Work place: Kharkiv National University of Radio Electronics, Kharkiv, Ukraine
E-mail: ihor.ruban@nure.ua
Website: https://nure.ua/en/staff/igor-ruban
Research Interests: Image and Sound Processing, Security Services, Network Security
Biography
Igor Ruban was born in 1968. He graduated from Marshal M. I. Kripov Kharkov Higher Military Command-Engineering Institute of Missile Forces and got a degree in "Control and communication systems". Also, he graduated from National Technical University "Kharkiv Polytechnic Institute" and got a degree in "Administrative management". In 1997 he defended his thesis for the degree of candidate of technical sciences, the specialty is "Information technologies". Department of software and math provision of automatic control systems at Ivan Kozhedub Kharkiv National Air Force University. In 2008 he defended thesis for the degree of Doctor of Technical Sciences in the specialty "Information Technology" in Mykola Zhukovsky National Aerospace University "Kharkiv Aviation Institute". He has held the post of the vice-rector for scientific and methodological work since 2014. He is the author of more than two hundreds scientific publications. He is an academician of the Academy of Sciences of Applied Radio. and an honored worker of education in Ukraine. His scientific interests lie in the field of problems of cybernetic security, methods and means of digital image processing.
By Igor Ruban Nataliia Lukova-Chuiko Vadym Mukhin Yaroslav Kornaga Igor Grishko Anton Smirnov
DOI: https://doi.org/10.5815/ijcnis.2018.04.01, Pub. Date: 8 Apr. 2018
This article is proposes a new approach to the transmission of signatures of network attacks onto a remote Internet resource. The problem is that the known protocols that are used for transfer data and control actions from an administrative resource to a network agents are poorly protected. Even in case of use of cryptographic mechanisms for organization of secure connections, it is possible to form behavioral patterns of interactions such as "administrative resource - network agents." Such templates allow to predict the actions taken in accordance with the security policy in order to maintain the required level of functionality of a remote Internet resource. Thus, it is necessary to develop a new protocol for the transfer of designated information, based on information technology, which level out the existence of opportunities for the formation of behavioral patterns of network interactions. As such technology, it is proposed to use a set of means of network interaction and some methods of hidden (steganographic) data transmission in information and telecommunication networks.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals