Перегляд за автором "Yevdokymenko, M."
Зараз показано 1 - 7 з 7
Результатів на сторінку
Варіанти сортування
Публікація Analyses of european cybersecurity frameworks(ХНУРЕ, 2020) Yevdokymenko, M.; Sebastian Floderus; Linus Rosenholm; Vincent TewoldeThe main purpose of the paper is to analyze the EU cybersecurity frameworks and policies, to compare the development strategies of European countries and Ukraine, to identify compatibility and gaps between them for further developing recommendations for creating a more reliable and safe ecosystem through integrating EU cybersecurity frameworks.Публікація Cybersecurity Virtual Laboratory for distance learning(ACM, 2020) Yeremenko, O.; Yevdokymenko, M.; Kuzminykh, I.; Kruhlova, A.In the conditions of distance learning of university students, there is a problem of practical and laboratory work organization. This is especially true of technical universities, where training in ordinary conditions is carried out on real equipment and using specialized software. In this regard, there is an urgent need to create a virtual laboratory, as an effective platform for distance learning students.Публікація Fast ReRouting Flow-based Model with Implementation of Path Protection(2020) Yeremenko, O.; Yevdokymenko, M.; Sleiman, B.; Omowumi Stephen OlayinkaIn this paper, the fast rerouting model with the implementation of the path protection scheme in the infocommunication network is investigated. Within the proposed Fast ReRoute model with the path protection schemes, the problem of calculating the set of primary and backup disjoint paths was solved. The advantage of the improved model is the possibility of implementing protection schemes 1:1, 1:2, ..., 1:n without introducing an additional set of routing variables. This results in reducing the dimension of the optimization problem to be solved and the computational complexity of its implementation. The optimality criterion of routing solutions contributes to the formation of primary and backup disjoint paths with the maximum bandwidth. Additionally, the path with the highest bandwidth will correspond to the primary path, while the rest of the paths will be used as a backup in decreasing order of their bandwidth.Публікація Inter-domain routing method under normalized Quality of Service based on hierarchical coordination(ХНУРЕ, 2020) Lemeshko, O.; Yevdokymenko, M.; Hu, Z.; Yeremenko, O.The inter-domain routing method under normalized Quality of Service (QoS) based on hierarchical coordination in a Software-Defined Network (SD-WAN, Hybrid SD-WAN) is proposed in the paper. The novelty of the method is that the routing solutions are aimed at ensuring the normalized QoS in terms of average transmission rate and average end-to-end packet delay. The method is based on the use of a decomposition flow-based routing model, which consists of the inter-domain routing interaction and ensuring the normalized QoS conditions that obtained during tensor network modeling. Therefore, the inter-domain QoS routing problem was presented as an optimization problem with a quadratic optimality criterion. A number of numerical examples confirmed the efficiency and effectiveness of the proposed method in terms of providing the normalized QoS within the finite number of iterations. Reducing the number of such iterations helps to decrease the amount of service traffic transferred between routers and SDN controllers at different levels, as well as minimize the time for solving the inter-domain QoS-routing task.Публікація Investigation of the Secure Paths Set Calculation Approach Based on Vulnerability Assessment(CEUR-WS, 2021) Yevdokymenko, M.; Yeremenko, O.; Shapovalova, A.; Shapoval, M.; Porokhniak, V.; Rogovaya, N.An approach to the calculation of secure paths based on the routing model taking into account information security risks using the basic vulnerability criticality metrics is proposed and investigated. The approach for calculating route metrics uses obtained expressions, which characterize the information security risk in network links in the case of existing vulnerabilities. The results of the investigation showed that within the approach of calculating secure paths with increasing packet traffic, the paths in the network that contained links with the lowest weights, i.e. had the least weight of compromise, were loaded first. The transmission of the packet flow after overloading the more secure path was carried out in the following paths according to the values of the weights of the communication links. The paths in the network that contained the links with the highest weights were loaded last.Публікація Model of data traffic qos fast rerouting in infocommunication networks(ХНУРЕ, 2019) Lemeshko, O.; Yevdokymenko, M.; Yeremenko, O.The subject of research in the article is the processes of fast rerouting with the protection of the Quality of Service level in infocommunication networks. The aim of the work is the development of a mathematical model of Fast ReRouting with the protection of the Quality of Service level by the bandwidth and probability of packet loss for data traffic. The following tasks are solved in the article: development and research of a fast rerouting flow-based model with the protection of the Quality of Service level of data traffic in the infocommunication network. The following methods are used: the graph theory, the teletraffic theory, the queuing theory, and mathematical programming methods. The following results were obtained: the fast rerouting flow-based model was developed and investigated, which, due to the introduced protection conditions on indicators of bandwidth and packet loss probability, allows providing the Quality of Service along both the primary and backup multipath. Conclusions: Within the framework of the proposed flow-based model, the fast rerouting technological task was formulated as an optimization problem with the constraints of the conditions of implementation of the multipath routing strategy, conditions of flow conservation, and conditions of protection of the link, node, and level of Quality of Service in terms of bandwidth and packet loss probability. The application of this solution contributes to the optimal use of the available network resource while providing the specified level of Quality of Service in terms of bandwidth and probability of packet loss along both the primary and backup routes in the case of a failure of the infocommunication network elements. The proposed flow-based model can be used as the basis of the algorithmic software of existing routers and/or controllers of Software-Defined Networks, which are responsible for the calculation of the primary and backup paths in the fast rerouting of data traffic sensitive to such Quality of Service indicators as bandwidth and packet loss probability.Публікація Network Security Approach based on Traffic Engineering Fast ReRoute with support of Traffic Policing(CEUR-WS, 2021) Lemeshko, O.; Yeremenko, O.; Yevdokymenko, M.; Shapovalova, A.; Lemeshko, V.The work is devoted to the approach development and investigation of the network security providing based on Traffic Engineering Fast ReRoute with support of Traffic Policing. The corresponding flow-based mathematical model has been developed where the technological task of secure fast rerouting was presented in the form of a linear programming problem. The novelty of the proposed model is the modification of load balancing conditions and bandwidth protection during fast rerouting, which in addition to the Quality of Service, also considers the probability of compromising the link as an indicator of network security. The routing solutions obtained within the proposed model are aimed at reducing the overload of communication links with a high probability of compromising by redistributing traffic for transmission through more secure network links. The advantage of the proposed solution is that in the conditions of congestion the load balancing is realized on the principles of Traffic Engineering and, if necessary, differentiated limitation of the load entering the network. An additional advantage of the proposed optimization model is its linearity, which focuses on the low computational complexity of the corresponding protocol implementation in practice. Numerical research of the Secure TE-FRR-TP model has confirmed the adequacy and efficiency of routing solutions made on its basis, both in terms of ensuring network security, resilience, and load balancing with traffic policing based on priorities.