Advertisement

Information Technologies for Analysis and Modeling of Computer Network’s Development

  • Nataliia IvanushchakEmail author
  • Nataliia Kunanets
  • Volodymyr Pasichnyk
Chapter
  • 5 Downloads
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 48)

Abstract

One of the key problems to provide the secure management of complex computer networks is testing, which requires a functional depiction of such systems by a corresponding mathematical model. That’s why it is needful to implement a statistical study of network ensembles, simulation their architecture and increase motions. The purpose of the work is to analyze the properties of computer networks of different Internet providers, develop new, improve and adapt existing methods and tools of mathematical simulation, which enable the study of their structure and parameters based on fragmentary observation data, modeling and forecasting processes for their development and structuring in Within the framework of the formalism of complex networks. Here a systematic analysis of methods and means of mathematical modeling of computer networks for prediction of their growth and clustering processes was carried out, the requirements for them based on the review of existing mathematical models were developed, on this basis a list of actual and unexamined tasks was developed for the purpose of further improvement and development of new methods scientifically grounded decisions. The developed method of modeling was used for analysis, evaluation and development of processes of stability of computer networks for directed hacker attacks and distribution of computer viruses in them.

Keywords

Local area network Mathematical modeling Security mathematical model Complex network theory 

References

  1. 1.
    Golovach Y, Olmeskoy O, fon Ferber K et al (2006) Skladni merezhi (The complex networks). Zhurnal fizychnykh doslidzhen 10(4):247–289Google Scholar
  2. 2.
    Newman M (2003) The structure and function of complex networks. SIAM Rev 45(2):167–256MathSciNetCrossRefGoogle Scholar
  3. 3.
    Erdős P, Renyi A (1960) On the evolution of random graphs. Publications of the Mathematical Institute of the Hungarian Academy of Sciences, vol 5, pp 17–61Google Scholar
  4. 4.
    Greenman (1977) Graphs and Markov Chains. Math Gazette 61(415):49CrossRefGoogle Scholar
  5. 5.
    Watts D, Strogatz S (1998) Collective dynamics of ‘small-world’ networks. Nature 393(6684):440–442CrossRefGoogle Scholar
  6. 6.
    Barabasi Albert R (1999) Emergence of scaling in random networks. Science 286(5439):509–512MathSciNetCrossRefGoogle Scholar
  7. 7.
    Gao Z, Small M, Kurths J (2016) Complex network analysis of time series. EPL (Europhys Lett) 116(5):50001CrossRefGoogle Scholar
  8. 8.
    Cencetti G, Bagnoli F, Battistelli G, Chisci L, Fanelli D (2017) Control of multidimensional systems on complex network. PLoS ONE 12(9):e0184431CrossRefGoogle Scholar
  9. 9.
    Gershenson C, Niazi M (2013) Multidisciplinary applications of complex networks modeling, simulation, visualization, and analysis. Complex Adapt Syst Model 1(1):17CrossRefGoogle Scholar
  10. 10.
    Monaco A, Monda N, Amoroso A et al (2018) A complex network approach reveals a pivotal substructure of genes linked to schizophrenia. PLoS ONE 13(1):e0190110CrossRefGoogle Scholar
  11. 11.
    Leyffer S, Safro I (2013) Fast response to infection distribution and cyber attacks on large-scale networks. J Complex Netw 1(2):183–199CrossRefGoogle Scholar
  12. 12.
    Schröter M, Paulsen O, Bullmore E (2017) Micro-connectomics: probing the organization of neuronal networks at the cellular scale. Nat Rev Neurosci 18(3):131–146CrossRefGoogle Scholar
  13. 13.
    Kryvinska, N. (2010) Converged network service architecture: a platform for integrated services delivery and interworking. Electronic business series, vol 2. International Academic Publishers, Peter Lang Publishing GroupGoogle Scholar
  14. 14.
    Kryvinska N (2008) An analytical approach for the modeling of real-time services over IP network. Math Comput Simul 79(4):980–990.  https://doi.org/10.1016/j.matcom.2008.02.016MathSciNetCrossRefzbMATHGoogle Scholar
  15. 15.
    Kryvinska N (2004) Intelligent network analysis by closed queuing models. Telecommun Syst 27:85–98.  https://doi.org/10.1023/B:TELS.0000032945.92937.8fCrossRefGoogle Scholar
  16. 16.
    Kryvinska N., Zinterhof P, van Thanh D (2007) An analytical approach to the efficient real-time events/services handling in converged network environment. In: Enokido T, Barolli L, Takizawa M (eds) Network-based information systems. NBiS 2007. Lecture notes in computer science, vol 4658. Springer, BerlinGoogle Scholar
  17. 17.
    Ageyev DV, Salah MT (2016) Parametric synthesis of overlay networks with self-similar traffic. Telecommun Radio Eng (English translation of Elektrosvyaz and Radiotekhnika) 75(14):1231–1241CrossRefGoogle Scholar
  18. 18.
    Ignatenko AA, Ageyev DV (2013) Structural and parametric synthesis of telecommunication systems with the usage of the multi-layer graph model. In: Proceedings of the 2013 23rd international Crimean conference microwave and telecommunication technology (CriMiCo 2013), pp 498–499Google Scholar
  19. 19.
    Ageyev D, Ali A-A, Nameer Q (2015) Multi-period LTE RAN and services planning for operator profit maximization. In: 2015 13th international conference on the experience of designing and application of CAD systems in microelectronics (CADSM). IEEE, pp 25–27.  https://doi.org/10.1109/cadsm.2015.7230786
  20. 20.
    Radivilova T et al (2018) Decrypting SSL/TLS traffic for hidden threats detection. In: Proceedings of the 2018 IEEE 9th international conference on dependable systems, services and technologies (DESSERT). IEEE, pp 143–146.  https://doi.org/10.1109/dessert.2018.8409116
  21. 21.
    Ageyev D et al (2018) Classification of existing virtualization methods used in telecommunication networks. In: Proceedings of the 2018 IEEE 9th international conference on dependable systems, services and technologies (DESSERT), pp 83–86Google Scholar
  22. 22.
    Karpukhin A et al (2017) Features of the use of software packages for modeling infocommunication systems. In: Proceedings of the 2017 4th international scientific-practical conference problems of infocommunications. Science and technology (PIC S&T). IEEE, pp 380–382.  https://doi.org/10.1109/infocommst.2017.8246421
  23. 23.
    Radivilova T, Kirichenko L, Ageiev D, Bulakh V (2020) The methods to improve quality of service by accounting secure parameters. In: Hu Z, Petoukhov S, Dychka I, He M (eds) Advances in computer science for engineering and education II. ICCSEEA 2019. Advances in intelligent systems and computing, vol 938. Springer, ChamGoogle Scholar
  24. 24.
    Kirichenko L, Radivilova T, Tkachenko A (2019) Comparative analysis of noisy time series clustering. CEUR Workshop Proceedings, vol 2362, pp 184–196. http://ceur-ws.org/Vol-2362/paper17.pdf
  25. 25.
    Radivilova T, Kirichenko L, Yeremenko O (2017) Calculation of routing value in MPLS network according to traffic fractal properties. In: 2017 2nd international conference on advanced information and communication technologies (AICT). IEEE, pp 250–253.  https://doi.org/10.1109/aiact.2017.8020112
  26. 26.
    Ivanisenko I, Radivilova T (2015) The multifractal load balancing method. In: 2015 second international scientific-practical conference problems of infocommunications science and technology (PIC S&T). IEEE, pp 122–123.  https://doi.org/10.1109/infocommst.2015.7357289
  27. 27.
    Kryvinska N, Zinterhof P, van Thanh D (2007) New-emerging service-support model for converged multi-service network and its practical validation. In: First international conference on complex, intelligent and software intensive systems (CISIS’07). IEEE, pp 100–110.  https://doi.org/10.1109/cisis.2007.40
  28. 28.
    Albert R, Jeong H, Barabási A-L (2000) Error and attack tolerance of complex networks. Nature 406(6794):378–382CrossRefGoogle Scholar
  29. 29.
    Alstott Bullmore E, Plenz D (2014) Powerlaw: A python package for analysis of heavy-tailed distributions. PLoS ONE 9(1):e85777CrossRefGoogle Scholar
  30. 30.
    Da Silva D, Bianconi G, Da Costa R, Dorogovtsev S, Mendes J (2018) Complex network view of evolving manifolds. Phys Rev E 97(3)Google Scholar
  31. 31.
    Kitsak M, Ganin A, Eisenberg D et al (2018) Stability of a giant connected component in a complex network. Phys Rev E 97(1)Google Scholar
  32. 32.
    Yehezkel A, Cohen R (2012) Degree-based attacks and defense strategies in complex networks. Phys Rev E 86(6)Google Scholar
  33. 33.
    Duda O, Matsyuk O, Pasichnyk V, Kunanets N (2018) Kontsept «rozumne misto» ta informatsiyni tekhnolohiyi BigData (The concept of “smart city” and information technologies BigData). Paper presented at the 5th scientific and technical conference information models, systems and technologies, Teropil Ivan Pului National Technical University, Ternopil, 1–2 Feb 2018, p 30Google Scholar
  34. 34.
    Ivanushchak N, Kunanets N, Pasichnyk V (2018) Mathematical modeling and analysis of destabilization threats in computer networks. Paper presented at the international scientific and practical conference problems of infocommunications. Science and technology, Kharkiv National University of Radio Electronics, Kharkiv, 9–12 Oct 2018, pp 191–197Google Scholar
  35. 35.
    Sloot P, Ivanov S, Boukhanovsky A, van de Vijver D, Boucher C (2008) Stochastic simulation of HIV population dynamics through complex network modeling. Int J Comput Math 85(8):1175–1187MathSciNetCrossRefGoogle Scholar

Copyright information

© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021

Authors and Affiliations

  • Nataliia Ivanushchak
    • 1
    Email author
  • Nataliia Kunanets
    • 2
  • Volodymyr Pasichnyk
    • 2
  1. 1.Department of Computer Systems and NetworksYuriy Fedkovych Chernivtsi National UniversityChernivtsiUkraine
  2. 2.Department of Information Systems and NetworksLviv Polytechnic National UniversityLvivUkraine

Personalised recommendations