12 research outputs found

    Classification of Existing Virtualization Methods Used in Telecommunication Networks

    Full text link
    This article studies the existing methods of virtualization of different resources. The positive and negative aspects of each of the methods are analyzed, the perspectivity of the approach is noted. It is also made an attempt to classify virtualization methods according to the application domain, which allows us to discover the method weaknesses which are needed to be optimized.Comment: 4 pages, 3 figure

    Decrypting SSL/TLS traffic for hidden threats detection

    Full text link
    The paper presents an analysis of the main mechanisms of decryption of SSL/TLS traffic. Methods and technologies for detecting malicious activity in encrypted traffic that are used by leading companies are also considered. Also, the approach for intercepting and decrypting traffic transmitted over SSL/TLS is developed, tested and proposed. The developed approach has been automated and can be used for remote listening of the network, which will allow to decrypt transmitted data in a mode close to real time.Comment: 4 pages, 1 table, 1 figur

    Sustainability Research of the Secure Wireless Communication System with Channel Reservation

    Get PDF
    The paper presents the research of the stability of the system with redundancy of communication channels. For this, two prototypes have been developed that are built (1) according to the classical circuit-switched scheme and (2) with aggregation of several virtual channels. Prototyping, installation on various vehicles and measurements of the stability of the entire system as a whole were carried out. The paper also presents structural diagrams, hardware, and a list of problems and difficulties that the authors encountered during the practical implementation and implementation of these systems. In the future, it is planned to expand the study of these systems when working with high-level channel virtualization and the search for methods to accelerate its work

    Experimental Evaluation of an Accelerating Lens on Spatial Field Structure and Frequency Spectrum

    Get PDF
    The results of experimental studies of the effect of an accelerating metal plate lens used to increase the signal level in the direction of the remote subscriber of the wireless access system on the frequency spectrum of the received signal, the field structure in the horizontal and vertical plane, and polarization are presented. An insignificant (up to 20 kHz) narrowing of the spectrum of the radio signal of the Wi-Fi system using a lens was revealed. The effect of the lens on the field distribution in the azimuthal plane is clarified. The angular parameters of the shading areas are estimated where the reception conditions worsen when the lens is located near the access point. In the vertical plane, the lens significantly narrows the angular sector of the radiation. The measurements were carried out under conditions typical of such systems. A brief description of the measuring complex developed for these studies is given

    Implementation of the CSIDH Algorithm Model on Supersingular Twisted and Quadratic Edwards Curves

    Get PDF
    The properties of twisted and quadratic supersingular Edwards curves forming pairs of quadratic torsion with the order p + 1 over the simple field Fp are considered. A modification of the CSIDH algorithm using the isogenies of these curves in replacement of the extended arithmetic’s of the isogenies of curves in the Montgomery form is presented. The isogeny parameters of the CSIDH algorithm model are calculated and tabulated on the basis of the theorems proved in the previous work. The example of Alice’s and Bob’s calculations according to the non-interactive Diffy-Hellman circuit, illustrating the separation of their secrets, is considered. The use of the known projective (W:Z)-coordinates for the given classes of curves provides the fastest execution of the CSIDH algorithm to-date

    Invasion Detection Model using Two-Stage Criterion of Detection of Network Anomalies

    Get PDF
    The article considers the methods that affect the operation of the intrusion detection system. Using the β€œdisconnection task,” a two-stage criterion for detecting anomalies in computer networks has been formed, which provides an analysis of network infrastructure characteristics and their identification with specific computer attacks and provides the ability to respond to possible attacks in real-time

    Analysis of Encryption Key Management Systems:Strengths, Weaknesses, Opportunities, Threats

    No full text

    Sustainability research of the secure wireless communication system with channel reservation

    No full text
    The paper presents the research of the stability of the system with a redundancy of communication channels. For this, two prototypes have been developed that are built (1) according to the classical circuit-switched scheme and (2) with an aggregation of several virtual channels. Prototyping, installation on various vehicles and measurements of the stability of the entire system as a whole were carried out. The paper also presents structural diagrams, hardware, and a list of problems and difficulties that the authors encountered during the practical implementation and implementation of these systems. In the future, it is planned to expand the study of these systems when working with high-level channel virtualization and the search for methods to accelerate its work. Β© 2020 IEEE.This scientific work was partially supported by RAMECS and self-determined research funds of CCNU from the colleges’ primary research and operation of MOE (CCNU19TS022).Β open access</p
    corecore