-
The multifractal load balancing method
Abstract: The load-balancing system, built on the basis of a subsystem load balancer and subsystem control and monitoring that closely interact with each other was propose in work. This system is presented as a queuing system with priority service discipline. In the described queuing system parallel processing flow applications occur in the multiple serving devices and successive junction of them into unifi… ▽ More
Submitted 16 April, 2019; originally announced May 2019.
Comments: 2 pages, 2 figures. arXiv admin note: substantial text overlap with arXiv:1904.09227
MSC Class: 68M10 ACM Class: D.4.6; E.3; C.2
Journal ref: 2015 Second International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T)
-
Investigation of Multifractal Properties of Additive Data Stream
Abstract: The work presents results of a numerical study of fractal characteristics of multifractal stream at addition of stream, which does not have multifractal properties. They showed that the generalized Hurst exponent of total stream tends to one of original multifractal stream with increase in signal/noise ratio.
Submitted 16 April, 2019; originally announced May 2019.
Comments: 4 pages, 5 figures, 7 equations. arXiv admin note: text overlap with arXiv:1904.05925
MSC Class: 90B18 ACM Class: D.4.6; E.3; C.2
Journal ref: 2016 IEEE First International Conference on Data Stream Mining & Processing (DSMP), Lviv, 2016, pp. 305-308
-
Time series classification based on fractal properties
Abstract: The article considers classification task of fractal time series by the meta algorithms based on decision trees. Binomial multiplicative stochastic cascades are used as input time series. Comparative analysis of the classification approaches based on different features is carried out. The results indicate the advantage of the machine learning methods over the traditional estimating the degree of s… ▽ More
Submitted 16 April, 2019; originally announced May 2019.
Comments: 4 pages, 2 figures, 3 equations, 1 table
MSC Class: 90B18 ACM Class: D.4.6; E.3; C.2
Journal ref: 2018 IEEE Second International Conference on Data Stream Mining & Processing (DSMP)
-
The Methods to Improve Quality of Service by Accounting Secure Parameters
Abstract: A solution to the problem of ensuring quality of service, providing a greater number of services with higher efficiency taking into account network security is proposed. In this paper, experiments were conducted to analyze the effect of self-similarity and attacks on the quality of service parameters. Method of buffering and control of channel capacity and calculating of routing cost method in the… ▽ More
Submitted 16 April, 2019; originally announced May 2019.
Comments: 10 pages, 1 figure, 1 equation, 1 table. arXiv admin note: text overlap with arXiv:1904.05202
MSC Class: 90B18 ACM Class: D.4.6; E.3; C.2
Journal ref: In: Hu Z., Petoukhov S., Dychka I., He M. (eds) Advances in Computer Science for Engineering and Education II. ICCSEEA 2019. Advances in Intelligent Systems and Computing, vol 938, pp 346-355. 2020. Springer, Cham
-
Fractal Time Series Analysis of Social Network Activities
Abstract: In the work, a comparative correlation and fractal analysis of time series of Bitcoin crypto currency rate and community activities in social networks associated with Bitcoin was conducted. A significant correlation between the Bitcoin rate and the community activities was detected. Time series fractal analysis indicated the presence of self-similar and multifractal properties. The results of rese… ▽ More
Submitted 10 April, 2019; originally announced May 2019.
Comments: 4
MSC Class: 90B18 ACM Class: D.4.6; E.3; C.2
Journal ref: 2017 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T), Kharkov, Ukraine, 2017, pp. 456-459
-
Forecasting Weakly Correlated Time Series in Tasks of Electronic Commerce
Abstract: Forecasting of weakly correlated time series of conversion rate by methods of exponential smoothing, neural network and decision tree on the example of conversion percent series for an electronic store is considered in the paper. The advantages and disadvantages of each method are considered.
Submitted 16 April, 2019; originally announced April 2019.
Comments: 4 pages, 4 figures, 1 table
MSC Class: 90B18 ACM Class: D.4.6; E.3; C.2
Journal ref: 2017 12th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT)
-
Calculation of distributed system imbalance in condition of multifractal load
Abstract: The method of calculating a distributed system imbalance based on the calculation of node system load was proposed in the work. Calculation of node system load is carried out by calculating the average coefficient of utilization of CPU, memory, bandwidth of each system node, taking into account multifractal properties of input data flows. The simulation of the proposed method for different multifr… ▽ More
Submitted 16 April, 2019; originally announced April 2019.
Comments: 4 pages, 3 figures, 6 equations. arXiv admin note: text overlap with arXiv:1904.05218
MSC Class: 90B18 ACM Class: D.4.6; E.3; C.2
Journal ref: 2016 Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T), Kharkiv, 2016, pp. 156-158
-
Dynamic load balancing algorithm of distributed systems
Abstract: The dynamic load balancing algorithm based on the monitoring server load, self-similar characteristics of passing traffic have to provide a statistically uniform load distribution on servers, high performance, fault tolerance and capacity, low response time, the amount of overhead and losses was propose in work. Integrated measurement for the total imbalance level of the system were entered.
Submitted 16 April, 2019; originally announced April 2019.
Comments: 4 pages, 8 equations
MSC Class: 90B18 ACM Class: D.4.6; E.3; C.2
Journal ref: 2016 13th International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET), Lviv, 2016, pp. 515-518
-
Use of Approaches to the Methodology of Factor Analysis of Information Risks for the Quantitative Assessment of Information Risks Based on the Formation of Cause-And-Effect Links
Abstract: The paper suggests methods to the assessment of information risks, which makes the transition from a qualitative assessment of information risks (according to the factor analysis of information risks methodology) to a quantitative assessment. The development factor analysis of information risks methodology of the methodology was carried out using the mathematical apparatus of probability theory, n… ▽ More
Submitted 16 April, 2019; originally announced April 2019.
Comments: 4 pages, 1 figure, 1 table
MSC Class: 90B18 ACM Class: D.4.6; E.3; C.2
Journal ref: 2018 International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T)
-
Decrypting SSL/TLS traffic for hidden threats detection
Abstract: The paper presents an analysis of the main mechanisms of decryption of SSL/TLS traffic. Methods and technologies for detecting malicious activity in encrypted traffic that are used by leading companies are also considered. Also, the approach for intercepting and decrypting traffic transmitted over SSL/TLS is developed, tested and proposed. The developed approach has been automated and can be used… ▽ More
Submitted 16 April, 2019; originally announced April 2019.
Comments: 4 pages, 1 table, 1 figure
MSC Class: 90B18 ACM Class: D.4.6; E.3; C.2
Journal ref: 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT)
-
Classification of Existing Virtualization Methods Used in Telecommunication Networks
Abstract: This article studies the existing methods of virtualization of different resources. The positive and negative aspects of each of the methods are analyzed, the perspectivity of the approach is noted. It is also made an attempt to classify virtualization methods according to the application domain, which allows us to discover the method weaknesses which are needed to be optimized.
Submitted 16 April, 2019; originally announced April 2019.
Comments: 4 pages, 3 figures
MSC Class: 90B18 ACM Class: D.4.6; E.3; C.2
Journal ref: 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT)
-
Method of Self-Similar Load Balancing in Network Intrusion Detection System
Abstract: In this paper, the problem of load balancing in network intrusion detection system is considered. Load balancing method based on work of several components of network intrusion detection system and on the analysis of multifractal properties of incoming traffic is proposed. The proposed method takes into account a degree of multifractality for calculation of deep packet inspection time, on the basi… ▽ More
Submitted 11 April, 2019; originally announced April 2019.
Comments: 5 pages. 2018 28th International Conference Radioelektronika (RADIOELEKTRONIKA)
MSC Class: 90B18 ACM Class: D.4.6; E.3; C.2
-
Investigation of Self-similar Properties of Additive Data Traffic
Abstract: The work presents results of numerical study of self-similar properties of additive data traffic. It is shown that the value of Hurst exponent of total stream is determined by the maximum value of Hurst exponent of summed streams and the ratio of variation coefficient of stream with maximum Hurst exponent and other ones.
Submitted 11 April, 2019; originally announced April 2019.
Comments: 3 pages, 2 figures
MSC Class: 90B18 ACM Class: D.4.6; E.3; C.2
Journal ref: 2015 Xth International Scientific and Technical Conference "Computer Sciences and Information Technologies" (CSIT)
-
Survey of Major Load Balancing Algorithms in Distributed System
Abstract: The classification of the most used load balancing algorithms in distributed systems (including cloud technology, cluster systems, grid systems) is described. Comparative analysis of types of the load balancing algorithms is conducted in accordance with the classification, the advantages and drawbags of each type of the algorithms are shown. Performance indicators characterizing each algorithm are… ▽ More
Submitted 11 April, 2019; originally announced April 2019.
Comments: 4 pages
MSC Class: 90B18 ACM Class: D.4.6; E.3; C.2
Journal ref: 2015 Information Technologies in Innovation Business Conference (ITIB), Kharkiv, 2015, pp. 89-92. doi: 10.1109/ITIB.2015.7355061
-
Calculation of routing value in MPLS network according to traffic fractal properties
Abstract: Method for calculating routing cost of MPLS network is presented in the work. This method allows to minimize routing cost, taking into account traffic fractal properties, choice of traffic transmission path and quality of service requirements. The method uses values of the Hurst parameter and value of normalized spread of traffic values, which makes it possible to apply it to self-similar and mult… ▽ More
Submitted 10 April, 2019; originally announced April 2019.
Comments: 4 pages
MSC Class: 90B18 ACM Class: D.4.6; E.3; C.2
Journal ref: 2017 2nd International Conference on Advanced Information and Communication Technologies (AICT), Lviv, 2017, pp. 250-253
-
Development of QoS methods in the information networks with fractal traffic
Abstract: The paper discusses actual task of ensuring the quality of services in information networks with fractal traffic. The generalized approach to traffic management and quality of service based on the account of multifractal properties of the network traffic is proposed. To describe the multifractal traffic properties, it is proposed to use the Hurst exponent, the range of generalized Hurst exponent a… ▽ More
Submitted 10 April, 2019; originally announced April 2019.
Comments: 6
MSC Class: 68M10 ACM Class: D.4.6; E.3; C.2
Journal ref: Intl. Journal of Electronics and Telecommunications, 2018, Vol. 64, No. 1, pp. 27-32
-
Test for penetration in Wi-Fi network: attacks on WPA2-PSK and WPA2-Enterprise
Abstract: In this work the wireless networks security algorithms were analyzed. The fundamentals of the WPA and WPA2 safety algorithms, their weaknesses and ways of attacking WPA and WPA2 Enterprise Wireless Networks are described. Successful attack on the WPA2-PSK and WPA2-Enterprise was carried out during the performance of work. The progress of this attack and its results were described.
Submitted 17 May, 2018; originally announced May 2018.
Comments: 4 pages
ACM Class: D.4.6; E.3; C.2
Journal ref: T. Radivilova and H. A. Hassan, "Test for penetration in Wi-Fi network: Attacks on WPA2-PSK and WPA2-enterprise," (UkrMiCo), Odessa, 2017, pp. 1-4
-
Detecting cyber threats through social network analysis: short survey
Abstract: This article considers a short survey of basic methods of social networks analysis, which are used for detecting cyber threats. The main types of social network threats are presented. Basic methods of graph theory and data mining, that deals with social networks analysis are described. Typical security tasks of social network analysis, such as community detection in network, detection of leaders i… ▽ More
Submitted 17 May, 2018; originally announced May 2018.
ACM Class: D.4.6; E.3; C.2
Journal ref: Lyudmyla Kirichenko, Tamara Radivilova, Anders Carlsson. Detecting cyber threats through social network analysis: short survey. SocioEconomic Challenges, Volume 1, Issue 1, 2017. pp.20-34