Chakrian V. Models and methods of traffic routing in telecommunication networks considering information security demands.

Українська версія

Thesis for the degree of Candidate of Sciences (CSc)

State registration number

0418U002165

Applicant for

Specialization

  • 05.12.02 - Телекомунікаційні системи та керування ними

31-01-2018

Specialized Academic Board

Д 64.052.09

Kharkiv National University Of Radio Electronics

Essay

Object - the process of routing packet flow in the telecommunication network, taking into account the requirements of information security. The purpose - to increase the information security of the packet flow during its dynamic routing in the telecommunication network with the use of internal gateway routing protocols. Subject - models and methods for increasing the information security of the packet flow during the process of its dynamic routing in the telecommunication network. Methods - methods of assessing the survivability of information systems; elements of mathematical analysis, mathematical statistics and random processes; methods of risk analysis; methods of optimization and decision making; simulation of the process of single-path and multi-path routing; probabilistic-statistical methods; methods of experimental research to detect the interconnections of different parameters of the router during the process of packet flow transmission; analytical and simulation modeling of processes that affect the information security of packet flow during its routing in a telecommunication network. The results - 1) a method for assessing the information security risk of the packet flow transmission paths is proposed for the first time, the novelty of which is to take into account such parameters as: the efficiency and vulnerability of network routers, as well as the likelihood of a denial of service attack on routers at a given time; 2) it was improved a model of the packets transmission process from a sender to a receiver under cyberattacks, the novelty of which is the possibility of conducting calculations under the presence of attacks such as denial of service on the routers of the network; malicious processes on routers that reduce node bandwidth, or even make it disabled; attacks on re-routing of data by non-efficient paths; 3) a model of single-path and multi-path routing of packets under cyberattacks in a telecommunication network received further development, the novelty of which is to take into account the information security risk along with the basic parameters in the formulas for calculating the paths metrics. The application area - engineering of the network telecommunication technologies

Files

Similar theses