THE METHOD OF OPTIMIZING THE DISTRIBUTION OF RADIO SUPPRESSION MEANS AND DESTRUCTIVE SOFTWARE INFLUENCE ON COMPUTER NETWORKS
DOI:
https://doi.org/10.15588/1607-3274-2023-4-2Keywords:
information exchange, computer radio network, computer attack, protection of information, radio suppression, optimization of resource allocation, destructive influenceAbstract
Context. Currently, generalized methodical approaches to the development of scenarios of complex radio suppression and electromagnetic influence of typical special telecommunication systems have been developed. However, during the development of possible cases for the complex application of radio suppression and destructive software influence,the problem of optimizing the resource of these means and its distribution according to the goals of radio suppression and objects of destructive computer influence arose, which has not yet been fully resolved.Especially in the literature known to the authors, there is no method for optimizing the resource distribution of radio and computer influence, used for the development and practical implementation of optimal scenarios of destructive influence on computer networks of enemy military groups in military operations.
Therefore, it is necessary to formulate a problem and develop a method of optimizing the distribution of the resource of radio suppression and destructive software influence for the development of possible scenarios of the enemy’s violation of information exchange in a standart telecommunication network.
Objective. The purpose of the research is to develop a method for optimizing the distribution of the resource of radio suppression and destructive software influence for the development of scenarios of information exchange violations by the enemy in the telecommunications network.
Method.To achieve the purpose of the research, the methods of nonlinear optimization of heterogeneous resource distribution, mass service theory, and expert evaluation were comprehensively applied and developed in the field of modeling of information conflict.
To determine the coefficients of protection of objects from radio-electronic and destructive computer influence, expert evaluation methods are used, in particular, the method of frequencies of preferences of the decision-maker using the Thurstone method. This method requires only one expert (a decision-maker), minimal communication time with him, minimal expert information (full ordering of weighting factors) and can be applied with a small number of evaluated weighting factors.
To solve the problem of optimal distribution of a heterogeneous resource of means of destructive influence, to ensure the value of the multiplicative objective function of an arbitrary form is not less than the given one, the method of successive increments is applied.
To determine the efficiency indicator of information exchange violation, the methods of mass service theory are applied, which allows to formalize special telecommunication systems as a set of mass service systems – subsystems of digital communication and computer networks.
Results. The formulated problem and the entered indicators made it possible to solve the problem of determining the minimum resource of means of destructive influence and their optimal distribution according to the purposes of radio suppression on the objects of destructive program influence in order to achieve the required level of disruption of the efficiency of information exchange in special telecommunication systems.
Conclusions.According to the results of the article, a method for optimizing the distribution of the resource of radio suppression and destructive software influence has been developed for the development of possible scenarios of information exchange violations by the enemy in a typical telecommunications network.The verification of the proposed method was carried out by comparing the theoretical results with the results of simulated modeling of scenarios of violation of the information exchange in the telecommunications network by the enemy.
References
Bihun N., Shyshatskyi A., Bondar O., Bogrieiev S., Nalapko O., Sova O., Trotsko O. Analysis of the peculiarities of the communication organization in NATO countries, Advanced Information Systems, 2019, Vol. 3 (4), pp. 39–44. DOI: https://doi.org/10.20998/2522-9052.2019.4.05.
Shyshatskiy A. V., Bashkirov O. M., Kostina O. M. Development of integrated systems and data for Armed Forces, Arms and military equipment, 2015. No. 1 (5), pp. 35–40. DOI: http://journals.uran.ua/ index.php/24140651/issue/view/1%285%29%202015.
Zhuk A. V., Shyshatskiy P. V., Zhuk O. G., Zhyvotovskyi R. M. Methodological substances of management of the radio-resource managing systems of military radio communication, Information Processing Systems, 2017. Vol. 5 (151), pp. 16–25. DOI: https://doi.org/10.30748/soi.2017.151.02.
Sholokhov S., Samborsky I., Nikolayenko B., Vasylenko S., Hordiienko Y. Optimization of resources distribution of radio suppression means and destructive program impact on electronics networks, Information Technology and Security, 2022, Vol. 10, Issue 2 (19), pp. 230–240. DOI:https://doi.org/10.20535/24111031.2022.10.2.270464
Romanenko I., Shyshatskyi A. Analysis of modern condition of military radiocommunication system, Advanced Information Systems, 2017, Vol. 1, No. 1, pp. 28–33. DOI:https://doi.org/10.20998/2522-9052.2017.1.05.
Tomisla K. Improving the integrity of military-defence communication systems using network access points with a focus on terrestrial radio-relay links. Strategos. 2022. Vol. 6 (2), pp. 177–206. DOI: https://hrcak.srce.hr/file/421158.
NATO Glossary of Terms and Definitions: AAP-6 (2018), NATO Standardization Agency, 2018, 2019 р.
Luchuk E. V. Model’ radіo- ta programno-komp’yuternogo podavlennya komp’yuternix merezh protivnika v operacіyax, Vіjs’kovo-texnіchnijzbіrnik, 2011. Vol. 5. pp. 104–109. DOI:https://doi.org/10.33577/23124458.5.2011.104-109
Roma O. M., Vasylenko S. V., Peleshok Ye. V., Honenko S. V., Nikolaienko B. A. Analysis of the synchronism entering process robustness in uav’s radio control line with FHSS, Radio Electronics, Computer Science, Control, 2020, No. 2, pp. 15–24. DOI 10.15588/1607-3274-2020-2-2
Fernandez de Gorostiza E., Berzosa J., Mabe J., Cortiñas R. Method for Dynamically Selecting the Best Frequency Hopping Technique in Industrial Wireless Sensor Network Applications, Sensors, 2018, Vol. 18, Issue 2, P. 657. DOI: https://doi.org/10.3390/s18020657
Evaluation Criteria for IT Security. Part 1 : Introduction and general model. ISO/IEC 15408_1: 2005.
Evaluation Criteria for IT Security. Part 2: Security functional requirements. ISO/IEC 15408_2: 2005.
Evaluation Criteria for IT Security. Part 3: Security assurance requirements. ISO/IEC 15408_3: 2005.
Bhat, Srinidi and KVSSSS Sairam. Optimization of resource allocation in optical networks. IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT). 2022. Bangalore, India, pp. 1–9.
Srinivasa K. G., Anil Kumar Muppalla. Guide to High Performance Distributed Computing.Case Studies with Hadoop, Scalding and Spark, Computer Communication and Networks, 2015, 321 p. DOI: https://doi.org/10.1007/978-3-31913497-0
Borovkov A. A. Stochastic Processes in Queueing Theory, Stochastic Modelling and Applied Probability (SMAP). 1976, Vol. 4, 280 р. DOI: https://doi.org/10.1007/978-14612-9866-3
Chen L., Cheng J., and Tseng Y., Optimal path planning with spatial-temporal mobility modeling for individualbased emergency guiding, IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2015, Vol. 45, No. 12, pp. 1491– 1501. DOI: 10.1109/TSMC.2015.2445875
Srinivasan V. R, Chiasserini C. F., Nuggehalli P. S., and Rao R. R. Optimal rate allocation for energy-efficient multipath routing in wireless ad hoc networks, IEEE Transactions on Wireless Communications, 2004, Vol. 3, No. 3, pp. 891–899. DOI: https://doi.org/10.1109/TWC.2004.826343
Raskin L. G., Kyrychenko I. O. Multi-index tasks of linear programming. Radio and communication, 1982, 240 p.
Bj¨ornson E., Jorswieck E. Optimal Resource Allocation in Coordinated Multi-Cell Systems, Foundations and Trends in Communications and Information Theory, 2013, Vol. 9, No. 2. pp. 113–381. DOI: 10.1561/0100000069
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 S. M. Sholokhov, P. M. Pavlenko, B. A. Nikolaienko, I. I. Samborsky, E. I. Samborsky
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Creative Commons Licensing Notifications in the Copyright Notices
The journal allows the authors to hold the copyright without restrictions and to retain publishing rights without restrictions.
The journal allows readers to read, download, copy, distribute, print, search, or link to the full texts of its articles.
The journal allows to reuse and remixing of its content, in accordance with a Creative Commons license СС BY -SA.
Authors who publish with this journal agree to the following terms:
-
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License CC BY-SA that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
-
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
-
Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.