IMPROVING THE METHOD OF SEARCHING DIGITAL ILLEGAL MEANS OBTAINING INFORMATION BASED ON CLUSTER ANALYSIS

Authors

DOI:

https://doi.org/10.37943/AITU.2020.99.72.006

Keywords:

information protection, inbound device, multiagent system, clusterization

Abstract

Іn the article the possibilities of the multipositional technology of searching digital insertion devices are investigated based on clustering. Existing means of detecting radiation of digital illegal means obtaining information reception show that they are ineffective on the background of legal signals of a multiagent medium.
The constant improvement of digital illegal means obtaining information, masking their work under the signals of legal transmitters require the search for new approaches to the recognition and localization of these means. Prospects for the development of search technology today are associated with the creation of multi-position permanent detection and localization systems. However, the detection problem requires the recognition of harmful radiation on the set of statistics of signal parameters in the air by solving the problem of clustering.
The disadvantages of most classical clustering methods are the need for prior knowledge of the possible number of clusters and a sufficiently high interactiveness, which complicates their practical application, especially in real-time. At the same time, intelligent multi-agent methods are free from these shortcomings, although their application remains quite complicated.
The problem of recognizing the harmful signal against the background of similar legal signals is possible by using the method of a bee colony with direct communication between agents. In this case, the agents are individual elements of the multi-machine complex, which scan the ether at different points in space, then exchanging results with other agents, and, finally, come to a common conclusion about the nature of the signal.
Full-scale studies have been carried out that confirm the reliability of clusterization by 6 ...12% compared to the classic k-medium method.

Author Biographies

O. Laptiev, State University of Telecommunications

Doctor of Technical Sciences, Professor Department of Information and Cybersecurity Systems

V. Savchenko, State University of Telecommunication

Doctor of Technical Sciences, Professor, Director of Cybersecurity Institute

Y. Kravchenko, Taras Shevchenko National University of Kyiv

Doctor of technical science, Professor, Head of the Department of Networking and Internet Technologies

O. Barabash, National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”

Doctor of Technical Sciences, Professor, Professor of the Department of Automation of Designing of Energy Processes and Systems

References

Yakovliev, A., and Lys, O. (2013). Special technical means of secret gathering of information. Scientific works [Petro Mohyla Chornomorsk State University of the Kyiv-Mohyla Academy]. Ser.: Computer technology. T. 229, No. 217, 39-43.

Digital direction finder “Rohde & Schwarz DDF0xE” / Technology for special services, Bureau of Scientific and Technical Information, founded in 1999. [Electronic resource] access mode: http://www.bnti.ru/des.asp?itm=4446&tbl =04.01.01.01.01.

Holembo, V., & Muliarevych, O. (2011). Modification of the goosebump colony method for the development of traveling salesman tasks by a group of autonomous agents. Bulletin of the National University “Lvivska Politechnika”. No. 717: Computer systems and systems, 24-30.

Danchuk, V. & Svatko, V. (2010). Optimization of the number of routs according to the graph in problems of logistic by the method of a modified goosebump algorithm. Bulletin of the National Transport University. No. 20, 109-114. - Access mode: http://nbuv.gov.ua/UJRN/Vntu_2010_20_21.

Khyzhniak, I., Makoveichuk, O., Khudov, R., Podlipaiev, V., Horban, H., & Khudov H. (2018). The method of swarm intelligence (piece bee colony (ABC)) of thematic segmentation of optical-electronic imaging. Control systems, navigation and communication, issue 2 (48), 91-96. DOI: 10.26906/SUNZ.2018.2.091

Davidović, T., Teodorović, D., & Selmic, M. (2015). Bee Colony Optimization – part I: The algorithm overview. Yugoslav Journal of Operations Research, 25, 33-56.

Wahid, A. Subhra, C., & Behera, D. (2015). Mohapatra Artificial Bee colony and its Application: An Overview. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 4(4), 1475–1480.

Korotin, S., Kravchenko, Y., Starkova, O., Herasymenko, K., & Mykolaichuk, R. (2019). Analytical determination of the parameters of the self-tuning circuit of the traffic control system on the limit of vibrational stability, International Scientific-Practical Conference Problems of Infocommunications Science and Technology, PIC S&T`– Proceedings, 471–476.

Rakushev, M., Permiakov, O., Tarasenko, S., Kovbasiuk, S., Kravchenko, Y., & Lavrinchuk, O. (2019). Numerical Method of Integration on the Basis of Multidimensional Differential-Taylor Transformations. In Proceedings of the IEEE International Scientific-Practical Conference Problems of Infocommunications Science and Technology, PIC S&T`2019. Proceedings, 675-678.

Kravchenko, Y., Leshchenko, O., Dakhno, N., Trush, O., & Makhovych O. Evaluating the effectiveness of cloud services. IEEE International Conference on Advanced Trends in Information Theory, ATIT`2019 – Proceedings, 120–124.

Savchenko, V., Ilin, O., Hnidenko, N., Tkachenko, O., Laptiev, O., & Lehominova, S. (2020). Detection of Slow DDoS Attacks based on User’s Behavior Forecasting. International Journal of Emerging Trends in Engineering Research (IJETER), vol. 8. no. 5, – ISSN 2347–3983. 2019–2025.

Savchenko, V., Syrotenko, A., Shchypanskyi, P., Matsko, O., & Laptiev, O. (2020). The Model of Localization Precision for Detection of Hidden Transmitters. International Journal of Innovative Technology and Exploring Engineering (IJITEE), vol. 9, no.4, ISSN: 2278–3075. 2114–2119.

Barabash, O., Laptiev, O., Tkachev, V., Maystrov, O., Krasikov, O., & Polovinkin, I. (2020). The Indirect method of obtaining Estimates of the Parameters of Radio Signals of hidden means of obtaining Information. International Journal of Innovative Technology and Exploring Engineering (IJITEE), Scopus, 8 (8), 4133–4139.

Stefurak, O., Tikhonov, Y., Laptіev, O., & Zozulya, S. (2020). Improving the stochastic model to identify threats of damage or unauthorized leakage. Modern information protection: scientific and technical journal. K.: DUT, no. 2 (42), 19-26.

Laptіev, O.A, Babenko, R.V, Pravdyvy, A.M, Zozulya, S.A, Stefurak, O.R. (2020). Improved methodology for selecting the sequence of priorities for servicing information flows. Scientific and practical journal «Communication». K.: DUT, 4 (146), 45-49.

Oleksandr, L., Biehun, A., Hohoniants, S., Lisnevskyi, R., Pravdyvyi, A., & Lazarenko, S. (2020). Method of detecting signals of means of hidden obtaining of information on the basis of approximation of T-spectrum. The Intelligent Control System for infocommunication networks. International Journal of Emerging Trends in Engineering Research (IJETER), vol. 8, no. 10, 6835-6841.

Laptiev, O., Savchenko, V., Ablazov, I., Lisnevskyi, R., Kolos, O., & Hudyma, V. (2020). Method of detecting random signals based on determining the deviations of the main parameters of radio signals. International Journal of Advanced Trends in Computer Science and Engineering (IJATCSE), vol. 9, no. 5, 9204–9209.

Yevseiev, S., Korolyov, R., Tkachov, A., Laptiev, O., Opirskyy, I., & Soloviova, O. (2020). Modification of the algorithm (OFM) S-box, which provides increasing crypto resistance in the post-quantum period. International Journal of Advanced Trends in Computer Science and Engineering (IJATCSE,) vol. 9, no. 5, 8725-8729.

Laptev, A.A. Sachenko, V.A., Barabash, O.V. Sachenko, V.V., & Matsko A.I. (2019). The method of searching for digital means of illegal obtaining of information on the basis cluster analysis. Magyar Tudományos Journal. Budapest, Hungary, no. 31, 33–37

Laptev, A.A., Barabash, O.V., Savchenko, V.V., Savchenko, V.A., & Sobchuk, V.V. (2019). The method of searching for digital means of illegal reception of information in information systems in the working range of Wi-Fi. International Journal of Advanced Research in Science, Engineering and Technology. Indiа, ISSN: 2350-0328, 6 (7), 10101–10105.

Hryshchuk, R., Korobiichuk, S., Ivanchenk, O., Roma, & A. Golishevsky. (2019). The Throughput of Technical Channels as an Indicator of Protection Discrete Sources from Information Leakage. Computer Modeling and Intelligent Systems, 2353, 523–532.

Korobiichuk, I., Ivanchenko, S., Havrylenko, O., Golishevsky, A., Hnatiuk, S., & Hryshchuk, R. (2019). Protection of information from leakage by technical channels for sources with non range distribution of probability. In CEUR Workshop Proceedings, 992-1003.

Hryshchuk, R., Korobiichuk, I., Horoshko, V., Khokhlacheva, Y. (2019). Microprocessor Means for Technical Diagnostics of Complex Systems. Computer Modeling and Intelligent Systems, vol. 2353, 1020–1029.

Downloads

Published

2020-09-30

How to Cite

Laptiev, O., Savchenko, V., Kravchenko, Y., & Barabash, O. (2020). IMPROVING THE METHOD OF SEARCHING DIGITAL ILLEGAL MEANS OBTAINING INFORMATION BASED ON CLUSTER ANALYSIS. Scientific Journal of Astana IT University, 3(3), 63–70. https://doi.org/10.37943/AITU.2020.99.72.006

Issue

Section

Information Technologies
betpas
pendik escort anadolu yakasi escort bostanci escort kadikoy escort kartal escort kurtkoy escort umraniye escort
maltepe escort ataşehir escort ataşehir escort ümraniye escort pendik escort kurtköy escort anadolu yakası escort üsküdar escort şerifali escort kartal escort gebze escort kadıköy escort bostancı escort göztepe escort kadıköy escort bostancı escort üsküdar escort ataşehir escort maltepe escort kurtköy escort anadolu yakası escort ataşehir escort beylikdüzü escort