Abstract

The article deals with the problem of recognizing signals from systems of unauthorized covert acquisition of confidential information. The general problem of detecting signals from the means of covert information acquisition (CIL) consists in the direct formation of a technique that would allow submitting the detected signal from CIL using the legal data transmission range in an analytical form convenient for further analysis and direct detection of a malicious signal. An analysis of the meaning, signs and properties of the means of covertly obtaining information was carried out, and their unmasking signs were presented. An overview of the methods used to record the detected signals from the means of covert information acquisition in an analytical form convenient for further analysis is carried out. Methods of analytical representation of the detected signal in the form of a composition of continuous functions and in the form of a spline function of two variables were analyzed. In order to increase the effectiveness of signal recognition of means of covert information obtaining, a method of constructing a ZNOI signal in the form of a two-dimensional spline function or a tensor product of two one-dimensional spline spaces is proposed. This method makes it possible to improve the efficiency of recognition of ZNOI signals and its automation. It is shown that an important condition for the recognition of a probable signal of a digital ZNOI is finding the maximum energy of the spectrum, which in turn makes it possible to apply the criteria of mathematical analysis of reaching the extrema of the function. The use of such a mathematical apparatus makes it possible, using the existing technical and software complexes, to automate the process of recognition of ZNOI signals.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call