GENERALIZED MODEL OF INFORMATION PROTECTION PROCESS IN AUDIOVISUAL CONTENT DISTRIBUTION NETWORKS
Heorhii Rozorinov
National Technical University of Ukraine “Igor Sikorsky Kyiv Politechnic Institute” (Ukraine)
http://orcid.org/0000-0002-6095-7539
Oleksandr Hres
Yuriy Fedkovych Chernivtsi National University (Ukraine)
http://orcid.org/0000-0002-8465-193X
Volodymyr Rusyn
rusyn_v@ukr.netYuriy Fedkovych Chernivtsi National University, Department of Radio Engineering and Information (Ukraine)
http://orcid.org/0000-0001-6219-1031
Abstract
The most important indicators of the effectiveness of content protection systems are indicators of the achieved security level, i.e. functional properties of security. These indicators are: confidentiality, integrity, availability. Each of the indicators of the functional properties of content security is distributed according to the methods of ensuring and the degree of its achievement. A significant drawback of such indicators is that they are qualitative. This significantly narrows the scope of their use and makes it impossible to use them in mathematical expressions for optimizing the parameters of protection means, obtaining quantitative estimates of the performance quality of the protection system or its components, etc. The work offers a number of quantitative indicators, which, depending on the purpose, can be probabilistic and temporal. Calculation of such indicators makes it possible to assess the degree of ensuring the functional properties of information security or the possible degree of ensuring the functional properties of protected information.
Keywords:
security, content, communication network, model, indicatorReferences
Al-Mukaddim K. P., Rajkumar B.: A Taxonomy and Survey of Content Delivery Networks. Australia, 2007.
Google Scholar
Andreev V. I., Kozlov V. S., Horoshko V. A.: Kolychestvennaya otsenka zashishennosti tekhnicheskikh obektov s uchetom ikh funktsionirovaniya. Zakhyst informatsiyi 2, 2004, 47–51.
Google Scholar
Ayankoya F., Otushile O., Ohwo B.: A Review on Content Delivery Networks and Emerging Paradigms. International Journal of Scientific & Engineering Research 9, 2018, 211–217.
Google Scholar
Bohush V. M., Kudin A. M.: Monitorynh system informatsiinoi bezpeky. DUIKT, Kyiv 2006.
Google Scholar
Charles D. C. et al.: Enhanced Streaming Services in a Content Distribution Network. IEEE Computing Society, 2001, 66–75.
DOI: https://doi.org/10.1109/4236.939452
Google Scholar
Dmitrenko A. P., Sirchenko G. A., Horoshko V. A.: Modeli bezopasnogo soedineniya s udalennymi obektami. Zakhyst informatsiyi 1, 2010, 53–57.
Google Scholar
Dmitrenko A.P., Sirchenko G.A., Horoshko V.A.: Statisticheskoe modelirovanie dlya ocenki zashhishhennosti lokalnoj seti. Visnyk DUIKT 1, 2010, 62–67.
Google Scholar
Ingmar P. et al.: Improving Content Delivery with Provider-aided Distance Information System (PaDIS). IEEE Computer Society, 2012, 44–52.
Google Scholar
Jaeyeon J., Balachander K., Rabinovich M.: Flash crowds and denial of service attacks: Characterization and implications for CDNs and Web sites. 11th International World Wide Web Conference Hawaii: ACM, 2002, 293–304.
Google Scholar
Kirichek R., Kulik V., Koucheryavy A.: False clouds for Internet of Things and methods of protection. 18th International Conference on Advanced Communication Technology, Pyeongchang, South Korea 2016, 201–205.
DOI: https://doi.org/10.1109/ICACT.2016.7423328
Google Scholar
Moroz S. et al.: Methods for ensuring data security in mobile standards. Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska – IAPGOS, 1, 2022, 4–9 [http://doi.org/10.35784/iapgos.2877].
DOI: https://doi.org/10.35784/iapgos.2877
Google Scholar
Nikolaienko B., Vasylenko S.: Application of the threat intelligence platform to increase the security of government information resources. Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska – IAPGOS 4, 2021, 9–13 [http://doi.org/10.35784/iapgos.2822].
DOI: https://doi.org/10.35784/iapgos.2822
Google Scholar
Politanskyi R., Politanskyi L., Hres O., Lesinskyi V. Statistical estimation of pseudorandom number sequences. 14th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering, TCSET 2018, 873–876.
DOI: https://doi.org/10.1109/TCSET.2018.8336335
Google Scholar
Rusyn V. et al.: Computer Modelling of the Information Properties of Hyper Chaotic Lorenz System and Its Application in Secure Communication System. Journal of Physics: Conference Series 1764, 2021, 012205 [http://doi.org/10.1088/1742-6596/1764/1/012205].
DOI: https://doi.org/10.1088/1742-6596/1764/1/012205
Google Scholar
Rusyn V., Sambas A., Mujiarto: Information security system based on chaotic signals. CEUR Workshop Proceedings 3039, 2021, 294–299.
Google Scholar
Rusyn V., Subbotin S., Sambas A.: Simple autonomous security system based on Arduino UNO platform and fingerprint scanner module: A study case. CEUR Workshop Proceedings 2864, 2021, 262–271.
DOI: https://doi.org/10.32782/cmis/2864-23
Google Scholar
Shirochin V. P., Muhin V. E., Kramar D. I.: Analiz riskov v zadachah monitoringa bezopasnosti kompyuternyh sistem i setej. Zakhyst informatsii 1, 2003, 28–34.
Google Scholar
Shoroshev V. V., Ilnytskyi A. Yu.: Informatsiino-analitychna model bazovoho pervynnoho zakhystu PEOM vid zahroz NSD. Byznes y bezopasnost 3–5, 1999, 32–39.
Google Scholar
Shushura O. M. et al.: Simulation of information security risks of availability of project documents based on fuzzy logic. Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska – IAPGOS 3, 2022, 64–68 [http://doi.org/10.35784/iapgos.3033].
DOI: https://doi.org/10.35784/iapgos.3033
Google Scholar
Sirchenko H. A.: Zadachi zabezpechennia tsilisnosti ta dostupnosti informatsiinykh obiektiv v komunikatsiinykh merezhakh. Zakhyst informatsii 2, 2010, 49–54.
Google Scholar
Vasilenko V. S., Korolenko M. P.: Celostnost informacii v avtomatizirovannyh sistemah. Korporativnye sistemy 3, 1999, 52–58.
Google Scholar
Vyshnivskyi V. V., Sribna I. M., Zinchenko O. V.: Analysis of technical solutions for identification of internet things in modern communication networks. Electronics and Control Systems 1, 2021, 33–39 [http://doi.org/10.18372/1990-5548.67.15583].
Google Scholar
Authors
Heorhii RozorinovNational Technical University of Ukraine “Igor Sikorsky Kyiv Politechnic Institute” Ukraine
http://orcid.org/0000-0002-6095-7539
Authors
Oleksandr HresYuriy Fedkovych Chernivtsi National University Ukraine
http://orcid.org/0000-0002-8465-193X
Authors
Volodymyr Rusynrusyn_v@ukr.net
Yuriy Fedkovych Chernivtsi National University, Department of Radio Engineering and Information Ukraine
http://orcid.org/0000-0001-6219-1031
Statistics
Abstract views: 149PDF downloads: 141
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Most read articles by the same author(s)
- Heorhii Rozorinov, Oleksandr Hres, Volodymyr Rusyn, Petro Shpatar, ENVIRONMENT OF ELECTROMAGNETIC COMPATIBILITY OF RADIO-ELECTRONIC COMMUNICATION MEANS , Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska: Vol. 10 No. 1 (2020)
- Sviatoslav Khrapko, Volodymyr Rusyn, Leonid Politansky, INVESTIGATION OF THE MEMRISTOR NONLINEAR PROPERTIES , Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska: Vol. 8 No. 1 (2018)
- Rizki Multajam, Ahmad Faisal Mohamad Ayob, W.S. Mada Sanjaya, Aceng Sambas, Volodymyr Rusyn, Andrii Samila, REAL-TIME DETECTION AND CLASSIFICATION OF FISH IN UNDERWATER ENVIRONMENT USING YOLOV5: A COMPARATIVE STUDY OF DEEP LEARNING ARCHITECTURES , Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska: Vol. 14 No. 3 (2024)
- Lintang Patria, Aceng Sambas, Ibrahim Mohammed Sulaiman, Mohamed Afendee Mohamed, Volodymyr Rusyn, Andrii Samila, WEED DETECTION ON CARROTS USING CONVOLUTIONAL NEURAL NETWORK AND INTERNET OF THING BASED SMARTPHONE , Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska: Vol. 14 No. 3 (2024)