GENERALIZED MODEL OF INFORMATION PROTECTION PROCESS IN AUDIOVISUAL CONTENT DISTRIBUTION NETWORKS

Heorhii Rozorinov


National Technical University of Ukraine “Igor Sikorsky Kyiv Politechnic Institute” (Ukraine)
http://orcid.org/0000-0002-6095-7539

Oleksandr Hres


Yuriy Fedkovych Chernivtsi National University (Ukraine)
http://orcid.org/0000-0002-8465-193X

Volodymyr Rusyn

rusyn_v@ukr.net
Yuriy Fedkovych Chernivtsi National University, Department of Radio Engineering and Information (Ukraine)
http://orcid.org/0000-0001-6219-1031

Abstract

The most important indicators of the effectiveness of content protection systems are indicators of the achieved security level, i.e. functional properties of security. These indicators are: confidentiality, integrity, availability. Each of the indicators of the functional properties of content security is distributed according to the methods of ensuring and the degree of its achievement. A significant drawback of such indicators is that they are qualitative. This significantly narrows the scope of their use and makes it impossible to use them in mathematical expressions for optimizing the parameters of protection means, obtaining quantitative estimates of the performance quality of the protection system or its components, etc. The work offers a number of quantitative indicators, which, depending on the purpose, can be probabilistic and temporal. Calculation of such indicators makes it possible to assess the degree of ensuring the functional properties of information security or the possible degree of ensuring the functional properties of protected information.


Keywords:

security, content, communication network, model, indicator

Al-Mukaddim K. P., Rajkumar B.: A Taxonomy and Survey of Content Delivery Networks. Australia, 2007.
  Google Scholar

Andreev V. I., Kozlov V. S., Horoshko V. A.: Kolychestvennaya otsenka zashishennosti tekhnicheskikh obektov s uchetom ikh funktsionirovaniya. Zakhyst informatsiyi 2, 2004, 47–51.
  Google Scholar

Ayankoya F., Otushile O., Ohwo B.: A Review on Content Delivery Networks and Emerging Paradigms. International Journal of Scientific & Engineering Research 9, 2018, 211–217.
  Google Scholar

Bohush V. M., Kudin A. M.: Monitorynh system informatsiinoi bezpeky. DUIKT, Kyiv 2006.
  Google Scholar

Charles D. C. et al.: Enhanced Streaming Services in a Content Distribution Network. IEEE Computing Society, 2001, 66–75.
DOI: https://doi.org/10.1109/4236.939452   Google Scholar

Dmitrenko A. P., Sirchenko G. A., Horoshko V. A.: Modeli bezopasnogo soedineniya s udalennymi obektami. Zakhyst informatsiyi 1, 2010, 53–57.
  Google Scholar

Dmitrenko A.P., Sirchenko G.A., Horoshko V.A.: Statisticheskoe modelirovanie dlya ocenki zashhishhennosti lokalnoj seti. Visnyk DUIKT 1, 2010, 62–67.
  Google Scholar

Ingmar P. et al.: Improving Content Delivery with Provider-aided Distance Information System (PaDIS). IEEE Computer Society, 2012, 44–52.
  Google Scholar

Jaeyeon J., Balachander K., Rabinovich M.: Flash crowds and denial of service attacks: Characterization and implications for CDNs and Web sites. 11th International World Wide Web Conference Hawaii: ACM, 2002, 293–304.
  Google Scholar

Kirichek R., Kulik V., Koucheryavy A.: False clouds for Internet of Things and methods of protection. 18th International Conference on Advanced Communication Technology, Pyeongchang, South Korea 2016, 201–205.
DOI: https://doi.org/10.1109/ICACT.2016.7423328   Google Scholar

Moroz S. et al.: Methods for ensuring data security in mobile standards. Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska – IAPGOS, 1, 2022, 4–9 [http://doi.org/10.35784/iapgos.2877].
DOI: https://doi.org/10.35784/iapgos.2877   Google Scholar

Nikolaienko B., Vasylenko S.: Application of the threat intelligence platform to increase the security of government information resources. Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska – IAPGOS 4, 2021, 9–13 [http://doi.org/10.35784/iapgos.2822].
DOI: https://doi.org/10.35784/iapgos.2822   Google Scholar

Politanskyi R., Politanskyi L., Hres O., Lesinskyi V. Statistical estimation of pseudorandom number sequences. 14th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering, TCSET 2018, 873–876.
DOI: https://doi.org/10.1109/TCSET.2018.8336335   Google Scholar

Rusyn V. et al.: Computer Modelling of the Information Properties of Hyper Chaotic Lorenz System and Its Application in Secure Communication System. Journal of Physics: Conference Series 1764, 2021, 012205 [http://doi.org/10.1088/1742-6596/1764/1/012205].
DOI: https://doi.org/10.1088/1742-6596/1764/1/012205   Google Scholar

Rusyn V., Sambas A., Mujiarto: Information security system based on chaotic signals. CEUR Workshop Proceedings 3039, 2021, 294–299.
  Google Scholar

Rusyn V., Subbotin S., Sambas A.: Simple autonomous security system based on Arduino UNO platform and fingerprint scanner module: A study case. CEUR Workshop Proceedings 2864, 2021, 262–271.
DOI: https://doi.org/10.32782/cmis/2864-23   Google Scholar

Shirochin V. P., Muhin V. E., Kramar D. I.: Analiz riskov v zadachah monitoringa bezopasnosti kompyuternyh sistem i setej. Zakhyst informatsii 1, 2003, 28–34.
  Google Scholar

Shoroshev V. V., Ilnytskyi A. Yu.: Informatsiino-analitychna model bazovoho pervynnoho zakhystu PEOM vid zahroz NSD. Byznes y bezopasnost 3–5, 1999, 32–39.
  Google Scholar

Shushura O. M. et al.: Simulation of information security risks of availability of project documents based on fuzzy logic. Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska – IAPGOS 3, 2022, 64–68 [http://doi.org/10.35784/iapgos.3033].
DOI: https://doi.org/10.35784/iapgos.3033   Google Scholar

Sirchenko H. A.: Zadachi zabezpechennia tsilisnosti ta dostupnosti informatsiinykh obiektiv v komunikatsiinykh merezhakh. Zakhyst informatsii 2, 2010, 49–54.
  Google Scholar

Vasilenko V. S., Korolenko M. P.: Celostnost informacii v avtomatizirovannyh sistemah. Korporativnye sistemy 3, 1999, 52–58.
  Google Scholar

Vyshnivskyi V. V., Sribna I. M., Zinchenko O. V.: Analysis of technical solutions for identification of internet things in modern communication networks. Electronics and Control Systems 1, 2021, 33–39 [http://doi.org/10.18372/1990-5548.67.15583].
  Google Scholar

Download


Published
2022-12-30

Cited by

Rozorinov, H., Hres, O., & Rusyn, V. (2022). GENERALIZED MODEL OF INFORMATION PROTECTION PROCESS IN AUDIOVISUAL CONTENT DISTRIBUTION NETWORKS. Informatyka, Automatyka, Pomiary W Gospodarce I Ochronie Środowiska, 12(4), 21–25. https://doi.org/10.35784/iapgos.3317

Authors

Heorhii Rozorinov 

National Technical University of Ukraine “Igor Sikorsky Kyiv Politechnic Institute” Ukraine
http://orcid.org/0000-0002-6095-7539

Authors

Oleksandr Hres 

Yuriy Fedkovych Chernivtsi National University Ukraine
http://orcid.org/0000-0002-8465-193X

Authors

Volodymyr Rusyn 
rusyn_v@ukr.net
Yuriy Fedkovych Chernivtsi National University, Department of Radio Engineering and Information Ukraine
http://orcid.org/0000-0001-6219-1031

Statistics

Abstract views: 149
PDF downloads: 141