Skip to main content

Showing 1–18 of 18 results for author: Radivilova, T

.
  1. The multifractal load balancing method

    Authors: Igor Ivanisenko, Tamara Radivilova

    Abstract: The load-balancing system, built on the basis of a subsystem load balancer and subsystem control and monitoring that closely interact with each other was propose in work. This system is presented as a queuing system with priority service discipline. In the described queuing system parallel processing flow applications occur in the multiple serving devices and successive junction of them into unifi… ▽ More

    Submitted 16 April, 2019; originally announced May 2019.

    Comments: 2 pages, 2 figures. arXiv admin note: substantial text overlap with arXiv:1904.09227

    MSC Class: 68M10 ACM Class: D.4.6; E.3; C.2

    Journal ref: 2015 Second International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T)

  2. Investigation of Multifractal Properties of Additive Data Stream

    Authors: Igor Ivanisenko, Lyudmyla Kirichenko, Tamara Radivilova

    Abstract: The work presents results of a numerical study of fractal characteristics of multifractal stream at addition of stream, which does not have multifractal properties. They showed that the generalized Hurst exponent of total stream tends to one of original multifractal stream with increase in signal/noise ratio.

    Submitted 16 April, 2019; originally announced May 2019.

    Comments: 4 pages, 5 figures, 7 equations. arXiv admin note: text overlap with arXiv:1904.05925

    MSC Class: 90B18 ACM Class: D.4.6; E.3; C.2

    Journal ref: 2016 IEEE First International Conference on Data Stream Mining & Processing (DSMP), Lviv, 2016, pp. 305-308

  3. Time series classification based on fractal properties

    Authors: Vitalii Bulakh, Lyudmyla Kirichenko, Tamara Radivilova

    Abstract: The article considers classification task of fractal time series by the meta algorithms based on decision trees. Binomial multiplicative stochastic cascades are used as input time series. Comparative analysis of the classification approaches based on different features is carried out. The results indicate the advantage of the machine learning methods over the traditional estimating the degree of s… ▽ More

    Submitted 16 April, 2019; originally announced May 2019.

    Comments: 4 pages, 2 figures, 3 equations, 1 table

    MSC Class: 90B18 ACM Class: D.4.6; E.3; C.2

    Journal ref: 2018 IEEE Second International Conference on Data Stream Mining & Processing (DSMP)

  4. The Methods to Improve Quality of Service by Accounting Secure Parameters

    Authors: Tamara Radivilova, Lyudmyla Kirichenko, Dmytro Ageiev, Vitalii Bulakh

    Abstract: A solution to the problem of ensuring quality of service, providing a greater number of services with higher efficiency taking into account network security is proposed. In this paper, experiments were conducted to analyze the effect of self-similarity and attacks on the quality of service parameters. Method of buffering and control of channel capacity and calculating of routing cost method in the… ▽ More

    Submitted 16 April, 2019; originally announced May 2019.

    Comments: 10 pages, 1 figure, 1 equation, 1 table. arXiv admin note: text overlap with arXiv:1904.05202

    MSC Class: 90B18 ACM Class: D.4.6; E.3; C.2

    Journal ref: In: Hu Z., Petoukhov S., Dychka I., He M. (eds) Advances in Computer Science for Engineering and Education II. ICCSEEA 2019. Advances in Intelligent Systems and Computing, vol 938, pp 346-355. 2020. Springer, Cham

  5. Fractal Time Series Analysis of Social Network Activities

    Authors: Lyudmyla Kirichenko, Vitalii Bulakh, Tamara Radivilova

    Abstract: In the work, a comparative correlation and fractal analysis of time series of Bitcoin crypto currency rate and community activities in social networks associated with Bitcoin was conducted. A significant correlation between the Bitcoin rate and the community activities was detected. Time series fractal analysis indicated the presence of self-similar and multifractal properties. The results of rese… ▽ More

    Submitted 10 April, 2019; originally announced May 2019.

    Comments: 4

    MSC Class: 90B18 ACM Class: D.4.6; E.3; C.2

    Journal ref: 2017 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T), Kharkov, Ukraine, 2017, pp. 456-459

  6. Forecasting Weakly Correlated Time Series in Tasks of Electronic Commerce

    Authors: Lyudmyla Kirichenko, Tamara Radivilova, Illya Zinkevich

    Abstract: Forecasting of weakly correlated time series of conversion rate by methods of exponential smoothing, neural network and decision tree on the example of conversion percent series for an electronic store is considered in the paper. The advantages and disadvantages of each method are considered.

    Submitted 16 April, 2019; originally announced April 2019.

    Comments: 4 pages, 4 figures, 1 table

    MSC Class: 90B18 ACM Class: D.4.6; E.3; C.2

    Journal ref: 2017 12th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT)

  7. Calculation of distributed system imbalance in condition of multifractal load

    Authors: Tamara Radivilova, Lyudmyla Kirichenko, Igor Ivanisenko

    Abstract: The method of calculating a distributed system imbalance based on the calculation of node system load was proposed in the work. Calculation of node system load is carried out by calculating the average coefficient of utilization of CPU, memory, bandwidth of each system node, taking into account multifractal properties of input data flows. The simulation of the proposed method for different multifr… ▽ More

    Submitted 16 April, 2019; originally announced April 2019.

    Comments: 4 pages, 3 figures, 6 equations. arXiv admin note: text overlap with arXiv:1904.05218

    MSC Class: 90B18 ACM Class: D.4.6; E.3; C.2

    Journal ref: 2016 Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T), Kharkiv, 2016, pp. 156-158

  8. Dynamic load balancing algorithm of distributed systems

    Authors: Lyudmila Kirichenko, Igor Ivanisenko, Tamara Radivilova

    Abstract: The dynamic load balancing algorithm based on the monitoring server load, self-similar characteristics of passing traffic have to provide a statistically uniform load distribution on servers, high performance, fault tolerance and capacity, low response time, the amount of overhead and losses was propose in work. Integrated measurement for the total imbalance level of the system were entered.

    Submitted 16 April, 2019; originally announced April 2019.

    Comments: 4 pages, 8 equations

    MSC Class: 90B18 ACM Class: D.4.6; E.3; C.2

    Journal ref: 2016 13th International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET), Lviv, 2016, pp. 515-518

  9. Use of Approaches to the Methodology of Factor Analysis of Information Risks for the Quantitative Assessment of Information Risks Based on the Formation of Cause-And-Effect Links

    Authors: Ihor Dobrynin, Tamara Radivilova, Nadiia Maltseva, Dmytro Ageyev

    Abstract: The paper suggests methods to the assessment of information risks, which makes the transition from a qualitative assessment of information risks (according to the factor analysis of information risks methodology) to a quantitative assessment. The development factor analysis of information risks methodology of the methodology was carried out using the mathematical apparatus of probability theory, n… ▽ More

    Submitted 16 April, 2019; originally announced April 2019.

    Comments: 4 pages, 1 figure, 1 table

    MSC Class: 90B18 ACM Class: D.4.6; E.3; C.2

    Journal ref: 2018 International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T)

  10. Decrypting SSL/TLS traffic for hidden threats detection

    Authors: Tamara Radivilova, Lyudmyla Kirichenko, Dmytro Ageyev, Maxim Tawalbeh, Vitalii Bulakh

    Abstract: The paper presents an analysis of the main mechanisms of decryption of SSL/TLS traffic. Methods and technologies for detecting malicious activity in encrypted traffic that are used by leading companies are also considered. Also, the approach for intercepting and decrypting traffic transmitted over SSL/TLS is developed, tested and proposed. The developed approach has been automated and can be used… ▽ More

    Submitted 16 April, 2019; originally announced April 2019.

    Comments: 4 pages, 1 table, 1 figure

    MSC Class: 90B18 ACM Class: D.4.6; E.3; C.2

    Journal ref: 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT)

  11. Classification of Existing Virtualization Methods Used in Telecommunication Networks

    Authors: Dmytro Ageyev, Oleg Bondarenko, Tamara Radivilova, Walla Alfroukh

    Abstract: This article studies the existing methods of virtualization of different resources. The positive and negative aspects of each of the methods are analyzed, the perspectivity of the approach is noted. It is also made an attempt to classify virtualization methods according to the application domain, which allows us to discover the method weaknesses which are needed to be optimized.

    Submitted 16 April, 2019; originally announced April 2019.

    Comments: 4 pages, 3 figures

    MSC Class: 90B18 ACM Class: D.4.6; E.3; C.2

    Journal ref: 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT)

  12. Method of Self-Similar Load Balancing in Network Intrusion Detection System

    Authors: Dmytro Ageyev, Lyudmyla Kirichenko, Tamara Radivilova, Maksym TawalbehRadivilova, Maksym Tawalbeh, Oleksii Baranovskyi

    Abstract: In this paper, the problem of load balancing in network intrusion detection system is considered. Load balancing method based on work of several components of network intrusion detection system and on the analysis of multifractal properties of incoming traffic is proposed. The proposed method takes into account a degree of multifractality for calculation of deep packet inspection time, on the basi… ▽ More

    Submitted 11 April, 2019; originally announced April 2019.

    Comments: 5 pages. 2018 28th International Conference Radioelektronika (RADIOELEKTRONIKA)

    MSC Class: 90B18 ACM Class: D.4.6; E.3; C.2

  13. arXiv:1904.05925  [pdf

    cs.NI physics.soc-ph

    Investigation of Self-similar Properties of Additive Data Traffic

    Authors: Igor Ivanisenko, Lyudmyla Kirichenko, Tamara Radivilova

    Abstract: The work presents results of numerical study of self-similar properties of additive data traffic. It is shown that the value of Hurst exponent of total stream is determined by the maximum value of Hurst exponent of summed streams and the ratio of variation coefficient of stream with maximum Hurst exponent and other ones.

    Submitted 11 April, 2019; originally announced April 2019.

    Comments: 3 pages, 2 figures

    MSC Class: 90B18 ACM Class: D.4.6; E.3; C.2

    Journal ref: 2015 Xth International Scientific and Technical Conference "Computer Sciences and Information Technologies" (CSIT)

  14. Survey of Major Load Balancing Algorithms in Distributed System

    Authors: Igor Ivanisenko, Tamara Radivilova

    Abstract: The classification of the most used load balancing algorithms in distributed systems (including cloud technology, cluster systems, grid systems) is described. Comparative analysis of types of the load balancing algorithms is conducted in accordance with the classification, the advantages and drawbags of each type of the algorithms are shown. Performance indicators characterizing each algorithm are… ▽ More

    Submitted 11 April, 2019; originally announced April 2019.

    Comments: 4 pages

    MSC Class: 90B18 ACM Class: D.4.6; E.3; C.2

    Journal ref: 2015 Information Technologies in Innovation Business Conference (ITIB), Kharkiv, 2015, pp. 89-92. doi: 10.1109/ITIB.2015.7355061

  15. Calculation of routing value in MPLS network according to traffic fractal properties

    Authors: Tamara Radivilova, Lyudmyla Kirichenko, Oleksandra Yeremenko

    Abstract: Method for calculating routing cost of MPLS network is presented in the work. This method allows to minimize routing cost, taking into account traffic fractal properties, choice of traffic transmission path and quality of service requirements. The method uses values of the Hurst parameter and value of normalized spread of traffic values, which makes it possible to apply it to self-similar and mult… ▽ More

    Submitted 10 April, 2019; originally announced April 2019.

    Comments: 4 pages

    MSC Class: 90B18 ACM Class: D.4.6; E.3; C.2

    Journal ref: 2017 2nd International Conference on Advanced Information and Communication Technologies (AICT), Lviv, 2017, pp. 250-253

  16. Development of QoS methods in the information networks with fractal traffic

    Authors: Yousef Daradkeh Eid Mubarak, Lyudmyla Kirichenko, Tamara Radivilova

    Abstract: The paper discusses actual task of ensuring the quality of services in information networks with fractal traffic. The generalized approach to traffic management and quality of service based on the account of multifractal properties of the network traffic is proposed. To describe the multifractal traffic properties, it is proposed to use the Hurst exponent, the range of generalized Hurst exponent a… ▽ More

    Submitted 10 April, 2019; originally announced April 2019.

    Comments: 6

    MSC Class: 68M10 ACM Class: D.4.6; E.3; C.2

    Journal ref: Intl. Journal of Electronics and Telecommunications, 2018, Vol. 64, No. 1, pp. 27-32

  17. Test for penetration in Wi-Fi network: attacks on WPA2-PSK and WPA2-Enterprise

    Authors: Tamara Radivilova, Hassan Ali Hassan

    Abstract: In this work the wireless networks security algorithms were analyzed. The fundamentals of the WPA and WPA2 safety algorithms, their weaknesses and ways of attacking WPA and WPA2 Enterprise Wireless Networks are described. Successful attack on the WPA2-PSK and WPA2-Enterprise was carried out during the performance of work. The progress of this attack and its results were described.

    Submitted 17 May, 2018; originally announced May 2018.

    Comments: 4 pages

    ACM Class: D.4.6; E.3; C.2

    Journal ref: T. Radivilova and H. A. Hassan, "Test for penetration in Wi-Fi network: Attacks on WPA2-PSK and WPA2-enterprise," (UkrMiCo), Odessa, 2017, pp. 1-4

  18. arXiv:1805.06680  [pdf

    cs.SI cs.CR cs.CY

    Detecting cyber threats through social network analysis: short survey

    Authors: Lyudmyla Kirichenko, Tamara Radivilova, Anders Carlsson

    Abstract: This article considers a short survey of basic methods of social networks analysis, which are used for detecting cyber threats. The main types of social network threats are presented. Basic methods of graph theory and data mining, that deals with social networks analysis are described. Typical security tasks of social network analysis, such as community detection in network, detection of leaders i… ▽ More

    Submitted 17 May, 2018; originally announced May 2018.

    ACM Class: D.4.6; E.3; C.2

    Journal ref: Lyudmyla Kirichenko, Tamara Radivilova, Anders Carlsson. Detecting cyber threats through social network analysis: short survey. SocioEconomic Challenges, Volume 1, Issue 1, 2017. pp.20-34