Telecommunication systems, networks and devices
TRAFFIC OPTIMIZATION APPLYING MACHINE LEARNING METHODS
|
D. Alekseeva, A. Marochkina, A. Paramonov
|
Read
Abstract: Future networks bring higher communication requirements in latency, computations, data quality, etc. The attention to various challenges in the network field through the advances of Artificial Intelligence (AI), Machine Learning (ML) and Big Data analysis is growing. The subject of research in this paper is 4G mobile traffic collected during one year. The amount of data retrieved from devices and network management are motivating the trend toward learning-based approaches. The research method is to compare various ML methods for traffic prediction. In terms of ML, to find a solution for a regression problem using the ensemble models Random Forest, Boosting, Gradient Boosting, and Adaptive Boosting (AdaBoost). The comparison was based on the quality indicators RMSE, MAE, and coefficient of determination. In the result Gradient Boosting showed the most accurate prediction. Using this ML model for mobile traffic optimization could improve network performance.
Keywords: machine learning, optimization, Internet, traffic.
DOI 10.31854/2307-1303-2021-9-1-1-12 |
A STUDY OF WI-FI PERFORMANCE IN STUDENT DORMITORIES IN THE LIGHT OF A PANDEMIC AND DISTANCE LEARNING
|
A. Antonenko, R. Dunaytsev
|
Read
Abstract: High-speed access to information resources and services via the Internet is necessary for students not only at the university, but in dormitories as well. This became especially important during the COVID-19 pandemic with forced self-isolation and distance learning. Research subject. In this paper, we present the results of a performance evaluation study of Wi-Fi networks in SUT dormitories. Method. To achieve this goal, the following methods of empirical research were used: measurement, experiment, and survey. Core results. The first part of the study is devoted to the results of an online survey conducted among SUT students regarding the use of Wi-Fi in dormitories. In the second part of the study, experimental data on measuring the throughput of wired and wireless channels in one of the rooms of SUT dormitory "Rybatskoye" are presented. Practical relevance. The obtained results can be used for designing Wi-Fi network in student dormitories and connecting them to the Internet.
Keywords: Wi-Fi, dormitory, access point.
DOI 10.31854/2307-1303-2021-9-1-13-25
|
THE CONCEPT OF MULTICAST PROTOCOL BASED ON NETWORK CODING
|
S. Vladimirov, A. Fomin
|
Read
Abstract: Research subject. The paper presents the concept of a multicast session protocol based on the network coding method. Method. Development of a data transfer protocol based on the analysis of existing principles and models of network coding. Core results. The proposed NCDP multicast protocol is designed to work over a datagram transport protocol. The basic structure of the NCDP packet header has been developed, taking into account the variability of the protocols used in conjunction with NCDP. Practical relevance. The proposed protocol is intended for use in content delivery systems based on multicast data transmission from several sources.
Keywords: multicast, network protocol, network coding.
DOI 10.31854/2307-1303-2021-9-1-26-36
|
MODEL OF THE IOT ACCESS NETWORK BASED ON THE CELL STRUCTURE
|
A. Paramonov, S. Bushelenkov
|
Abstract: The article analyzes the problems of implementation access networks in high-density communication networks, proposes a method for assessing the achievable data transfer rate, taking into account the mutual influences of network nodes, as well as a method for constructing the logical structure of the network. The possibility of constructing a network model in the form of a cell structure for which the methods of percolation theory are applicable is considered. The use of these methods makes it possible to obtain a structure with specified properties, which makes it possible to ensure the required quality of network functioning.
Keywords: access network, Internet of things, connectivity, percolation theory, lattice structure.
DOI 10.31854/2307-1303-2021-9-1-37-46
|
DEVELOP SECURITY SCRIPTS TO CREATE VULNERABLE VIRTUAL MACHINES AND LEARN PENETRATION TESTING TECHNIQUES
|
S. Shterenberg, A. Moskalchuk, A. Krasov
|
Abstract: The article demonstrates the concept of building a laboratory for penetration testing using a special program. The program is a set of scripts that configure the system in accordance with a userdefined script. Thanks to the elements of script randomization, this solution allows you to deploy several educational tasks at once to a group of students using only one virtual machine image. The basic idea is that the setup and creation of a vulnerable target occurs just before the execution of the learning task itself. Those, the virtual machine is initially a basic Ubuntu Linux image that does not have any set of vulnerabilities. The main feature of the proposed solution is that the content of the scripts describes not one variant of the system configuration, but several at once, forming scripts with elements of randomization. In other words, having a basic Ubuntu Linux image and a set of the scripts, you can create different tasks for a dozen students.
Keywords: information security, penetration testing, training laboratory, virtualization, CTF.
DOI 10.31854/2307-1303-2021-9-1-47-58
|
Radio engineering, including television systems and devices
MODELING MULTI-BEAM RADIO CHANNEL
|
G. Fokin
|
Abstract: In this work, a simulation model of a radio channel with fading is implemented for use in research of the multipath channel, as well as for assessing the noise immunity of transmission, reception and processing systems in modern and future mobile communication and radio access networks. Formalization of mathematical models of a radio channel with fading, including the Rayleigh amplitude distribution, uniform phase distribution and a given Doppler spectrum, made it possible to visualize the time-frequency and probabilistic characteristics of a radio channel with fading. The implementation of the procedures for delaying and attenuating copies of signals in a multipath radio channel made it possible to reproduce scenarios of flat and frequency selective fading, which are widely used in practice in assessing the noise immunity of signals with given frequency and time characteristics.
Keywords: multipath channel, Jakes model, Rayleigh fading.
DOI 10.31854/2307-1303-2021-9-1-59-78
|
Methods and systems of information protection, information security
METHODOLOGY FOR CONDUCTING STRESS TESTING ON A TARGET WEB SERVER
|
I. Davydovich, V. Zurakhov, I. Ushakov
|
Read
Abstract: This article discusses the methods of an attacker to conduct an attack on a web server and how to protect against them. This methodology contains a description of the stages of preparing an attack and a description of how to protect against them. The aim of the work is to draw up such a methodology, with the help of which it is possible to prevent the majority of hacker attacks. Since Internet technologies have been developing at a rapid pace lately, and companies are moving their businesses to the Internet, the issue of information security is more urgent than ever. One of the methods to defend against malicious attacks is to understand the methodology for attacking a web server. Understanding how an attacker will act in an attack allows you to prevent it in a timely manner and, as a result, avoid consequences. The purpose of this work is: description of the stages that an attacker goes through during an attack on a web server and making recommendations for its protection. To understand the methods of protecting a web server from hacking, it is important to know the concept of its device, how it functions and other elements associated with it.
Keywords: Nmap, Burp Suite, hacker attacks, Directory Monitor, DMZ, pentest.
DOI 10.31854/2307-1303-2021-9-1-79-86
|
RESEARCH OF AUTHENTICATION FAILURE AND ARP INJECT ATTACKS AND METHODS OF THEIR DETECTION IN I EEE 802.11 NETWORKS
|
M. Kovtsur, A. Kistruga, G. Voroshnin, A. Fedorova
|
Read
Abstract: Nowadays, Wi-Fi technology is used everywhere in the world: in the offices of large companies, public places and in simple home premises. However, the use of a public transmission medium leads to the possibility of various attacks. This article discusses attacks such as authentication failure and Address Resolution Protocol inject. The considered attacks have shown high efficiency and danger for wireless networks. In this connection, methods of detection and protection against them were proposed. Methods. At the first stage, the concept of how attacks work, their main idea and purpose, were analyzed. At the subsequent stages, for testing, a laboratory stand was created, on which they were simulated. In the course of the experiments, the effectiveness of attacks was found out, and the main phases of attacks and the elements that contribute to their detection were graphically reflected in the article. Main results. As a result of the work done, it was possible to isolate attack vectors and identify their accompanying anomalies. Based on the research materials, mechanisms for detecting and preventing the attacks under consideration were developed. The practical part. All theoretical and experimental materials collected in the article can be used in detecting and preventing attacks on wireless networks by network administrators and information security specialists.
Keywords: information security, security of wireless networks, authentication failure, ARP inject.
DOI 10.31854/2307-1303-2021-9-1-87-98
|
|
|