Abstract

The study analyzes the physical characteristics of devices that can be targeted. A method of detecting a malicious device with a violation of the physical characteristics of the network node is developed. The proposed method is based on the use of probabilistic functions, the calculation of the confidence interval and the probability of deviation of the current indicators from the confidence interval. Approaches to the control of the output sequences of the encryption algorithm using dynamic chaos and the method of singular spectral analysis are considered. A comparative analysis of the parameters of the input and output sequences of the developed algorithm of encryption based on dynamic chaos and standard algorithms of data encryption is carried out. It is found that the parameters of the output sequences of the encryption algorithm using dynamic chaos and standard encryption algorithms are almost identical. As a result of the study, a method for estimating node load indicators was developed. Evaluation of these indicators using threshold analysis, when the current values of the node fall within the confidence interval, is used to detect deviations in the behavior of the node during a cyber-attack.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call