


Vol 50, No 1 (2016)
- Year: 2016
- Articles: 9
- URL: https://journal-vniispk.ru/0146-4116/issue/view/10657
Article
Comparative study for feature selection algorithms in intrusion detection system
Abstract
The Intrusion Detection System (IDS) deals with the huge amount of network data that includes redundant and irrelevant features causing slow training and testing procedure, higher resource usage and poor detection ratio. Feature selection is a vital preprocessing step in intrusion detection. Hence, feature selec-tion is an essential issue in intrusion detection and need to be addressed by selec-ting the appropriate feature selection algorithm. A major challenge to select the optimal feature selection methods can precisely calculate the relevance of fea-tures to the detection process and the redundancy among features. In this paper, we study the concepts and algorithms used for feature selection algorithms in the IDS. We conclude this paper by identifying the best feature selection algorithm to select the important and useful features from the network dataset.



Influence of Bloch inductance on the time resolution of balanced comparators based on small Josephson junctions
Abstract
In this study we carried out the analysis of the time resolution of Josephson balanced comparators with Bloch inductance. It was obtained expression for time resolution in case of growing strobe-pulse of voltage. It is shown that, time resolution is determined by Bloch inductance of small size Josephson junctions. Estimation gives the time resolution at the level subpicosecond.



Calculation of flicker noise power
Abstract
Proposed method of calculation of flicker-noise power provided in published experimental results regarding investigation of flicker processes in real material of electronic devices. It is shown that during evaluation of signal/noise ratio in electronic devices in the range of low frequencies the flickernoise level should be taken 3–4 times bigger than the thermal noise level.



Influence of thermal hysteresis on distortions of zero line at various comparator type equivalent time signal conversion methods
Abstract
The influence of thermal hysteresis of the comparator on the sensitivity of signal converter and distortions of the zero line at various comparator type equivalent time signal conversion methods is studied. The research is carried out by statistical simulations and physical experiments. In the simulations two sets of parameters of the thermal hysteresis are used: one appropriate to parameters of experimental device, and the second—appropriate to comparator with a stronger thermal hysteresis.



Solution of the problem of identifying structures of discrete stochastic objects based on the minimum posterior error criterion of distribution densities
Abstract
The importance of studying methods for solving the problem of identifying structures of discrete stochastic objects has been shown. The general structure of an identification algorithm based on the use of generalized probabilistic criteria has been proposed. The structural identification algorithm is synthesized based on the minimum posterior error criterion of distribution densities. A numerical example that makes it possible to assess the effectiveness of the proposed approach has been considered.



Analysis of quality-of-service metrics in IMS networks
Abstract
A network constructed according to the IMS architecture consists of different modules that sequentially process signaling messages transferred during providing communication services. Delays that occur when processing signaling messages determine the quality of service for subscribers. International recommendations define the quality-of-service metrics, which include not only the mean, but also the 95% quantile. The paper proposes an approach to analyzing the quality-of-service characteristics. It is assumed that IMS-network nodes work as multi-server queues with general service time distribution.



Analysis of the adaptive neural network router
Abstract
The standard method for optimal routing based on the adaptive distance vector algorithm is considered. Its advantages and disadvantages are analyzed. An intelligent algorithm based on the neural network theory is proposed as an alternative. The simulation showed that the use of neural networks in the router makes it possible to reduce network equipment resources, speed up the optimal minimum delay routing, and correct distorted data without intervention from a system administrator.



A SCADA testbed for investigating cyber security vulnerabilities in critical infrastructures
Abstract
Supervisory Control and Data Acquisition (SCADA) systems are widely used in critical infrastructures such as water distribution networks, electricity generation and distribution plants, oil refineries, nuclear plants, and public transportation systems. However, the increased use of standard protocols and interconnectivity has exposed SCADA systems for potential cyber-attacks. In recent years, the cyber-security of SCADA systems has become a hot issue for governments, industrial sectors and academic community. Recently some security solutions have been proposed to secure SCADA systems. However, due to the critical nature of SCADA systems, evaluation of such proposed solutions on real system is im-practical. In this paper, we proposed an easily scalable and reconfigurable virtual SCADA security testbed, which can be used for developing and evaluating SCADA specific security solutions. With Distributed Denial of Service (DDoS) and false data injection attack scenarios, we demonstrated how attackers could disrupt the normal operation of SCADA systems. Experimental results show that, the pro-posed testbed can be effectively used for cyber security assessment and vulner-ability investigation on SCADA systems. One of the outcomes of this work is a labeled dataset, which can be used by researchers in the area of SCADA security.



Erratum
Erratum to: “Solving the Mixed-Integer Knapsack Problem by Decrease of Dimension and Use of Dynamic Programming”


