko O., Havrylko Ye. Signal processing with frequency and phase shift keying modulation in telecommunications. TELKOMNIKA. Telecommunication, Computing, Electronics and Control. Yogyakarta, Indonesia, 2019. Vol. 17, No 4. P. 2025-2038. doi: 10.12928/TELKOMNIKA.v17i4.12168

Barabash O.V., Dakhno N.B., Shevchenko H.V., Majsak T.V. Dynamic Models of Decision Support Systems for Controlling UAV by Two-Step Variational-Gradient Method. Proceedings of 2017 IEEE 4th International Conference «Actual Problems of Unmanned Aerial Vehicles Developments (APUAVD)», (17-19 October, 2017), Kyiv, Ukraine. Kyiv: National Aviation University, 2017. P. 108-111.

Published

2024-07-29

Issue

Section

Information technology, cybersecurity