Anton Smirnov

Work place: Ivan Kozhedub Kharkiv National Air Force University, Kharkiv, Ukraine

E-mail: smirya84@gmail.com

Website:

Research Interests: Computer systems and computational processes, Computer Architecture and Organization, Data Structures and Algorithms

Biography

Anton Smirnov was born in 1984. He graduated from Ivan Kozhedub Kharkiv National Air Force University and got a degree in "Surface-to-Air missile systems and complexes". In 2015 he defended his thesis for the degree of candidate of technical sciences, the specialty is "Information technologies". He has held the post of the teacher in Ivan Kozhedub Kharkiv National Air Force University since 2015. He is the author of more than 20 scientific publications. His scientific interests lie in the fields of hidden data transfer in information and telecommunication networks

Author Articles
The Method of Hidden Terminal Transmission of Network Attack Signatures

By Igor Ruban Nataliia Lukova-Chuiko Vadym Mukhin Yaroslav Kornaga Igor Grishko Anton Smirnov

DOI: https://doi.org/10.5815/ijcnis.2018.04.01, Pub. Date: 8 Apr. 2018

This article is proposes a new approach to the transmission of signatures of network attacks onto a remote Internet resource. The problem is that the known protocols that are used for transfer data and control actions from an administrative resource to a network agents are poorly protected. Even in case of use of cryptographic mechanisms for organization of secure connections, it is possible to form behavioral patterns of interactions such as "administrative resource - network agents." Such templates allow to predict the actions taken in accordance with the security policy in order to maintain the required level of functionality of a remote Internet resource. Thus, it is necessary to develop a new protocol for the transfer of designated information, based on information technology, which level out the existence of opportunities for the formation of behavioral patterns of network interactions. As such technology, it is proposed to use a set of means of network interaction and some methods of hidden (steganographic) data transmission in information and telecommunication networks.

[...] Read more.
Other Articles