In telecommunications, a particular place belongs to systems with a wideband noise-free signal, the undisputed advantage of which is increased by both narrowband and wideband interference, confidentiality of information transmission, as well as electromagnetic compatibility with adjacent electronic devices. A wideband noise-free signal is formed using a number of known modulated sequences - m-, Kasam-, Gold sequences, typically by direct spreading.Systems using known pseudo-random sequences cannot be considered protected from unauthorized access.An effective way to increase the confidentiality of signal transmission in a noise-free TSC is to use a chaotic signal-based PVP.Pseudorandom sequence generators are based on one-dimensional chaotic reflections such as logistics, quadratic, and cubic. Researches have shown the undeniable advantage of logistical reflection. The construction of hidden communication systems using the deterministic chaos phenomenon is progressive issue nowadays. Several main stages should be carried out for achieving the goal. These are providing of the stability degree of synchronization between the drive and response generators of the transmitter and receiver respectively, investigation of chaotic oscillation to estimate the noise similarity and hardware design of communication system. It is known that the stable synchronization mode is needed for the quality level of data recovery. Therefore the basic conditions were computed for unidirectional coupled chaotic generators for the purpose of providing of generalized synchronization. To construct the communication system with high hiding degree first of all it is necessary to select the chaotic carrier signal the spectral and statistical characteristics of which were similar to noise. Using the obtained results the hardware prototype of hidden communication system was constructed
Цель статьи показать, как влияют уязвимости на современное программное обеспечение, используя статистический анализ. Для этого был проведён анализ рисков и требований, изучены ограничения, произведён сбор данных и применён статистический анализ. Были получены выводы и предложения по дальнейшим исследованиям в области быстрой диагностики ошибок программного обеспечения. Уязвимости были классифицированы и проанализированы по типам ошибок и по уровню критичности CVSS. Актуальной задачей службы безопасности любой организации является защита от внешних и внутренних угроз. В ходе атак злоумышленники используют средства и методы для проникновения в инфраструктуру, закрепления в ней и сокрытие следов атак. Этапы атак осуществляются посредством эксплуатации как уже найденных специалистами по защите информации, но не исправленных в атакуемой инфраструктуре, так и с помощью необнаруженных уязвимостей, называемых «уязвимостями нулевого дня». Статистический анализ уязвимостей поможет специалистам по информационной безопасности и разработчикам программного обеспечения понять, какому тестированию, каких ошибок нужно уделять больше времени. Для уменьшения объема работ, выполняемого вручную, специалистами принято использовать автоматические средства сканирования. Но сканеры уязвимостей имеют издержки (false positives и false negatives), поэтому данные, полученные в ходе сканирования, необходимо перепроверять вручную. Ключевые слова: защита информации, статистический анализ уязвимости, ошибки программного обеспечения, алгоритм структурирования знаний, дерево решений
Currently, special attention is paid to the creation of broadband telecommunications systems with a noise-like signal. Such systems have indisputable advantages in noise immunity, in the confidentiality of information transmission, electromagnetic compatibility with neighboring electronic devices. The formation of a broadband signal in most cases is carried out by the method of direct spreading of the spectrum by manipulating the carrier frequency signal by a pulse pseudo-random sequence (PVP) –m-sequence, Gold, Kasami, Walsh sequence. Sequences such as a well-known attacker can pick up in the receiver and they can not be considered reliable protection of information. The use of the phenomenon of dynamic chaos provides an opportunity to find a new class of PVP, the structure of which is almost impossible to reproduce, so their use provides increased confidentiality of information transmission. PVP generators are built on the basis of one-dimensional chaotic mappings - logistic, quadratic and cubic, which are chaotic systems. When creating a PVP based on chaos, three secret encryption keys are used: for example, for logistic separation, this is the initial value, the equation parameter, and the start of the sequence. To increase the cryptosecurity of telecommunication systems, it is proposed to create PVP based on 2 chaotic signals (by logistic and quadratic mappings), which provides an increase in secret keys from three to six. The paper proposes a scheme for building a telecommunications system with high confidentiality of information transmission through the use of such PVP.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.