scholarly journals Method of Early Detection of Cyber-Attacks on Telecommunication Networks Based on Traffic Analysis by Extreme Filtering

Energies ◽  
2019 ◽  
Vol 12 (24) ◽  
pp. 4768 ◽  
Author(s):  
Andrey Privalov ◽  
Vera Lukicheva ◽  
Igor Kotenko ◽  
Igor Saenko

The paper suggests a method of early detection of cyber-attacks by using DDoS attacks as an example) using the method of extreme filtering in a mode close real time. The process of decomposition of the total signal (additive superposition of attacking and legitimate effects) and its decomposition using the method of extreme filtering is simulated. A profile model of a stochastic network is proposed. This allows to specify the influence of the intruder on the network using probabilistic-time characteristics. Experimental evaluation of metrics characterizing the cyber-attack is given. It is demonstrated how obtained values of metrics confirm the process of attack preparation, for instance the large-scaled telecommunication network, which includes the proposed method for early detection of attacks, has a recovery time of no more than 9 s, and the parameters of quality of service remain in an acceptable range.

2018 ◽  
pp. 12-18
Author(s):  
Vladimir Baranov ◽  
Mikhail Kotsynyak ◽  
Denis Ivanov

The main trend in recent years is the shift of emphasis from mass attacks to targeted (target) attacks, which are the actions of the enemy of a particular state or non-state structure in advance. The target attack is always built under the object of influence, being a thoughtful operation, not a simple technical action. Target cyber attack on the element of information and telecommunication network is implemented in the form of a set of activities aimed at studying the information system and software. This allows for revealing weaknesses in the structure of the information and telecommunication network. The authors develop the technique of hidden introduction and bypass of standard means of information protection, fix the infrastructure, distribute the harmful action. Under the impact of a targeted cyber attack, it is difficult to choose the methods and means of protecting the information and telecommunication network, as their resource is limited. One of the ways to resolve this contradiction is a differentiated approach to the protection of information and telecommunication network, which is to choose the most relevant for the current situation areas of protection. The article deals with the problem of targeted attacks proliferation and describes the principle of their realization. The authors also substantiate the need of working out the methodology for estimating the impact of targeted cyber attacks by the enemy on information and telecommunications networks as well as their key elements. The special attention is paid to the purpose and structure of this methodology. The authors describe the stages of targeted cyber attack and its application areas.


Author(s):  
А.Ю. Иванов ◽  
В.И. Комашинский ◽  
А.Н. Соколов

Внедрение интеллектуальных транспортных систем позволяет перейти на качественно новый уровень решения транспортно-логистических задач произвольного масштаба. Интеллектуализация основана на широком использовании информационно-телекоммуникационных сетей и систем, ориентированных на реализацию передовых и перспективных информационных технологий. В этом аспекте проявляется актуальность и важность построения коммуникационной среды, обеспечивающей передачу разнородного контента с требуемым уровнем качества. Материал статьи сосредоточен на разработке математического аппарата в рамках теории массового обслуживания с целью прогностического анализа характеристик качества обслуживания сообщений в информационно-телекоммуникационной сети водного транспорта. Осуществлена постановка задачи нахождения значений показателей качества обслуживания пакетов данных в сети. Обоснованы и получены основные математические соотношения. Оценена корректность разработанного математического инструментария. Показана возможность решения как прямых, так и обратных задач исследования информационно-телекоммуникационных систем в приведенной постановке. На этом основании сформулированы рекомендации по практическому применению результатов, полученных в статье. The introduction of intelligent transport systems allows you to move to a qualitatively new level of solving transport and logistics problems of any scale. Intellectualization is based on the widespread use of information and telecommunication networks and systems focused on the implementation of advanced and promising information technologies. This aspect demonstrates the relevance and importance of building a communication environment that ensures the transfer of heterogeneous content with the required level of quality. The material of the article is focused on the development of a mathematical apparatus within the framework of the queuing theory for the purpose of predictive analysis of the characteristics of the quality of service of messages in the information and telecommunication network of water transport. The formulation of the problem of finding the values of quality indicators of service of data packets in the network is carried out Basic mathematical relations are substantiated and obtained. The correctness of the developed mathematical tools is assessed. The possibility of solving both direct and inverse problems of researching information and telecommunication systems in the given formulation is shown. On this basis, recommendations were formulated for the practical application of the results obtained in the article.


2020 ◽  
Vol 3 (2) ◽  
pp. 348-356
Author(s):  
Sutikno Sutikno ◽  
Sandu Siyoto ◽  
Byba Melda Suhita

Hospitals are required to always improve the quality of service provided to patients. These challenges have forced the hospital to develop its ability to manifest in various aspects of health care quality responsible. One of them by applying the assessment and early detection in patients kegawatan as well as the critical state of activation becomes very important. Quick and proper response to a nurse against the worsening conditions of patients giving a great impact to the quality of the quality of service provided. The purpose of this research is to analyze the implementation of Early Warning systems (EWSS) Score against AvLOS and trust patients in Inpatient installation at Jombang General Hospitals. The research design was analytic observational with a quantitative approach. Research variables i.e. implementation of EWSS as independent variables. AvLos and trust patients as the dependent variable. The population of this entire research nurses in Inpatient installation at Jombang General Hospitals as much as 135 nurses, patients and families of patients who are being treated in Inpatient installation at Jombang General Hospitals Jombang. Samples taken with the cluster random sampling technique as much as 101 respondents. Data is collected with instruments ceklist and processed in coding, editing, tabulating and scoring as well as tested with logistics regression test. Logistic regression results indicate that partially and simultaneously show that the value of p values < 0.05 so that there were the implementation of Early Warning systems (EWSS) Score against AvLOS and trust of the patient, and the simultaneous influence of 83.2%. The existence of implementation of EWSS in patients with good then early detection and response officers can be done in a proper and effective against the condition and the healing of patients and can shorten the day care patients, so that it can affect the confidence and trust family and patient in receiving health services in the hospital


Author(s):  
Evelina Pencheva ◽  
Ivaylo Atanasov

Parlay X is a set of Web Service interfaces. These interfaces are designed to provide open access to telecommunication network functions in order to hide underlying network technology, and its control protocol complexity, from application developers. The Parlay X “intelligence” is concentrated in a node called Parlay X Gateway which converts interfaces methods in protocol messages and vice versa. An inherent constraint on any implementation requires the Parlay X Gateway to govern the interface to the underlying network i.e., to provide a single point of contact at which vertical signaling is received from the network. This chapter presents a study on alternatives for Parlay X Web Service deployment in Internet Protocol based multimedia networks (IMS). The focus is set on Parlay X Web Services for application-driven quality of service (QoS) management and charging control. It is presented as an analysis of the interfaces. Particularly the discussion is about their applicability to Policy and Charging Control architecture in IMS. Going further, the Web Service interfaces are mapped onto network protocols that they affect, namely Session Initiation Protocol (SIP) and Diameter. On that base an improvement is suggested concerning Parlay X interfaces for QoS management without violating the specified interface functionality. The usage of Web Services is exemplified with an application for charging control based on the provided QoS.


2020 ◽  
Vol 10 (22) ◽  
pp. 8223
Author(s):  
Mykola Beshley ◽  
Peter Veselý ◽  
Andrii Pryslupskyi ◽  
Halyna Beshley ◽  
Marian Kyryk ◽  
...  

The rapid development and spread of communication technologies is now becoming a global information revolution. Customers have a need for communication services, which could be flexibly configured in accordance with their Quality of Experience (QoE) requirements. Realizing the close connection between customer experience and profitability, the service provider has been placing more and more attention on customer experience and QoE. The traditional quality of service management method based on SLA (Service Level Agreement) is not sufficient as a means to provide QoE-related contracts between service providers and customers. The current SLA method is mostly limited and focused on technical aspects of QoS (Quality of Service). Furthermore, they do not follow on the network the principles and semantic approach to the QoS specification for a communication service using QoE parameters. In this paper, we propose a customer-oriented quality of service management method for future IBN (Intent-Based Networking). It is based on a new QoE metric on a scale from 1 to 5, which allows one to take into account the commercial value of e-services for customers. Based on this approach, the network configuration and functionality of network equipment automatically changes depending on customer requirements. To implement the new method of service quality management, an algorithm for routing data packets in the network was developed, taking into account the current load of the forecast path. The algorithm of billing system functioning in conditions of customer-oriented quality management in telecommunication networks has been created. To investigate the effectiveness of the proposed method of service quality management with the traditional SLA method, we developed a simulation network model with the implementation of two approaches. By conducting a simulation, it was determined that the proposed method gives an average gain of 2–5 times for the criterion of the number of customers who require high quality of experience of the service.


T-Comm ◽  
2020 ◽  
Vol 14 (11) ◽  
pp. 72-76
Author(s):  
Zain-aalabdain Al-namer ◽  

The European Telecommunications Standards Institute (ETSI) recommends that IP-telephony networks be divided into four classes according to the quality of service (quality of network services) QoS, the main indicator of which is packet delay (Y.1541). ITU-T Recommendation G.114 for public switched telephone networks provides delays close to ETSI gradations that correspond to different types of communication. The quality of the service from the user's point of view can be expressed by a set of indicators. These metrics are described in terms that are understandable to both the user and the service, and are independent of the network structure. Quality of service indicators are focused primarily on the effect perceived by the user, must be guaranteed to the user by the service and be objectively measured at the point of access to the service (ITU-T Recommendation I.350). ITU-T Recommendation E.862 provides possible approaches to accounting for the economic losses of the operator (in planning, design, operation and telecommunication network) and the user associated with technical failures. Operators of networks, working in market conditions, are interested in assessing possible losses due to failures and in comparing them with the costs of increasing the reliability of their funds.


Author(s):  
Chris Gay ◽  
Barry Horowitz ◽  
John Elshaw ◽  
Philip Bobko ◽  
Inki Kim

Cyber-attacks against cyber-physical systems (CPS), such as unmanned vehicles, are emergent threats with potentially catastrophic impacts, and this issue has drawn considerable interest by military agencies. Abundant body of research has attempted to address the physical security aspects of CPS; however, research addressing the human dimensions of cyber-attack detection and responses from an operator and operational perspective is sparse. This research has provided a novel probe into the human factors affecting operator resilience in responding to cyber-attacks, which are situations characterized by uncertainty and malicious intent. The variability of individual operators makes it improbable to grasp the full range of factors contributing to operator performance; however, the application of Suspicion Theory as proposed by Bobko et al. (2013), provides a starting point to aid in understanding operator performance in situations involving malicious intent (e.g. a cyber-attack). According to the theory, malicious intent is a critical component of operator suspicion, which is a key factor in operator response to cyber-attacks. The current research explored this human dimension through scenario-based, human-in-the-loop simulation experiments with Air Force personnel. It included both abstract and empirical assessments of the application of Suspicion Theory to operator detection and responses to cyber-attacks against an unmanned vehicle system, and it took a systems-oriented approach to the problem by considering the interaction of a Human-Machine Team (HMT) in the response. The HMT here refers to an operator and a Sentinel, which is an automated cyber-attack detection aid. The study evaluated the effects of suspicion, as well as the effects of perceived consequence, on the operator, and the resulting HMT quality of performance in responding to alerts, including both false alarms and properly detected cyber-attack scenarios. The findings show that Sentinel alerts alone do not create operator suspicion. Instead, alerts can serve as a catalyst for a wider information search by the operator, which, on a situational basis can lead to formation of increased operator suspicion. The analysis of experimental results pointed to a negative correlation between operator suspicion and performance score that measured the quality of a response to the given scenario. In addition, a strong correlation between HMT performance score and task response time was noted.


Sign in / Sign up

Export Citation Format

Share Document