Self-organizing control system of computer network traffic

Download article in PDF format

Authors: Basynya E. A., Frantsuzova G. A., Gunko A. V.

Annotation: This paper proposes one possible way to implement self-organizing area network traffic control system based on the original network threat protection method and method of providing privacy for corporate network information flows. Network threat protection method is a set of actions aimed to identify the attacker and provide protection of information resources. Method of providing privacy for corporate network information flows involves the formation of a distributed multi-level encryption, information processes security providing and procedures of their electronic automation. Implementation of self-organizing traffic control system computer network on the basis of these methods involves the use of certain tools and includes three main blocks: the server solution prediction and falsification blocks and corporate servers. This paper presents the experimental results and comparative analysis with existing solutions of the protection system and vulnerabilities identification (by scanning and probing), local area network internal information flows deciphering, distributed network attack resistance (including denial of service). Proposed methods of information security showed high efficiency and stability.

Keywords: self-organizing control system of computer network traffic, prediction, falsification of server solutions, genetic algorithmization, fuzzy logic, scanning, probing, firewall, distributed network attacks

Editorial office address

Executive Secretary of the Editor’s Office

 Editor’s Office: 40 Lenina Prospect, Tomsk, 634050, Russia

  Phone / Fax: + 7 (3822) 701-582

  journal@tusur.ru

 

Viktor N. Maslennikov

Executive Secretary of the Editor’s Office

 Editor’s Office: 40 Lenina Prospect, Tomsk, 634050, Russia

  Phone / Fax: + 7 (3822) 51-21-21 / 51-43-02

  vnmas@tusur.ru

Subscription for updates