PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Investigation of G-network with random delay of signals at nonstationary behaviour

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The object of this research is an open queueing G-network with signals with random delay. The purpose of the research is investigation of such a network at the transient behavior. It is considered the case when the intensity of the incoming flow of positive and negative messages and service intensity of messages do not depend on time. All the systems in the network are one-line. It is described the model of computer system DDoS-attacks, the effect of penetration of the virus in a computer network in the form of G-network with random delay of signals. Approximate expressions are obtained for the time-dependent probabilities of states and the average characteristics of the network. Examples are calculated.
Rocznik
Strony
155--166
Opis fizyczny
Bibliogr. 10 poz., rys.
Twórcy
  • Institute of Mathematics, Czestochowa University of Technology Częstochowa, Poland
autor
  • Faculty of Mathematics and Computer Science, Grodno State University Grodno, Belarus
Bibliografia
  • [1] Naumenko V., Matalytski M., Investigation of G-network with signals at transient behavior, Distributed Computer and Communication Networks: Control, Computation, Communications, Proc. of the 17th Intern. Conf. Moscow. M. MSU. 2013, 440-447 (in Russian).
  • [2] Bocharov P., Queueing network with signals with random delay, Automatics and Telemechanics 2002, 9, 90-101 (in Russian).
  • [3] Vishnevsky V., Theoretical Bases of Designing Computer Networks, Technosphere, M.: 2003, 512 p. (in Russian).
  • [4] Matalytski M., Naumenko V., Analysis of the G-network with a random delay of signals in a transient behaviour and its application, Vestnik GrSU, Ser. 2, 2014, 1, 135-147 (in Russian).
  • [5] Matalytski M., Naumenko V., Nonstationary analysis of queueing network with positive and negative messages, Journal of Applied Mathematics and Computational Mechanics 2013, 12, 2, 61-71.
  • [6] Faytts F., Dzhnonson P., Kratz M., Computer Virus: Problems and Prognosis, Mir, 1994, 176 p. (in Russian).
  • [7] Kaspersky LAB Threats. ABCs of security, Directory threats in 2013, Access mode:http://www.kaspersky.ru/threats_faq (Electronic resource).
  • [8] Kaspersky DDoS Prevention DDoS-attack. 2013, Access mode: http://www.kaspersky.ru/ddosprevention (Electronic resource).
  • [9] DDoS-attacks 2010, Access mode: http://ddosattack.ru/ (Electronic resource).
  • [10] SecurityLAB by Positive technologies: DDoS-attacks. 2012, Access mode: http://www.securitylab.ru/news/tags/DDoS (Electronic resource).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-b49380e6-c2ac-4401-b851-4e96b60f6ee5
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.