350 rub
Journal Nonlinear World №9 for 2013 г.
Article in number:
Mathematical models, methods and algorithms to provide stable operation of modern systems of data storage and processing
Authors:
O.V. Esikov - Dr.Sci. (Eng.), Professor, Academician of Academy of Engineering Sciences of Name A.M. Prokhorov. E-mail: eovmail@rambler.ru
S.S. Savvateev - Ph.D. (Eng.), Academician of Academy of Engineering Sciences. E-mail: s.savvateev@gmail.com
D.O. Esikov - Dr.Sci. (Eng.), Professor, Tula State University. E-mail: mcgeen4@gmail.com
A.V. Strukov - Ph.D. (Eng.), Corresponding Fellow of Academy of Engineering Sciences of Name A.M. Prokhorov, Scientific Secretary of the Section «Information security» of the Russian Scientific and Technical Society of Radio Engineering, Electronics and Communication of Name A.S. Popov. E-mail: strukovi14@yandex.ru
E.M. Suharev - Dr.Sci. (Eng.), Professor, Academician of Academy of Engineering Sciences of Name A.M. Prokhorov. E-mail: e.suharev@yandex.ru
Abstract:
In modern conditions, the quality of the functioning of the storage and processing of data, which are the core of enterprise management systems, the greatest impact deliberate destabilizing factors. Ensure the sustainability of such systems in these cases is only possible through the use of integrated solutions in the field of technical reliability of the data processing, security, and integrity of information, highly effective arrangements for storing and processing data. Complex solutions to ensure the sustainability of the required data processing and data storage is necessary to lay in all stages of control systems design, development, deployment and upgrades. Proposed a set of mathematical models, methods and algorithms in the field of optimization of data storage media, ensure the adequacy of security systems, anti-malware, providing solutions to the most pressing problems in ensuring the sustainability of modern storage and processing of data.
Pages: 621-631
References

  1. Brojdo V.L. Vy'chislitel'ny'e sistemy', seti i telekommunikaczii: Uchebnik dlya vuzov. SPb.: Piter. 2006.
  2. Koreev V.V. Vy'chislitel'ny'e sistemy'. M.: Gelios ARV. 2004.
  3. Dajlip Najk. Sistemy' xraneniya danny'x v Windows. M.: Vil'yams. 2005.
  4. Nikolaev V.I., Bruk V.M. Sistemotexnika: metody' i prilozheniya. L.: Mashinostroenie, Leningr. otd-nie. 1985.
  5. Povzner L.D. Teoriya sistem upravleniya: Ucheb. posobie dlya vuzov. M.: Izd. MGGU. 2002.
  6. Voronin A.A., Morozov B.I. Nadezhnost' informaczionny'x sistem: Ucheb. posobie. SPb.: Izd-vo SPbGTU. 2001.
  7. Esikov D.O. Obespechenie ustojchivogo funkczionirovaniya vy'chislitel'ny'x sistem za schet obespecheniya vy'sokonadezhogo xraneniya danny'x // Sb. statej 15-j Mezhdunar. nauch.-prakt. konf. «Fundamental'ny'e i prikladny'e issledovaniya, razrabotka i primenenie vy'sokix texnologij v promy'shlennosti». SPb.: Izd-vo Politexnicheskogo universiteta. 2013
  8. Kiselev V.D., Esikov O.V., Kisliczy'n A.S. Teoreticheskie osnovy' optimizaczii informaczionno-vy'chislitel'nogo proczessa i sostava kompleksov sredstv zashhity' informaczii v vy'chislitel'ny'x setyax  / pod red. prof. E.M. Suxareva. M.: Poligrafservis XXI vek. 2003.
  9. Kiselev V.D., Esikov O.V., Kisliczy'n A.S. Zashhita informaczii v sistemax ee peredachi i obrabotki / pod red. E.M. Suxareva. M.:SOLID. 2000.
  10. Alekseev O.G. Kompleksnoe primenenie metodov diskretnoj optimizaczii. M.: Nauka. 1987.
  11. Esikov O.V., Buravlev A.A., Solov'ev V.I. Matematicheskie modeli i metody' opredeleniya pokazatelej kachestva funkczionirovaniya sistem zashhity' informaczii v ASU // V kn. Informaczionnaya bezopasnost': metody' shifrovaniya / pod red. E.M. Suxareva. Kn. 7. M.: Radiotexnika. 2011. S. 76-100.
  12. Nechetkie mnozhestva i teoriya vozmozhnostej. Poslednie dostizheniya: per. s angl. / pod red. R.R. Jagera. M.: Radio i svyaz'. 1986.
  13. Esikov O.V., Savateev S.S., Solov'ev V.I., Strukov A.V. Modeli, algoritmy' i metody' klassifikaczii vredonosny'x programm na osnove analiza ix povedeniya v zashhishhaemoj sisteme // V kn. Informaczionnaya bezopasnost': metody' shifrovaniya / pod red. E.M. Suxareva. Kn. 7. M.: Radiotexnika. 2011. S. 101-117.
  14. URL:http://anubis.iseclab.org (data obrashheniya 25.06.2012).
  15. URL: http://camas.comodo.com (data obrashheniya 25.06.2012).
  16. URL:http://www.threattracksecurity.com/resources/sandbox-malware-analysis.aspx (data obrashheniya 25.06.2012).
  17. URL:http://www.xandora.net/upload/ (data obrashheniya 25.06.2012).
  18. URL:http://www.cuckoosandbox.org/ (data obrashheniya 25.06.2012).
  19. Borgelt C. Prototype-based Classification and Clustering: Habilitation thesis. Magdeburg: Otto-von-Guericke-Universität Magdeburg, 2005. 350 s.
  20. Bradford R. An empirical study of required dimensionality for large-scale latent semantic indexing applications. Proceedings of the 17th ACM conference on Information and knowledge management. New York, USA, 2008.
  21. Berry M., Dumais S., Brien G.O'. Using linear algebra for intelligent information retrieval // Journal SIAM Review archive. 1995. V. 37. № 4.
  22. Řehůřek R., Sojka P. Software Framework for Topic Modelling with Large Corpora. In Proceedings of LREC 2010 workshop New Challenges for NLP Frameworks. Valletta, Malta: University of Malta. 2010. R. 46-50.
  23. Rieck K., Trinius P., Willems C., Holz T. Automatic Analysis of Malware Behavior using Machine Learning // Journal of Computer Security. Amsterdam, The Netherlands: IOS Press. 2011. V. 19. № 4. R. 639-668.