Перегляд за автором "Yeremenko, O."
Зараз показано 1 - 10 з 10
Результатів на сторінку
Варіанти сортування
Публікація Cybersecurity Virtual Laboratory for distance learning(ACM, 2020) Yeremenko, O.; Yevdokymenko, M.; Kuzminykh, I.; Kruhlova, A.In the conditions of distance learning of university students, there is a problem of practical and laboratory work organization. This is especially true of technical universities, where training in ordinary conditions is carried out on real equipment and using specialized software. In this regard, there is an urgent need to create a virtual laboratory, as an effective platform for distance learning students.Публікація Fast ReRouting Flow-based Model with Implementation of Path Protection(2020) Yeremenko, O.; Yevdokymenko, M.; Sleiman, B.; Omowumi Stephen OlayinkaIn this paper, the fast rerouting model with the implementation of the path protection scheme in the infocommunication network is investigated. Within the proposed Fast ReRoute model with the path protection schemes, the problem of calculating the set of primary and backup disjoint paths was solved. The advantage of the improved model is the possibility of implementing protection schemes 1:1, 1:2, ..., 1:n without introducing an additional set of routing variables. This results in reducing the dimension of the optimization problem to be solved and the computational complexity of its implementation. The optimality criterion of routing solutions contributes to the formation of primary and backup disjoint paths with the maximum bandwidth. Additionally, the path with the highest bandwidth will correspond to the primary path, while the rest of the paths will be used as a backup in decreasing order of their bandwidth.Публікація ICT Disruptive Technologies: Starlink in Ukraine Case(2022) Yeremenko, O.; Lemeshko, O.; Persikov, M.; Lemeshko, V.Currently, disruptive technologies make fundamental changes in markets and industry and are vital in providing critical services. Starlink is such a technology provisioning global Internet access. Thus, there is an urgent need to deploy the Starlink in Ukraine for reliable Internet access to restore destroyed territories.Публікація Inter-domain routing method under normalized Quality of Service based on hierarchical coordination(ХНУРЕ, 2020) Lemeshko, O.; Yevdokymenko, M.; Hu, Z.; Yeremenko, O.The inter-domain routing method under normalized Quality of Service (QoS) based on hierarchical coordination in a Software-Defined Network (SD-WAN, Hybrid SD-WAN) is proposed in the paper. The novelty of the method is that the routing solutions are aimed at ensuring the normalized QoS in terms of average transmission rate and average end-to-end packet delay. The method is based on the use of a decomposition flow-based routing model, which consists of the inter-domain routing interaction and ensuring the normalized QoS conditions that obtained during tensor network modeling. Therefore, the inter-domain QoS routing problem was presented as an optimization problem with a quadratic optimality criterion. A number of numerical examples confirmed the efficiency and effectiveness of the proposed method in terms of providing the normalized QoS within the finite number of iterations. Reducing the number of such iterations helps to decrease the amount of service traffic transferred between routers and SDN controllers at different levels, as well as minimize the time for solving the inter-domain QoS-routing task.Публікація Investigation of the Secure Paths Set Calculation Approach Based on Vulnerability Assessment(CEUR-WS, 2021) Yevdokymenko, M.; Yeremenko, O.; Shapovalova, A.; Shapoval, M.; Porokhniak, V.; Rogovaya, N.An approach to the calculation of secure paths based on the routing model taking into account information security risks using the basic vulnerability criticality metrics is proposed and investigated. The approach for calculating route metrics uses obtained expressions, which characterize the information security risk in network links in the case of existing vulnerabilities. The results of the investigation showed that within the approach of calculating secure paths with increasing packet traffic, the paths in the network that contained links with the lowest weights, i.e. had the least weight of compromise, were loaded first. The transmission of the packet flow after overloading the more secure path was carried out in the following paths according to the values of the weights of the communication links. The paths in the network that contained the links with the highest weights were loaded last.Публікація Model of data traffic qos fast rerouting in infocommunication networks(ХНУРЕ, 2019) Lemeshko, O.; Yevdokymenko, M.; Yeremenko, O.The subject of research in the article is the processes of fast rerouting with the protection of the Quality of Service level in infocommunication networks. The aim of the work is the development of a mathematical model of Fast ReRouting with the protection of the Quality of Service level by the bandwidth and probability of packet loss for data traffic. The following tasks are solved in the article: development and research of a fast rerouting flow-based model with the protection of the Quality of Service level of data traffic in the infocommunication network. The following methods are used: the graph theory, the teletraffic theory, the queuing theory, and mathematical programming methods. The following results were obtained: the fast rerouting flow-based model was developed and investigated, which, due to the introduced protection conditions on indicators of bandwidth and packet loss probability, allows providing the Quality of Service along both the primary and backup multipath. Conclusions: Within the framework of the proposed flow-based model, the fast rerouting technological task was formulated as an optimization problem with the constraints of the conditions of implementation of the multipath routing strategy, conditions of flow conservation, and conditions of protection of the link, node, and level of Quality of Service in terms of bandwidth and packet loss probability. The application of this solution contributes to the optimal use of the available network resource while providing the specified level of Quality of Service in terms of bandwidth and probability of packet loss along both the primary and backup routes in the case of a failure of the infocommunication network elements. The proposed flow-based model can be used as the basis of the algorithmic software of existing routers and/or controllers of Software-Defined Networks, which are responsible for the calculation of the primary and backup paths in the fast rerouting of data traffic sensitive to such Quality of Service indicators as bandwidth and packet loss probability.Публікація Network Security Approach based on Traffic Engineering Fast ReRoute with support of Traffic Policing(CEUR-WS, 2021) Lemeshko, O.; Yeremenko, O.; Yevdokymenko, M.; Shapovalova, A.; Lemeshko, V.The work is devoted to the approach development and investigation of the network security providing based on Traffic Engineering Fast ReRoute with support of Traffic Policing. The corresponding flow-based mathematical model has been developed where the technological task of secure fast rerouting was presented in the form of a linear programming problem. The novelty of the proposed model is the modification of load balancing conditions and bandwidth protection during fast rerouting, which in addition to the Quality of Service, also considers the probability of compromising the link as an indicator of network security. The routing solutions obtained within the proposed model are aimed at reducing the overload of communication links with a high probability of compromising by redistributing traffic for transmission through more secure network links. The advantage of the proposed solution is that in the conditions of congestion the load balancing is realized on the principles of Traffic Engineering and, if necessary, differentiated limitation of the load entering the network. An additional advantage of the proposed optimization model is its linearity, which focuses on the low computational complexity of the corresponding protocol implementation in practice. Numerical research of the Secure TE-FRR-TP model has confirmed the adequacy and efficiency of routing solutions made on its basis, both in terms of ensuring network security, resilience, and load balancing with traffic policing based on priorities.Публікація Potential Cyber Threats Related to Gender Disinformation(2024) Horiainova, K.; Yeremenko, O.; Mersni, A.; Kapusta, R.Digital technology has both positive and negative effects. It amplifies opportunities for expression, participation, and information sharing but also multiplies online risks and threats. Gendered disinformation is not a new phenomenon, but it has gained momentum due to new technologies and social media. This study examines the issue of gendered disinformation in digital media, specifically the intentional spread of false information aimed at women to undermine their societal roles. The study recommends improving digital literacy, developing detection technologies, promoting cross-sector collaborations, and supporting victims. It emphasizes the need for a collective approach that respects all gender identities to address this urgent social and technological issue and promote a more equitable digital environment.Публікація Results of an Experimental Study of the Fault-Tolerant Routing Method with the GLBP Protocol(Eskişehir Technical University, 2022) Lemeshko, O.; Yeremenko, O.; Kruglova, A.; Zhuravlyova, A.; Lemeshko, V.; Persikov, M.This work proposes the results of an experimental study of a fault-tolerant routing method in an infocommunication network. The method implements proactive and reactive protection of the default gateway to provide a high level of network fault tolerance. Therefore, method is based on solving an optimization problem related to calculating primary and backup routes and determining the order of balancing the load incoming to edge routers from access networks. If one of the routers creating the virtual default gateway fails, the method changes the load balancing order between the functional border routers. Causes of failure can include overloading, low equipment reliability, hardware and software router failures, and violation of their network security level (compromise). The method considers the flow-based nature of network traffic, and the optimality criterion of routing solutions under Traffic Engineering is a minimum upper bound of network link utilization. To evaluate the effectiveness of the solutions, they were implemented on Cisco equipment. In the lab experiment, the Gateway Load Balancing Protocol functionality was used. Based on this fault-tolerant routing protocol, it is possible to set weighting coefficients administratively, the value of which affects the order of load balancing on the border routers. During the experiment, the weighting coefficients were adjusted not heuristically but according to the calculations obtained by the studied fault-tolerant routing method. The results of the study confirmed the effectiveness of the proposed solution. Ensuring optimal load balancing between border routers compared to the solution based on multipath routing, but without access layer balancing, improved network performance by 25.45% and reduced the upper bound of network link utilization by an average of 63.77 %. Lowering the utilization upper bound positively affects the quantitative values of the main Quality of Service indicators – the average end-to-end delay, jitter, and packet loss probability.Публікація The overview of cyber resilience approach using Traffic Engineering Fast ReRoute features(Azerbaijan University, 2021) Yeremenko, O.; Mersni Amal; Akulynichev, A.The research is dedicated to evaluating and developing a method for assuring cyber resilience based on Traffic Engineering Fast ReRoute with the assistance of the Traffic Policing mechanism. The suggested approach is founded on a mathematical model defined by multipath routing conditions and modified flow conservation conditions. Additionally, it considers traffic policing at the network edge and conditions for protecting (reserving) the link, node, and network bandwidth, all of which are tailored to meet cyber resilience needs. The proposed solution has the advantage of recasting the problem as a linear optimization. The numerical example demonstrates the model's operability and the adequacy of the findings acquired using it.