Vol 9, No 6 (2023)
COMPUTER SCIENCE AND INFORMATICS
Mathematical Model of the Unbalanced Monopole Feed. Part 3. Gain
Abstract
An integro-differential operator is specified that determines the longitudinal component of the electric field strength on the surface of the emitter conductor of an Unbalanced Monopole with Shunt Feed, created by the Base Current (BC). Analytical expressions are obtained that determine the parameters of an equivalent eight pole, which is the internal resistance of equivalent BC generators. The influence of the length of the counterweight conductors and the upper load of the high-voltage transformer on the efficiency and gain was studied.
Proceedings of Telecommunication Universities. 2023;9(6):6-23
6-23
ELECTRONICS, PHOTONICS, INSTRUMENTATION AND COMMUNICATIONS
Direct Sequence Spread Spectrum Signal’s Parameters Estimation Bounds
Abstract
The article discusses the problems of direct spread spectrum signal’s parameters estimation and estimation performance analyzing. The achieved estimation variances compared with the corresponding Cramer ‒ Rao bounds as a rule. The proposed approach makes it possible to determine the bounds for signals of various types of modulation and spectral characteristics. The dependences of the Cramer ‒ Rao bounds on the signal-to-noise ratio, the spread spectrum sequence length and the duration of the observation interval are presented.
Proceedings of Telecommunication Universities. 2023;9(6):25-33
25-33
Electromagnetic Accessibility of Starlink User Terminals
Abstract
The results of assessing the electromagnetic accessibility of radio emission sources of the Starlink satellite communication system are presented. The features of the organizational and technical structure of the system are considered. Its main technical capabilities for organizing the provision of telecommunications services to users of subscriber terminals are analyzed. The technical features of the infrastructure of the Starlink satellite communication system, which are essential for the electromagnetic accessibility of its sources, have been studied. The possibility of radio links for transmitting information content in the upstream and downstream channels of the Starlink satellite communication system was assessed. The main stages of the developed methodology for assessing the electromagnetic accessibility of sources are presented. Analytical expressions are given for calculating the probability of detection and attenuation of signals. The requirements for the sensitivity of the receiving equipment of monitoring equipment are substantiated. Dependences of the level of signal attenuation on the distance of control equipment were obtained.
Proceedings of Telecommunication Universities. 2023;9(6):34-41
34-41
Analyzing Traffic Identification Methods for Resource Management in SDN
Abstract
The article is devoted to the analysis of traffic classification methods in SDN network. The review of analytical approaches of traffic identification to identify the solutions used in them, as well as assessing their applicability in the SDN network. Types of machine learning are considered and input parameters are analyzed. The methods of intelligent analysis covered in the scientific articles are systematized according to the following criteria: traffic identification parameters, neural network model, identification accuracy. Based on the analysis of the review results, the conclusion is made about the possibility of applying the considered solutions, as well as the need to form a scheme of SDN network with a module of artificial intelligence elements for load balancing.
Proceedings of Telecommunication Universities. 2023;9(6):42-57
42-57
INFORMATION TECHNOLOGIES AND TELECOMMUNICATION
Proposals for Universal Protocol Fuzzer Construction
Abstract
The article studies the problem of ensuring information security in the field of telecommunications using the phasing method. The analysis of modern software products designed for testing by the fuzzing method is carried out, their disadvantages are revealed, and an approach to the creation of a universal mutation protocol fuzzer is proposed. The method of test data formation allows to automate the process of searching for vulnerabilities in telecommunication protocols and pro-software. Its novelty lies in the formation of test constructs on the basis of parameters of fields of telecommunication protocols. The proposed fuzzy solution allows to form an attack vector on the basis of known parameters presented in the threat database, as well as to modify these attack vectors.
Proceedings of Telecommunication Universities. 2023;9(6):59-67
59-67
Methodology for Machine Code Reverse Engineering. Part 2. Static Investigation
Abstract
The creating results a unified methodology for reverse engineering the machine code of devices are presented. This second part of the articles series is devoted to static research of code in order to restore its metainformation (source code, algorithms, architecture, conceptual model), as well as search for vulnerabilities in it. A scientific publications review on the topic of existing methods and tools for static analysis of machine code is carried out. A detailed description and formalization of the steps of the stage is given, as well as examples of their application in practice. A proposed methodology partial diagram is presented in graphical form, indicating the main and intermediate results obtained.
Proceedings of Telecommunication Universities. 2023;9(6):68-82
68-82
Machine Learning vs Software Vulnerability Detection: Applicability Analysis and Conceptual System Synthesis
Abstract
The article is devoted to the searching for vulnerabilities in software problem, as well as the possibilities of application of such a promising area in information technology as machine learning. For this purpose, a review of scientific publications in this area from Russian and foreign citation databases is made. A comparative analysis of the review's results was made according to the following criteria: publication year, application field, idea, solved problem of machine learning, degree of realization of its models and methods; for each criterion basic conclusions were drawn. As a result, 7 principles of building a new conceptual system of searching for vulnerabilities in software with the help of machine learning are proposed, the short meaning of which is as follows: program's multilateral study, combination of known methods, the use of machine learning in each method and algorithm of its management, the possibility of correcting the expert's work, storing information in a database and its synchronization with external, advisory nature of the found vulnerabilities; single software application usage. Based on the stated principles, a graphical scheme of such a system has been developed.
Proceedings of Telecommunication Universities. 2023;9(6):83-94
83-94
Vulnerability Characteristics of Global Navigation Satellite System Consumer Equipment to Spoofing Attacks
Abstract
The article presents approaches to assessing the vulnerability of navigation equipment of global navigation satellite systems consumers to spoofing attacks, as well as technologies for protection against interference and spoofing. Approaches and tools are proposed for assessing the vulnerability of navigation equipment of global navigation satellite systems in the presence of simulated interference. The results obtained can be used by developers to create a new generation global navigation satellite systems with improved protection against spoofing.
Proceedings of Telecommunication Universities. 2023;9(6):95-100
95-100
RESEARCH RESULTS BY YOUNG SCIENTISTS
An Efficient Interface Model of User Interaction with a Query-Type Information Service
Abstract
The work solves the problem an analytical model constructing of the user interaction interface with an information system designed to provide information based on multi-parameter user requests. The model purpose is to evaluate the effectiveness of the interface and, accordingly, the interaction itself. To do this, using an example of typical work with an interface, the following prerequisites (as conditions) for modeling are introduced: the effectiveness of the interface, its forms and transitions between them, interface elements, the atomic efficiency of the element and form, the order of their arrangement and the empirical dependence of efficiency, as well as the formulation interface design tasks. Using these premises, an appropriate efficiency model has been formed, which allows us too analytically, based on the structure and parameters of the interface, evaluate its effectiveness, operativeness and resource efficiency. A software prototype was created, which was based on the model and with the help of which a number of experiments were carried out under three scenarios, consisting of changing the number of forms and interface elements in order to determine their impact on overall efficiency; the corresponding dependencies were obtained in the form of histograms. Conclusions are drawn regarding the accuracy of the model, its theoretical and practical significance, as well as the overall complexity of designing “ideal” interfaces.
Proceedings of Telecommunication Universities. 2023;9(6):102-115
102-115