IMPROVEMENT OF THE METHOD OF INCREASE THE INTERRUPTION RESISTANCE OF THE SIGNALS DETECTION SYSTEMS OF THE MEANS OF COVERT INFORMATION COLLECTION
DOI:
https://doi.org/10.18372/2410-7840.24.17264Keywords:
means of tacit information acquisition, random signal, interference resistance, filter, useful signal, impulseAbstract
In the process of detection and recognition of signals of random signals, which can be signals of digital means of covert information acquisition, an urgent issue is the improvement of immunity. The article examines the features of using low-pass filters. Low-pass filters with quadratic and linear dependence of the response on the input signal. The principle of operation of filters is that the process of summation is performed. At the same time, the useful signal is summarized coherently, and the interference signal is summed up incoherently. The useful signal increases and the interference signal decreases. When a rectangular pulse is applied to the input of the linear and quadratic filters, which imitates the signals of modern digital means of covert information acquisition, the parameters of the output signals necessary for further use are determined: mathematical expectation, correlation coefficient, dispersion, root mean square deviation, ratio of values signals to the amount of interference in temporal and spectral view. Calculated winning ratio. This coefficient shows the efficiency of using low-pass filters. Graphs of the envelope voltage at the output of an ideal bandpass filter when a rectangular pulse of different duration is applied to the input– a signal that can be a signal of covert information acquisition means. Modeling of the filtering process with different correlation coefficients was carried out. The simulation results confirmed the possibility of identifying the signal of means of covert information acquisition by the method of determining the two-dimensional probability density of the interference signal against the background of the general signal. The process of improving the immunity of the system as a whole is being studied. The improvement of the signal detection method was carried out due to the use of low-frequency narrow-band filters in the process of signal processing, which allows to achieve a 23% increase in the immunity of the system for identifying and recognizing signals of digital means of covert information acquisition.
References
Oleksandr Laptiev, Savchenko Vitalii, Serhii Yevseiev, Halyna Haidur, Sergii Gakhov, Spartak Hohoniants. The new method for detecting signals of means of covert obtaining information. 2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (IEEE ATIT 2020) Conference Proceedings Kyiv, Ukraine, November 25-27, рр. 176-181.
Лаптєв О.А., Собчук В.В., Савченко В.А. Метод підвищення завадостійкості системи виявлення, розпізнавання і локалізації цифрових сигналів в інформаційних системах. Збірник наукових праць Військового інституту Київського національного університету імені Тараса Шевченка. К.: ВІКНУ, Вип. 66. 2019. С. 124 -132.
Oleksandr Laptiev, Volodymyr Tkachev, Oleksii Maystrov, Oleksandr Krasikov, Pavlo Open’ko, Volodimir Khoroshko, Lubomir Parkhuts. The method of spectral analysis of the determination of random digital signals. International Journal of Communication Networks and Information Security (IJCNIS). Vol 13, No 2, August 2021 рр. 271- 277 ISSN: 2073-607X (Online)
Aaron Don M. Africa, Ara Jyllian A. Abello, Zendrel G. Gacuya, Isaiah Kyle A. Naco, Victor Antonio R. Valdes. Face Recognition Using
MATLAB. International Journal of Advanced Trends in Computer Science and Engineering. 2019. Vol. 8, № 4. July-August. рр. 1110-1116.
Churyumov G., Tokarev V., Tkachov V., Partyka S. Scenario of Interaction of the Mobile Technical Objects in the Process of Transmission of Data Streams in Conditions of Impacting the Powerful Electromagnetic Field. 2018 IEEE Second International Conference on Data Stream Mining & Processing (DSMP). 21-25 Aug. 2018. рр. 183-186.
Unmasking the Dynamic Data Masking. URL: https://www.red-gate.com/simple-talk/ blogs/unmasking-the-dynamic-data-masking.
Коломыцев М.В., Носок С.А., Мазуренко А.Е. Маскирование таблиц базы данных с использованием технологии SQL CLR // Захист інформації – 2017. – Т. 19, № 1. – С.16-22.
Коломыцев М.В., Носок С.А., Мазуренко А.Е. Обеспечение целостности внешних ключей маскированной базы данных // Захист інформації – 2015. – Т. 17, № 5. – С.306-311.
Bakiko V.M., Popovich P.V, Shvaychenko V.B. Viznachennya zavadostiykosti kanalu zv’yazku za vipadkovogo vplivu zavad. Visnyk Nats. tehn. un-tu "HPI": zb. nauk. pr. – Kharkiv: NTU "HPI", 2018. № 14 (1290). рр. 7-10.
Kulikov G.V., Nesterov A.V., Lelyuh A.A. Pomehoustoychivost priema signalov s kvadraturnoy amplitudnoy manipulyatsiey v prisutstvii garmonicheskoy pomehi. Zhurnal radioelektroniki, № 11, 2018 [Elektronniy resurs.
S. Yevseiev, V. Ponomarenko, O. Laptiev, O. Milov and others. Synergy of building cybersecurity systems: monograph / Edited by– Kharkiv: PC TECHNOLOGY CENTER, 2021. – 188 p. https://entc. com. ua / en / 869-monograph-synergy-ofbuilding-cybersecurity-systems-has-been-published-by-our-publisher.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).