Abstract
In this paper workflow of the airline's computer network is reviewed. The major security threat of airline network is the usage of random local networks around the world. This threat is especially high for worldwide operating charter companies with random routes. Aircraft in remote airports are using local networks which information security level does not meet company policy. In order to increase information security of the network usage of a Softswitch was proposed. The Softswitch is located onboard of the aircraft and connected to multiple communication devices. Each time connection is made proper connection line is selected using analytic hierarchy process. Selection is based on the reliability, information security, average speed and data transfer costs criteria for each connection. Based on the criteria numerical priority value for each channel is calculated, and the best channel is selected. This approach ensures that a channel that does not meet minimal information security criteria will not be used. Based on automatic channel selection, overall information security of the network is expected. Another problem of such approach is evaluation of reliability of Softswitch control software. Software reliability can be assessed using the theory of technical systems testing, which involves the use of the sensitivity functions. However, in general case mathematical algorithms used in Softswitches generally have a nonlinear, discontinuous, and multidimensional appearance, which makes it impossible to obtain the sensitivity functions analytically. In this paper we consider application of harmonic analysis methods to obtain the sensitivity functions in an analytical form. The use of sensitivity functions allows you to identify the parameters that significantly affect the original function, and to take appropriate measures to improve the reliability of the system.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: Ukrainian Scientific Journal of Information Security
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.