{"title":"Machine Learning vs Software Vulnerability Detection: Applicability Analysis and Conceptual System Synthesis","authors":"N. Leonov, M. Buinevich","doi":"10.31854/1813-324x-2023-9-6-83-94","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-6-83-94","url":null,"abstract":"The article is devoted to the searching for vulnerabilities in software problem, as well as the possibilities of application of such a promising area in information technology as machine learning. For this purpose, a review of scientific publications in this area from Russian and foreign citation databases is made. A comparative analysis of the review's results was made according to the following criteria: publication year, application field, idea, solved problem of machine learning, degree of realization of its models and methods; for each criterion basic conclusions were drawn. As a result, 7 principles of building a new conceptual system of searching for vulnerabilities in software with the help of machine learning are proposed, the short meaning of which is as follows: program's multilateral study, combination of known methods, the use of machine learning in each method and algorithm of its management, the possibility of correcting the expert's work, storing information in a database and its synchronization with external, advisory nature of the found vulnerabilities; single software application usage. Based on the stated principles, a graphical scheme of such a system has been developed.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"20 17","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139158316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Direct Sequence Spread Spectrum Signal’s Parameters Estimation Bounds","authors":"E. Brusin","doi":"10.31854/1813-324x-2023-9-6-25-33","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-6-25-33","url":null,"abstract":"The article discusses the problems of direct spread spectrum signal’s parameters estimation and estimation performance analyzing. The achieved estimation variances compared with the corresponding Cramer ‒ Rao bounds as a rule. The proposed approach makes it possible to determine the bounds for signals of various types of modulation and spectral characteristics. The dependences of the Cramer ‒ Rao bounds on the signal-to-noise ratio, the spread spectrum sequence length and the duration of the observation interval are presented.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"643 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139160554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mathematical Model of the Unbalanced Monopole Feed. Part 3. Gain","authors":"O. Popov, A. Tumashov, G. Borisov, K. Korovin","doi":"10.31854/1813-324x-2023-9-6-6-23","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-6-6-23","url":null,"abstract":"An integro-differential operator is specified that determines the longitudinal component of the electric field strength on the surface of the emitter conductor of an Unbalanced Monopole with Shunt Feed, created by the Base Current (BC). Analytical expressions are obtained that determine the parameters of an equivalent eight pole, which is the internal resistance of equivalent BC generators. The influence of the length of the counterweight conductors and the upper load of the high-voltage transformer on the efficiency and gain was studied.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"759 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139160617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experimental Investigation of Protection Method for Detection of Cloning Attack on Paper Certificates","authors":"D. Flaksman","doi":"10.31854/1813-324x-2023-9-5-121-129","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-5-121-129","url":null,"abstract":"A method of paper certificate protection against a cloning attack is investigated, that was proposed recently theoretically in a paper of the same author. This method is based on the use of digital watermarks. In order to extend watermark approach to a protection against cloning attacks, it has been suggested to execute estimation of the noise power which appear during the image scanning and printing. Algorithms of embedding and extraction of watermarks out of the images are presented along with a method of detecting of the cloning attack after scanning and printing by an attacker. Numerical results of the experiments for the error probabilities of a cloning missing and a false alarm are also presented and are in agreement with theoretical results obtained before.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"41 11-12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139274993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT Traffic Fractal Dimension Statistical Characteristics on the Kitsune Dataset Example","authors":"O. Shelukhin, S. Rybakov","doi":"10.31854/1813-324x-2023-9-5-112-119","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-5-112-119","url":null,"abstract":"The paper considers a method for estimating the fractal properties of traffic, and also evaluates the statistical parameters of the fractal dimension of IoT traffic. An analysis of real traffic with attacks from the Kitsune dump and an analysis of the fractal properties of traffic in normal mode and under the influence of attacks such as SSDP Flood, Mirai, OS Scan showed that jumps in the fractal dimension of traffic when attacks occur can be used to create algorithms for detecting computer attacks in IoT networks. Studies have shown that in the case of online analysis of network traffic, when assessing the RF, preference should be given to the modified algorithm for estimating the Hurst exponent in a sliding analysis window.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139273994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Placement Algorithm of Base Stations Trunking Communication Systems","authors":"V. Ivanov, S. Uvajsov, I. Ivanov","doi":"10.31854/1813-324x-2023-9-5-25-34","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-5-25-34","url":null,"abstract":"to increase the efficiency of the trunking communication systems design process, an original algorithm for the automatic placement of base stations is proposed, taking into account the real conditions of radio wave propagation. The analysis showed that the existing methods allow you to place base stations manually, with a given step or automatically, but without taking into account the propagation of radio waves, which leads to poor-quality coverage of the required area with communication. The aim of the work is to reduce the complexity of designing a trunking communication system that is guaranteed to cover a given service area. It is proposed to calculate the service areas of base stations using a statistical model, as well as taking into account additional diffraction losses on the radio signal propagation path. The solution to the problem of automatic placement of base stations is based on the use of the proposed modified Hut model, which takes into account the terrain at the locations of the base and portable stations, as well as on the international recommendation for predicting signal propagation on a specific route for ground services. With automatic placement, the optimality criterion is fulfilled, which consists in placing the minimum number of base stations necessary to cover the required territory. An element of the novelty of the presented solution is that at the first stage of the calculation, the service area of the base station is determined by the statistical method, at the second stage, an updated calculation of the service area takes place taking into account the actual conditions of radio wave propagation at the binding site, and at the third stage, the zone of guaranteed customer service is determined. The use of the proposed algorithm makes it possible to reduce the complexity of the system design process and determine the sufficient number of base stations needed to cover a given area with communication. Appropriate software has been developed to apply the algorithm in real practice. To confirm the effectiveness of the algorithm, the paper presents comparative calculations of the time spent on designing a trunking communication system using the developed software and using the widely used RadioMobile program.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"64 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139276417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Serial Analog-Digital QAM Modems Based on Complex Band-Pass Filters with LF Butterworth Prototypes","authors":"Y. Grebenko, R. Polyak, L.P. Yan","doi":"10.31854/1813-324x-2023-9-5-6-15","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-5-6-15","url":null,"abstract":"The article is devoted to the development and implementation of quadrature amplitude modulation algorithms based on an analog complex band-pass filter with Butterworth low-frequency prototypes. The use of complex Butterworth band pass filters makes it possible to obtain carrier signals with practically non-overlapping spectra. But the analog complex Butterworth filter has a non-linear phase-frequency response and, accordingly, the impulse responses of which are infinite and asymmetric. An overview of the development and implementation of a serial QAM modem based on an analog Butterworth complex band-pass filter and an inverse digital FIR filter. The procedure for obtaining the expression for the impulse response of analog complex band-pass Butterworth filters is considered. With the help of circuit simulation, the frequency response and impulse response of such a filter are determined. The choice of the center frequency is carried out by setting two coefficients. A block diagram of a serial data transmission system with quadrature amplitude modulation based on an analog complex Butterworth bandpass filter and an inverse digital FIR filter is proposed. The results of its circuit simulation in the Micro-Cap environment are presented.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"58 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139276444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Traffic Classification Model in Software-Defined Networks with Artificial Intelligence Elements","authors":"V. Elagin","doi":"10.31854/1813-324x-2023-9-5-66-78","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-5-66-78","url":null,"abstract":"Application classification is essential to improve network performance. However, with the constant growth in the number of users and applications, as well as the scaling of networks, traditional classification methods cannot fully cope with the identification and classification of network applications with the required level of delay. The use of deep learning technology together with the architecture features of software-defined networks (SDN) will allow the implementation of a new hybrid deep neural network for application classification, which can provide high classification accuracy without manual selection and feature extraction. The proposed structure proposes a classification of applications, taking into account the logical centralized management on the SDN controller. The processed data is used to train a hybrid deep neural network consisting of stacked autoencoder with a high dimensionality of the hidden layer and an output layer based on softmax regression. The necessary network flow parameters can be obtained by processing traffic with a stacked auto-encoder instead of manual processing. The softmax regression layer is used as the final application classifier. The article presents simulation results that demonstrate the advantages of the proposed classification method in comparison with the support vector machine.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"49 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139276661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy Efficiency Analysis of the Discontinuous Reception Scheme in 5G NR Communication Systems","authors":"G. Ermolaev, O. Bolkhovskaya, A. Maltsev","doi":"10.31854/1813-324x-2023-9-5-16-24","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-5-16-24","url":null,"abstract":"The purpose of this work is to analyze the energy saving schemes of user equipment in the first releases (Release 15) of the fifth generation (5G NR) cellular mobile communication systems, as well as to identify possible ways to improve the energy efficiency of these systems. The paper describes the identified drawbacks of the existing discontinuous reception scheme (DRX-scheme) used for user equipment energy saving in 5G NR. The effectiveness of discontinuous reception scheme in reducing user equipment energy consumption was analyzed in detail by simulation study for various traffic models and a key scenario for the deployment of 5G wireless cellular mobile communication systems. Analysis of the simulation results shows that the discontinuous reception scheme does not reach the upper limit of possible energy saving for all the traffic models studied for a number of reasons described in this paper.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"2004 53","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139277880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Location Aware Beamforming in Millimeter-Wave Band Ultra-Dense Radio Access Networks. Part 2. Model of a Set of Radio Links","authors":"G. Fokin","doi":"10.31854/1813-324x-2023-9-5-43-64","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-5-43-64","url":null,"abstract":"The second part of the study of beamforming issues, based on positioning in ultra-dense millimeter wave radio access networks, is devoted to the formalization and software implementation of a complex simulation model of the functioning of a set of directional radio links. Each directional radio link between a base station (gNodeB – gNB), equipped with an antenna array, and a user equipment (UE), operating in omnidirectional mode, is formed according to the location of the UE, known at the gNB. The set of gNB→UE directional radio links, simultaneously operating in a common frequency range, is studied as a set of traffic beams, that implement space division multiple access (SDMA). Spatial multiplexing is implemented through three-dimensional beamforming at the gNB and makes it possible to compensate for propagation losses and high levels of interference. In the first part of the study, it was shown that the problem of practical implementation of SDMA in ultra-dense radio access networks is a significant (tens of dB) spread in the signal to interference plus noise ratio (SINR), depending on the arrangement of two devices. The purpose of this study is to establish the dependence of SINR on 1) the beamwidth of the gNB sector in the direction of the user equipment in the radio link of the signal of interest (SOI); 2) uncertainty of the UE location; 3) interference from radio links of signal not of interest (SNOI): a) within its sector, b) other sectors of its cell and c) other cells in the network. The simulation model developed and implemented in software in this work for the first time made it possible to establish the interdependence of the UE positioning error factors and the required width of the traffic beam for its service. In particular, it was found, that as the positioning error decreases from 10 to 1 m, the required beam width in the horizontal and vertical planes narrows to 3 °, which makes it possible to increase the SINR to 25 dB. A simultaneous transmission multiplexing study showed that for 64 spatially multiplexed UEs, as the cell size increases from 20 to 300 m, the SINR increases by approximately 30 dB, subject to a beamwidth constraint of 3°. Unlike similar studies, in this model, the contribution from interference from simultaneously operating traffic beams within its sector, other sectors of its cell and other cells in the network is shown separately for the first time, which allows to differentiate the origin of interference and use scientifically based beamwidth control for their compensation.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"29 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139276968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}