×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

  • Model of knot of computer network as subject to computer investigation considering dynamics of use of the rented information resouces

    The model of stream and network computer investigations including imitating and analytical models is presented in article. The essence of model consists in modeling of processes of identification of information flows of the protected mobile knot. Distinctive feature of this stage is imitation of search and identification of the information flow formed by the mobile communication center taking into account dynamic accidental switching between information flows, various time spent in this stream, and also accounting of a number of the parameters characterizing means of stream investigation. Further time of scanning of the network equipment, is estimated by means of network investigation. Output result of a simulation model is the probability of identification of the protected mobile communication center means of stream and network computer investigations. Considering need of possession of a number of specific skills of the environments of imitating modeling connected with use, and also essential time expenditure, results were approximated and analytical expression of required size is received. For assessment of quality of model are carried out verification of model; estimates of adequacy and stability of model, and also estimates of an error and sensitivity. On the basis of comparison of results of modeling developed and the known models definitely that the reliability of results of modeling increased by 12-15%.

    Keywords: stream and network computer models, simulation model, knot of computer network