Work place: Department of System Design, National Technical University of Ukraine“Igor Sikorsky Kyiv Polytechnic Institute”, Ukraine
Research Interests: Distributed Systems, Information Security
Vadym Mukhin: Professor of department of the mathematical methods of system analysis of National Technical University of Ukraine “Kiev Polytechnic Institute”, Doct. of Sc.
Born on November 1, 1971. M. Sc. (1994), PhD (1997), Doct. of Sc. (2015) from the National Technical University of Ukraine “Kiev Polytechnic Institute”; Professor (2015).
Major interests: the security of distributed computer systems and risk analysis; design of the information security systems; mechanisms for the adaptive security control in distributed computing systems; the security policy development for the computer systems and networks.
DOI: https://doi.org/10.5815/ijcnis.2022.05.01, Pub. Date: 8 Oct. 2022
A hybrid network, which consists of the sections of communication lines with the transmission of signals of different physical nature on different transmission media, has been considered. Communication lines respond differently to threats, which allows to choose the line with the best performance for the transmission of information. The causal diagram of events that determine the state of the information transmission network, such as changes in emergency/accident-free time intervals, has been presented. The application scheme of the protection measures against dangerous events has been shown. To verify the measures, a matrix of their compliance with typical natural disasters has been developed and relevant examples have been given. It is suggested to evaluate the flexibility of the telecommunication network by its connectivity, characterized by the numbers of vertex and edge connectivity, the probability of connectivity. The presented scheme of the device for multi-channel information transmission in a hybrid network allows the choice for the transmission of information to the channel with the best performance. Using this device is the essence of the suggestion about increasing the flexibility of the network.[...] Read more.
DOI: https://doi.org/10.5815/ijigsp.2022.03.01, Pub. Date: 8 Jun. 2022
In this paper, aspects of obtaining white colour hues for displays/monitors and lighting by using three- and four-components LED systems are discussed. Photometric equipment developed by us for multichannel LEDs control is used in an experimental study to verify theoretical calculations. Three-component RGB and four-component RGBW LED systems, which utilise the same RGB light sources and two white LEDs with warm and cold hues, are investigated. Results of testing of luminous efficacy of such systems at different values of light intensity and comparison of the corresponding circadian action factor as the value of impact of summarized RGB and RGBW white light on human circadian rhythms are presented. It is demonstrated that the four-component RGBW LED systems are more preferable for lighting and displays than the three-components RGB LED systems, because of significant higher luminous efficacy and slightly lower circadian factor over the entire range of correlated colour temperature from 2500K to 7000K studied.[...] Read more.
DOI: https://doi.org/10.5815/ijmecs.2022.01.01, Pub. Date: 8 Feb. 2022
The paper presents the technique for analysis of text emotional nature which is a key characteristic of Mass media news text. Emotions inherent design its Emotional coloring and become a significant feature of mass media news texts. The technique proposed measures the degree of exposure of emotions and allocates them by rating. Emotional coloring is defined by emotional characteristics and by grammar categories, and a set of rules is applied to regulate wordforms interaction. Techniques for verbal units analysis are examined. The Heavy Natural Language Processing models and Machine learning techniques are considered. They are compared and the optimum one is defined to resolve the problem of Emotional coloring evaluation. A system prototype is developed on the basis of this technique. It allocates news by influence rating according to their key parameters. The examples of texts’ emotional nature recognition results by means of the prototype are presented. The visualization of emotional nature analysis results highlights additional features of the news text’s emotional nature and expresses them in numeric values. It is exposed both by sentences and by the whole news text, with tracking of news Emotional coloring dynamics. The results presented have application in analysis procedure intending to studying Mass media, particularly informational environment with concomitant factors, and their impact on political and social interrelation.[...] Read more.
DOI: https://doi.org/10.5815/ijcnis.2021.04.01, Pub. Date: 8 Aug. 2021
The article describes the concept of a unified information space and an algorithm of its formation using a special information and computer system. The process of incoming object search in a unified information space is considered, which makes it possible to uniquely identify it by corresponding features. One of the main tasks of a unified information space is that each information object in it is uniquely identified. For this, the identification method was used, which is based on a step-by-step analysis of object characteristics. The method of parallel information object search in unified information spaces is proposed, when information object search will be conducted independently in all unified information spaces in parallel. Experimental studies of the method of parallel information object search in unified information spaces were conducted, on the basis of which the analysis of efficiency and incoming objects search time in unified information spaces was carried out. There was experimentally approved that the more parameters that describe the information object, the less the time of object identification depends on the length of the interval. Also, there was experimentally approved that the efficiency of the searching of the incoming objects in unified information spaces tends to a directly proportional relationship with a decrease in the length of the interval and an increase in the number of parameters, and vice versa.[...] Read more.
DOI: https://doi.org/10.5815/ijcnis.2020.05.01, Pub. Date: 8 Oct. 2020
Use of spread spectrum systems in telecommunications is studied. It is shown that spread spectrum techniques can substantially enhance noise and interference immunity in the currently deployed information transmission networks. Primitive polynomials are proposed to obtain respective spreading codes. A spreading code consisting of 1023 chips is synthesized and its characteristics are studied.
It is deduced that powerful interferences can exceed dynamic range of the receiving part of the system and, as a result, deteriorate information transmission. To overcome this problem, utilization of limiters is proposed, in which limitation level equals that of the internal noise of the receiving part. Computer simulation is employed to test the performance of the proposed solution. Performance of the spread spectrum system for information transfer is studied both without the limiter and with the limiter.
Research results show that, for binary modulation, performance of the system with limitation and without limitation is nearly identical while limiters can substantially reduce requirements for the dynamic range.
Compared to the existing approaches, it is proposed to use the synthesized spreading coding sequence with the limitation technique in practical implementations of those telecommunication networks, in which noise immunity and transmission concealment are required, such as in unmanned aerial vehicles. This can replace currently used approaches, such as frequency hopping, transmission power adjustment and antenna pattern changes.
DOI: https://doi.org/10.5815/ijcnis.2020.02.02, Pub. Date: 8 Apr. 2020
The paper describes the organization of the unified information space which is based on the uniform principles and the general rules that ensure the informational interaction of objects.
In practice, in case when the communication with an information object of the unified information space is lost, the necessary information about this object should be collected by the analysis of previous interactions of the information object with the other information objects. The goal of this paper article is to develop a mechanism that will allow restore the missing parameters of information objects in case of communication loss with this object.
There was performed the experimental researches with the proposed mechanisms. The experiments have shown that there is an unequivocal relationship between the quality of restoration of an information object and the topology of links within an unified information space.
DOI: https://doi.org/10.5815/ijisa.2018.08.02, Pub. Date: 8 Aug. 2018
This work is about the definition of cyber threats in the information system. The cyber threats lead to significant loss of network resources and cause the system disability as a whole. Detecting countermeasures in certain threats can reduce the impact on the system by changing the topology of the network in advance. Consequently, the interruption of a cyberattack forces the intruders to seek for alternative ways to damage the system. The most important task in the information system work is the state of network equipment monitoring. Also it’s the support of the network infrastructure in working order.
The purpose of the work is to develop a method for detecting cyber threats for the information system. The system can independently detect cyber threats and develop countermeasures against them. The main feature of the counteractions is to protect network nodes from compromising.
To ensure the functional stability, the most important issues are providing safety metrics. This technique allows to increase the functional stability of the system, which works in real time.
DOI: https://doi.org/10.5815/ijcnis.2018.04.01, Pub. Date: 8 Apr. 2018
This article is proposes a new approach to the transmission of signatures of network attacks onto a remote Internet resource. The problem is that the known protocols that are used for transfer data and control actions from an administrative resource to a network agents are poorly protected. Even in case of use of cryptographic mechanisms for organization of secure connections, it is possible to form behavioral patterns of interactions such as "administrative resource - network agents." Such templates allow to predict the actions taken in accordance with the security policy in order to maintain the required level of functionality of a remote Internet resource. Thus, it is necessary to develop a new protocol for the transfer of designated information, based on information technology, which level out the existence of opportunities for the formation of behavioral patterns of network interactions. As such technology, it is proposed to use a set of means of network interaction and some methods of hidden (steganographic) data transmission in information and telecommunication networks.[...] Read more.
DOI: https://doi.org/10.5815/ijisa.2017.11.06, Pub. Date: 8 Nov. 2017
The subject matter of the article is developing information and communication network (ICN) for critical infrastructure systems (CIS). The aim of the work is to provide high-quality information and telecommunication processes by developing the optimal version of distributing CIS functional tasks and ICN processes to the network nodes. The article deals with following problems: developing a model for mapping the information and technical ICN structures, developing a method for variant synthesis of ITS structural models, a formalized representation of the problem of selecting CIS optimal structure. The methods used are: the system method, the set-theoretic and graphic analytic approaches, methods of hierarchic structures synthesis, optimization methods. The following results were obtained: the use of system approach for formalizing the information processing process in CIS was justified; mapping the ICS functional system into the information and technical one was presented as multilevel graph chain; the generalized representation of graph structures hierarchy was developed for the set of data transmitting tasks; this approach enabled formal representing alternative variants that consider the main links, sequencing, the amount and flows of the processed information among the different structure levels; the scheme of variant synthesis method of ICN models according to graph structures mapping was developed; the problem of selecting optimal ICN structures was formally presented; a complex efficiency criterion for solving problems of optimizing variant synthesis of structures; the problem of optimal synthesis of the structure of the given level factored in resource constraints was formulated. Conclusions. The article deals with such novelty aspects as improving the model of problem of selecting the optimal ICN structure by set-theoretic formalization factored in the criterion of maximum intensity of computational resource application, which enabled determining structural links among the major elements considering the decomposition of the model up to the basic elements such as "node" and "task" and the development of a new method of optimal ICN structuring which unlike the existing ones involves the variant synthesis of structures hierarchy and formalizing selection problems on the basis of set-theoretic models, which enables providing the efficiency of application of information and technical net resources.[...] Read more.
DOI: https://doi.org/10.5815/ijisa.2017.09.01, Pub. Date: 8 Sep. 2017
A concept software-defined network is considered. Architecture of software-defined network is analyzed which, differently from traditional, foresee the separation of C-plane from a plane communication of data. The method of multicriterion optimization of multilevel networks is examined with determination of resulting objective function, which allows to carry out the synthesis of control system software-defined network (SDN) in the conditions of unforeseen changes of structure of the system.[...] Read more.
DOI: https://doi.org/10.5815/ijisa.2017.07.05, Pub. Date: 8 Jul. 2017
In this paper, we present the development of a decentralized mechanism for the resources control in a distributed computer system based on a network-centric approach. Intially, the network-centric approach was proposed for the military purposes, and now its principles are successfully introduced in the other applications of the complex systems control. Due to the features of control systems based on the network-centric approach, namely adding the horizontal links between components of the same level, adding the general knowledge control in the system, etc., there are new properties and characteristics. The concept of implementing of resource control module for a distributed computer system based on a network-centric approach is proposed in this study. We, basing on this concept, realized the resource control module and perform the analysis of its operation parameters in compare with resource control modules implemented on the hierarchical approach and on the decentralized approach with the creation of the communities of the computing resources. The experiments showed the advantages of the proposed mechanism for resources control in compare with the control mechanisms based on the hierarchical and decentralized approaches.[...] Read more.
DOI: https://doi.org/10.5815/ijisa.2016.12.07, Pub. Date: 8 Dec. 2016
The article deals with the issues of the security of distributed and scalable computer systems based on the risk-based approach. The main existing methods for predicting the consequences of the dangerous actions of the intrusion agents are described. There is shown a generalized structural scheme of job manager in the context of a risk-based approach. Suggested analytical assessments for the security risk level in the distributed computer systems allow performing the critical time values forecast for the situation analysis and decision-making for the current configuration of a distributed computer system. These assessments are based on the number of used nodes and data links channels, the number of active security and monitoring mechanisms at the current period, as well as on the intensity of the security threats realization and on the activation intensity of the intrusion prevention mechanisms. The proposed comprehensive analytical risks assessments allow analyzing the dynamics of intrusions processes, the dynamics of the security level recovery and the corresponding dynamics of the risks level in the distributed computer system.[...] Read more.
DOI: https://doi.org/10.5815/ijcnis.2016.06.01, Pub. Date: 8 Jun. 2016
In the paper is described the simulating process for the situations analysis and the decisions making about the functioning of the Distributed Computer Systems (DCS) nodes on the basis of special stochastic RA-networks mechanism. There are presented the main problems in the estimations of the DCS nodes functioning parameters and there are shown that the suggested RA-networks mechanism allows simulate the data flow with the different, including the significantly different intensities, what is particularly important in for the situations analysis and the decisions making in the DCS nodes parameters dynamics control.[...] Read more.
By Vadym Mukhin
DOI: https://doi.org/10.5815/ijcnis.2014.06.06, Pub. Date: 8 May 2014
There is suggested a method for the trust level establishment to the nodes of distributed computer systems (DCS) taken into account the dynamics of the information value changing and with the in-time records of the security incidents from the nodes. The proposed method of the DCS nodes rating establishment allows adaptively and during the DCS functioning to determine a safety configuration of resources (nodes) for the information processing in the DCS. Also, there is described the specifics of the implementation of the mechanisms for the nodes trust level establishment.[...] Read more.
DOI: https://doi.org/10.5815/ijcnis.2013.02.03, Pub. Date: 8 Feb. 2013
Today, there are known the basic principles of decision-making on the safety control of distributed computer systems in the face of uncertainty and risk. However, in this area there are no practical methods for the quantitative risk analysis and assessment, taking into account the dynamic changes of security threats, which is typical for distributed computer systems.
In this paper is suggested an approach to assesment and minimization of the security risks, which allows to reduce the potential losses due to the realization of threats, to analyze the dynamics of intrusions into computer systems and to select the effective security tools.
As a result, there is designed the structure of the tools for risk minimization in the distributed computer systems and are formalized the main functions of this structure. Also, in the paper is suggested the assessment of risk factors of the security threats and the probability of the threats realization, which are based on their division into appropriate groups. The proposed tools for security risk minimization allow effectively identify, classify and analyze threats to the security of the distributed computing systems.
Subscribe to receive issue release notifications and newsletters from MECS Press journals