M. Sukhoparov, Alexander Davydov, I. Lebedev, Nurzhan Bazhayev
{"title":"Statistical data analysis for network infrastructure monitoring to recognize aberrant behavior of system local segments","authors":"M. Sukhoparov, Alexander Davydov, I. Lebedev, Nurzhan Bazhayev","doi":"10.1109/ICAICT.2016.7991834","DOIUrl":null,"url":null,"abstract":"Wireless network of low-power devices “Smart Home”, “Internet of things” has been considered. A number of signs of security attacks on behalf of potential information interloper have been identified. We have analyzed the characteristics of a system based on wireless technologies that are obtained as a result of passive surveillance and active polling of devices comprising the network infrastructure. A model is presented for the information security state analysis based on identifying, quantitative, frequency, timing characteristics. In view of the peculiarities of the devices providing network infrastructure, estimation of the information security state is focused on the analysis of the system normal functioning profile, rather than on search of signatures and features of anomalies during various kinds of attacks. An experiment has been disclosed that provides obtaining statistical information about operation of wireless network remote devices where data acquisition for decision-making purposes occurs by comparing statistical signal messages from the leaf nodes in passive and active modes. Experimental results of information onslaught on the standard system have been presented. The proposed model may be used to determine technical characteristics of WLAN ad hoc network devices and to draw recommendations for IS state analysis.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAICT.2016.7991834","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Wireless network of low-power devices “Smart Home”, “Internet of things” has been considered. A number of signs of security attacks on behalf of potential information interloper have been identified. We have analyzed the characteristics of a system based on wireless technologies that are obtained as a result of passive surveillance and active polling of devices comprising the network infrastructure. A model is presented for the information security state analysis based on identifying, quantitative, frequency, timing characteristics. In view of the peculiarities of the devices providing network infrastructure, estimation of the information security state is focused on the analysis of the system normal functioning profile, rather than on search of signatures and features of anomalies during various kinds of attacks. An experiment has been disclosed that provides obtaining statistical information about operation of wireless network remote devices where data acquisition for decision-making purposes occurs by comparing statistical signal messages from the leaf nodes in passive and active modes. Experimental results of information onslaught on the standard system have been presented. The proposed model may be used to determine technical characteristics of WLAN ad hoc network devices and to draw recommendations for IS state analysis.