Markov models of Defense Means for Automated Special-Purpose Systems
Učënye zapiski Kazanskogo universiteta. Seriâ Fiziko-matematičeskie nauki, Kazanskii Gosudarstvennyi Universitet. Uchenye Zapiski. Seriya Fiziko-Matematichaskie Nauki, Tome 150 (2008) no. 4, pp. 41-53 Cet article a éte moissonné depuis la source Math-Net.Ru

Voir la notice du chapitre de livre

The paper specifies characteristics of information weapon samples. Markov models of switch and firewall functioning are built. On the basis of these models the evaluated calculations of the sample characteristics are carried out and the method of the defense means viewing is formed using Markov process theory.
Keywords: Markov models, switches, firewalls, DOS-attacks.
@article{UZKU_2008_150_4_a2,
     author = {G. M. Teptin and K. V. Ivanov},
     title = {Markov models of {Defense} {Means} for {Automated} {Special-Purpose} {Systems}},
     journal = {U\v{c}\"enye zapiski Kazanskogo universiteta. Seri\^a Fiziko-matemati\v{c}eskie nauki},
     pages = {41--53},
     year = {2008},
     volume = {150},
     number = {4},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/UZKU_2008_150_4_a2/}
}
TY  - JOUR
AU  - G. M. Teptin
AU  - K. V. Ivanov
TI  - Markov models of Defense Means for Automated Special-Purpose Systems
JO  - Učënye zapiski Kazanskogo universiteta. Seriâ Fiziko-matematičeskie nauki
PY  - 2008
SP  - 41
EP  - 53
VL  - 150
IS  - 4
UR  - http://geodesic.mathdoc.fr/item/UZKU_2008_150_4_a2/
LA  - ru
ID  - UZKU_2008_150_4_a2
ER  - 
%0 Journal Article
%A G. M. Teptin
%A K. V. Ivanov
%T Markov models of Defense Means for Automated Special-Purpose Systems
%J Učënye zapiski Kazanskogo universiteta. Seriâ Fiziko-matematičeskie nauki
%D 2008
%P 41-53
%V 150
%N 4
%U http://geodesic.mathdoc.fr/item/UZKU_2008_150_4_a2/
%G ru
%F UZKU_2008_150_4_a2
G. M. Teptin; K. V. Ivanov. Markov models of Defense Means for Automated Special-Purpose Systems. Učënye zapiski Kazanskogo universiteta. Seriâ Fiziko-matematičeskie nauki, Kazanskii Gosudarstvennyi Universitet. Uchenye Zapiski. Seriya Fiziko-Matematichaskie Nauki, Tome 150 (2008) no. 4, pp. 41-53. http://geodesic.mathdoc.fr/item/UZKU_2008_150_4_a2/

[1] Slipchenko V. I., Voiny shestogo pokoleniya. Oruzhie i voennoe iskusstvo buduschego, Veche, M., 2002, 384 pp.

[2] Grinyaev S. N., Intellektualnoe protivodeistvie informatsionnomu oruzhiyu, Sinteg, M., 1999, 232 pp.

[3] Prokofev V. D., Tainoe oruzhie informatsionnoi voiny, Informatizatsiya Rossiya na poroge XXI veka, Sinteg, M., 1999, 152 pp.

[4] Kiselëv V. D., Esikov O. V., Kislitsyn A. S., Zaschita informatsii v sistemakh eë peredachi i obrabotki, ed. E. M. Sukharëv, Solid, M., 2000, 200 pp.

[5] Otyutskii G. P., “K voprosu o suschnosti voenno-tekhnicheskoi revolyutsii”, Voennaya mysl, 1998, no. 2

[6] Golubev V. O., Rozsliduvannya komp'yuternikh zlochiniv, Gumanitarnii universitet “ZIMTU”, Zaporizhzhya, 2003, 296 pp.

[7] Shrinivas V., Kachestvo obsluzhivaniya v setyakh IP, Per. s angl., Izd. dom “Vilyams”, M., 2003, 368 pp.

[8] Larionov A. M. i dr., Vychislitelnye kompleksy, sistemy i seti, Energoatomizdat, L., 1987, 288 pp.

[9] Tomashevskii O. V., “Viznachennya nadiinosti tekhnichnikh zasobiv zakhistu informatsiï”, Informatsiini tekhnologiï ta zakhist informatsiï: Zb. nauk. prats, 1999, no. 1, 97–103

[10] Vishnevskii V. M., Teoreticheskie osnovy proektirovaniya kompyuternykh setei, Tekhnosfera, M., 2003, 512 pp.

[11] Melnikov V. A., Zaschita informatsii v kompyuternykh sistemakh, Finansy i statistika, M., 1997, 368 pp. | Zbl

[12] Rastorguev S. P., Informatsionnaya voina. Problemy i modeli. Ekzistentsialnaya matematika, Gelios ARV, M., 2006, 240 pp.

[13] Grinyaev S. N., Pole bitvy – kiberprostranstvo: teoriya, priëmy, sredstva, metody i sistemy vedeniya informatsionnoi voiny, Kharvest, Minsk, 2004, 448 pp.

[14] Ivanov K. V., “Sistemotekhnika sredstv porazheniya i zaschity avtomatizirovannykh sistem upravleniya spetsialnogo naznacheniya”, Nauka. Promyshlennost. Oborona, Trudy VII Vseros. nauch.-tekhn. konf., NGTU, Novosibirsk, 2006, 172–176

[15] Aven O. P., Gurin N. N., Kogan Ya. A., Otsenka kachestva i optimizatsiya vychislitelnykh sistem, Nauka, M., 1982, 464 pp.

[16] Sovremennye tekhnologii kommutatsii (urovni kommutatsii), http://itelltd.kiev.ua/?page=articles&aid=35

[17] Makarenko A. V., “Model dinamiki kommutatora Gigabit Ethernet”, Zhurn. radioelektroniki, 2001, no. 11; http://jre.cplire.ru/jre/nov01/2/text.html

[18] Tikhonenko O. M., Modeli massovogo obsluzhivaniya v informatsionnykh sistemakh, UP “Tekhnoprint”, Minsk, 2003, 327 pp.

[19] Scheglov A., Scheglov K., Kompyuternaya bezopasnost. Chast 7. Otsenka vliyaniya dobavochnykh sredstv zaschity ot nesanktsionirovannogo dostupa na zagruzku vychislitelnogo resursa zaschischaemogo ob'ekta, , 2005 http://daily.sec.ru/dailypblshow.cfm?rid=45&pid=12453

[20] Piskunov N. S.\, Differentsialnoe i integralnoe ischisleniya dlya VTUZov, Fizmatgiz, M., 1961, 748 pp.

[21] Olifer V. G., Olifer N. A., Kompyuternye seti: printsipy, tekhnologii, protokoly, Piter, M., 2006, 957 pp.

[22] Ivanov K. V., “Raschët razmerov bufernoi pamyati i vremeni zaderzhki kadrov v kommutatore OptiSwitch”, Vestn. KGTU, 2007, no. 4, 57–60

[23] Lebed S. V., Mezhsetevoe ekranirovanie. Teoriya i praktika zaschity vneshnego perimetra, Izd-vo MGTU im. Baumana, M., 2002, 304 pp.

[24] Protokol upravleniya peredachei. Programmnaya spetsifikatsiya protokola DARPA INTERNET, Razumnye seti ot kompanii BiLiM Systems http://www.protocols.ru/files/RFC/rfc793.pdf