DOI 10.17586/0021-3454-2021-64-6-452-458
UDC 656.6; 656.61;656.62/.66
ASSESSMENT OF THE FUNCTIONAL STATE OF A NETWORK INFRASTRUCTURE OBJECT USING A NEURAL NETWORK APPROACH
Dr. Sci., Professor; Russian State Hydrometeorological University Department of Marine Information Systems; Head of the Department ;
M. E. Sukhoparov
Saint Petersburg Branch AO «NPK «TRISTAN», Saint Petersburg, 195220, Russian Federation; Senior scientific researcher
O. V. Petrieva
PhD, Associate Professor; St. Petersburg University of State Fire Service of EMERCOM of Russia, Department of Higher Mathematics and System Modeling of Complex Processes;
Read the full article
Abstract. The issues of assessing the functional state of network infrastructure objects are considered, and the need for using alternative assessment methods is justified. Side channels are described, with the use of which it becomes possible to monitor the states of individual objects. The experiment conducted in the framework of the study is described. With the help of two sensors, statistical information about the various operating modes of the network architecture device was read. The obtained data were processed using two-layer direct propagation neural networks with a sigmoidal transfer function in hidden layers. The resulting behavior model of the network infrastructure object can be used as an additional element for determining the functional state.
Keywords: sensor, computer network, unauthorized access, signal, graph model, neural network, integration
References:
References:
- Heller K A., Svore K.M., Keromytis A.D., Stolfo S.J. Proc. Workshop Data Mining for Computer Secu¬rity, 2003, vol. 9, https://www.researchgate.net/publication/ 2883103_One_Class_Support_ Vector_Machines_for_Detecting_Anomalous_Windows_Registry_Accesses.
- Sukhoparov M.E., Semenov V.V., Lebedev I.S. Problems of Information Security. Computer Sys-tems, 2019, no. 4, pp. 26–34. (in Russ.)
- Hayashi Y.I., Homma N., Watanabe T., Price W.O., Radasky W.A. Proc. IEEE Transactions on Elec¬tromagnetic Compatibility, June 2013, no. 3(55), pp. 539–546.
- Han Y., Christoudis I., Diamantaras K.I., Zonouz S., Petropulu A. IEEE Signal Processing Maga-zine, 2019, no. 2(36), pp. 22–35.
- Lebedev I.S., Semenov V.V., Sukhoparov M.E., Salakhutdinova K.I. Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2019, рр. 104–112. Malafeyev O.A., Redinskikh N.D., Nemnyugin S.A., Kolesin I.D., Zaitseva I.V. AIP Conference Pro-ceedings. International Conference of Numerical Analysis and Applied Mathematics, ICNAAM 2017, 2018, рр. 1000135.
- Han Y., Etigowni S., Liu H., Zonouz S., Petropulu A. Proceedings of the ACM Conference on Com-puter and Communications Security, 2017, pp. 1095–1108.
- Genkin D., Shamir A., Tromer E. Journal of Cryptology, 2017, no. 2(30), pp. 392–443.
- Kutuzov O.I., Tatarnikova T.M. Proceedings of 2019 22nd International Conference on Soft Compu¬ting and Measurements, SCM 2019, 2019, рр. 45–47.
- Malafeyev O., Lakhina J., Redinskikh N., Smirnova T., Smirnov N., Zaitseva I. Journal of Physics: Conference Series, 2019, рр. 012090.
- Tatarnikova T.M. Information and Control Systems, 2017, no. 1(86), pp. 17–22. (in Russ.)
- Semenov V.V., Lebedev I.S. Scientific and Technical Journal of Information Technologies, Me-chanics and Optics, 2019, no. 3(19), pp. 105–111. (in Russ.)
- Sikarev I.A., Sakharov V.V., Garanin A.V. Automatic Control and Computer Sciences, 2020, no. 8(54), pp. 894–897.
- Sikarev I.A., Chistyakov G.B., Garanin A.V., Moskvin D.A. Automatic Control and Computer Sciences, 2020, no. 8(54), pp. 962–965.