A METHOD OF DETECTION OF INTERFERENCE IN COMPUTER SYSTEMS OF ELECTRONIC DOCUMENT CIRCULATION

Authors

  • О. Mozhaiev
  • F. Sukhina
  • V. Bashylov

DOI:

https://doi.org/10.26906/SUNZ.2023.1.122

Keywords:

computer systems, electronic circulation of documents, coding algorithm, electronic digital signature, cryptography, hash codes

Abstract

Topicality. Our time is characterized by rapid growth in the number and quality of various computer systems. A significant number of them belong to computer systems of electronic data circulation. Such circulation requires the use of reliable protection systems, which the city does not always have in real life. This fact requires the improvement of existing and the development of new methods of detecting facts of unreliable functioning of such computer systems. The goal of this work is to develop a method of detecting interference in computer systems of electronic circulation of documents. The object of research is the process of functioning of computer systems of electronic circulation of documents. The subject of research are methods and algorithms for detecting interference in computer systems. Results. This paper proposes a method of detecting interference in computer systems of electronic document circulation. The principles of the Hamming coding algorithm were used to detect interference in computer systems. This method can be a part of a system of methods for detecting interference in computer systems of electronic document circulation, which in turn can be used for the functioning of various critical application computer systems. Conclusion. The developed method of detecting interference in computer systems of electronic document circulation is planned to be used in the future to ensure the quality and reliability of the functioning of computer systems of electronic document circulation.

Downloads

References

Shulze H. Theory and Applications of OFDM and CDMA / H. Shulze, C. Luders. − Germany: John Wiley & Sons, Ltd , 2005.− 408 p.

Ungerboeck G. Channel coding with multilevel/phase signal / G. Ungerboeck // IEEE Trans., 1981. – Vol. IT-28, № 1. – P. 55 – 66.

Verd´u S. Fifty Years of Shannon Theory / S. Verd´u // IEEE Transactions on information theory. – 1998. – Vol. 44, №6. – Р. 2057 – 2078.

Xiang W. 5G Mobile Communications / Xiang W., Zheng K., Xuemin Sh.; Springer International Publishing, 2016. – 690 p.

Svyrydov, A., Kuchuk, H., Tsiapa, O. (2018). Improving efficienty of image recognition process: Approach and case study. Proceedings of 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies, DESSERT 2018, 593-597, doi: https://doi.org/10.1109/DESSERT.2018.8409201·

O. Mozhaev Potential application of hardware protected symmetric authentication microcircuits to ensure the security of internet of things/P. Klimushin, T.Solianyk, T. Kolisnyk, O. Mozhaev// Advanced Information Systems. 2021. Vol. 5, No. 3, P 103-111, doi: https://doi.org/10.20998/2522-9052.2021.3.14

Mozhaiev M. Sustainability of Open Educational Resources in Forensic Sciences: International Experience/ Karina Palkova, Olena Agapova, Aelita Zīle, Anton Polianskyi, Khosha Vadym, Serafyma Hasparian, Mozhaiev Mykhailo// European Journal of Sustainable Development(2022), 11, 3, 71-80 ISSN: 2239-5938 Doi:10.14207/ejsd.2022.v11n3p71

Mozhaiev, M., (2022). Devising a procedure for defining the general criteria of abnormal behavior of a computer system based on the improved criterion of uniformity of input data samples./ Semenov, S., Mozhaiev, O., Kuchuk, N., Mozhaiev, M., Tiulieniev, S., Gnusov, Y., Yevstrat, D., Chyrva, Y., Kuchuk, H. EasternEuropean Journal of Enterprise Technologies, 6 (4 (120)), 40–49. doi: https://doi.org/10.15587/17294061.2022.

Гнусов Ю.B., Клімушин П.С., Колісник Т.П., Можаєв М.О. Аналіз систем моделювання мікроконтролерів з додатковими модулями криптографічного захисту інформації. Вісник Національного технічного університету «ХПІ». Серія: Системний аналіз, управління та інформаційні технології №1(3) 2020 С. 79-84

Mykhailo Mozhaiev, Viacheslav Davydov, Zhang Liqiang Analysis and comparative researches of methods or improving the software Advanced Information Systems, 2020 Vol. 4, No. 3, pp. 8-11, DOI: https://doi.org/doi: 10.20998/2522-9052.2020.3.18

Коваленко А. А., Кучук Г. А. Методи синтезу інформаційної та технічної структур системи управління об’єктом критичного застосування. Сучасні інформаційні системи. 2018. Т. 2, № 1. С. 22–27. DOI: https://doi.org/10.20998/2522-9052.2018.1.04

Kuchuk G., Kharchenko V., Kovalenko A., Ruchkov E. Approaches to selection of combinatorial algorithm for optimization in network traffic control of safety-critical systems. East-West Design & Test Symposium (EWDTS). 2016. Pp. 1-6. doi:https://doi.org/10.1109/EWDTS.2016.7807655.

Kuchuk G.A. An Approach To Development Of Complex Metric For Multiservice Network Security Assessment / G.A. Kuchuk, A.A. Kovalenko, A.A. Mozhaev // Statistical Methods Of Signal and Data Processing (SMSDP – 2010): Proc. Int. Conf., October 13-14, 2010.– Kiev: NAU, RED, IEEE Ukraine section joint SP, 2010. – P. 158 – 160.

Mozhaiev M Method of Forensic Research on Image for Finding Touch up on the Basis of Noise Entropy/O. Kliuiev ; M. Mozhaiev ; M. Mozhaiev , O.Uhrovetskyi ,E. Simakova-Yefremian 3rd International Conference on Advanced Information and Communications Technologies (AICT) Publisher: IEEE, 2019 Lviv, Ukraine P. 76 – 79. DOI: 10.1109/AIACT.2019.8847760 (Scopus)

Mozhaiev M., (2017). Multiservice network security metric/ Mozhaev, O., Kuchuk, H., Kuchuk, N., Mozhaiev M., Lohvynenko, M..// 2nd International Conference on Advanced Information and Communication Technologies, AICT 2017 – Proceedings, 133-136. doi: https://doi.org/10.1109/AIACT.2017.8020083

. Report:Cenzic Application VulnerabilityTrendsReport:2014 [Електронний ресурс] // Cenzic. – 2014. – Режим доступу до ресурсу: https://info.cenzic.com/2013-Application-Security-Trends-Report.html.

OWASP SecureCoding Practices QuickReference Guide. // OWASP. – 2010. 4 OWASP Top 10 - 2017 The Ten Most Critical Web Application Security Risks, 2017.

The Bobby Tables Guide to SQL Injection. Archived from the original on November 7, 2017. Retrieved October 30, 2017

Martin Anderson. Cross-site scripting enabled on 1000 majorsites – including financial sites. The Stack. 24 лютого 2016., 205с.

CERT Vulnerability Notes Dat abase. Software Engineering Institute. Original Release Date: 2008. – 21c.;

NIST Comments on Cryptanalytic Attacks on SHA-1 - NIST Information Technology Laboratory / 2006.

Published

2023-03-17