Systems and Means of Informatics
2018, Volume 28, Issue 4, pp 22-30
OVERCOMING OF PROTECTION OF A NETWORK WHERE CONNECTIONS ARE CONTROLLED BY META DATA
- A. A. Grusho
- E. E. Timonina
- S. Ya. Shorgin
Abstract
The control of connections in a network by means of meta data does not consider time of realization of several information technologies. This fact produces a possibility to overcome protection of a network which uses meta data for control of network connections. For solution of potential problems connected with this vulnerability, additions to the control functions using meta data are suggested. In particular, the method of creation of queues and the method of compulsory reconfiguration of network are proposed. In the case of SDN (Software Defined Network), meta data directly define the moment of time and requirements to reconfiguration of network for the controller.
[+] References (10)
- Grusho, A., N. Grusho, M. Zabezhailo, A. Zatsarinny, and E. Timonina. 2017. Information security of SDN on the basis of meta data. Computer network security. Eds. J. Rak, J. Bay, I. V. Kotenko, et al. Lecture notes in computer science ser. Springer. 10446:339-347. Available at: https://link.springer.com/chapter/10.1007/978-3-319- 65127-9_27 (accessed September 1, 2018).
- Grusho, A. A., E.E. Timonina, and S.Ya. Shorgin. 2017. Modelling for ensuring information security of the distributed information systems. 31st European Conference on Modelling and Simulation Proceedings. Dudweiler, Germany: Digitaldruck Pirrot GmbHP. 656-660. Available at: http://www.scs-europe.net/ dlib/2017/ecms2017accepted papers/0656- probstat_ECMS2017_0026.pdf (accessed September 1, 2018).
- Grusho, A., E. Timonina, and S. Shorgin. 2017. Security models based on stochastic meta data. Analytical and computational methods in theory probability. Eds. V. Rykov, N. Singpurwalla, and A. Zubkov. Lecture notes in computer science ser. Springer. 10684:388-400. Available at: https://link.springer.com/chapter/10.1007/978-3-319- 71504-9_32 (accessed September 1, 2018).
- Grusho, A. A., E.E. Timonina, and S.Ya. Shorgin. 2018. Ierarkhicheskiy metod porozhdeniya metadannykh dlya upravleniya setevymi soedineniyami [Hierarchical method of meta data generation for control of network connections]. Informatika i ee Primeneniya - Inform. Appl. 12(2):44-49.
- Grusho, A. A., M.I. Zabezhailo, A. A. Zatsarinny, and V. O. Piskovski. 2016. Bez- opasnaya avtomaticheskaya rekonfiguratsiya oblachnykh vychislitel'nykh sred [Secure automatic reconfiguration of cloudy computing]. Sistemy i Sredstva Informatiki - Systems and Means of Informatics 26(3):83-92.
- Grusho, A., and E. Timonina. 2011. Prohibitions in discrete probabilistic statistical problems. Discrete Math. Appl. 21(3):275-281.
- Grusho, A. A., N. A. Grusho, and E.E. Timonina. 2013. Statisticheskie metody opredeleniya zapretov veroyatnostnykh mer na diskretnykh prostranstvakh [Statistical methods of definition of the bans of probability measures on discrete spaces]. Informatika i ee Primeneniya - Inform. Appl. 7 (1): 54-57.
- Grusho, A., N. Grusho, and E. Timonina. 2015. Power functions of statistical criteria defined by bans. 29th European Conference on Modelling and Simulation Proceedings. Dudweiler, Germany: Digitaldruck Pirrot GmbHP. 617-621. Available at: http://www.scs-europe.net/dlib/2015/ecms2015acceptedpapers/0617- probstat_ECMS2015_0016.pdf (accessed September 1, 2018).
- Gallagher, P. R., Jr. 1987. Trusted network interpretation. NCSC-TG-005. Library No. S228.526. Ver. 1. Available at: https://fas.org/irp/nsa/rainbow/tg005.htm (accessed September 1, 2018).
- Grusho, A. A., N. A. Grusho, and E. E. Timonina. 2016. Properties of decision functions defined by bans. J. Math. Sci. 218(2): 154-160.
[+] About this article
Title
OVERCOMING OF PROTECTION OF A NETWORK WHERE CONNECTIONS ARE CONTROLLED BY META DATA
Journal
Systems and Means of Informatics
Volume 28, Issue 4, pp 22-30
Cover Date
2018-11-30
DOI
10.14357/08696527180403
Print ISSN
0869-6527
Publisher
Institute of Informatics Problems, Russian Academy of Sciences
Additional Links
Key words
information security; information technologies; distributed information systems; meta data; software-defined network; composite tasks
Authors
A. A. Grusho , E. E. Timonina , and S. Ya. Shorgin
Author Affiliations
Institute of Informatics Problems, Federal Research Center "Computer Science
and Control", Russian Academy of Sciences, 44-2 Vavilov Str., Moscow 119333, Russian Federation
|