Algorithms for detecting and eliminating interference attacks in information systems

This article discusses the problems of fast algorithms for detecting and eliminating interference attacks, which is an actual problem of information reliability of control systems. Active algorithms of this type are essential in protecting telemetry systems from presentation attacks. With the progre...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:E3S web of conferences 2023-01, Vol.431, p.5027
1. Verfasser: Osokin, Yu
Format: Artikel
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:This article discusses the problems of fast algorithms for detecting and eliminating interference attacks, which is an actual problem of information reliability of control systems. Active algorithms of this type are essential in protecting telemetry systems from presentation attacks. With the progress of information technology, many traditional methods of detecting attacks have lost their relevance. Instead, they require interactive methods that achieve state-of-the-art results. The paper considers variants of fast algorithms that provide the required efficiency of the detection and elimination of interference attacks. Existing fast recognition systems were based on selectable characteristic properties of interference, such as: tracking in certain dynamic ranges gives correct results in some cases, but is useless for combating deliberate jamming attacks. Examples of algorithms based on the use of options for controlling automatic manipulators with program cycles are considered, taking into account the features of a real action. Improving reliability under the influence of spurious interference, when there is an interference of an informational nature through communication channels, through radio channels in certain frequency ranges, as well as from interference and distortion in optoelectronic networks and other influences that violate the safe conditions for the operation of telecommunications equipment. A comparative analysis has been carried out with system variants having similar technological characteristics, in particular, when controlling manipulators operating as part of automatic complexes.
ISSN:2267-1242
2267-1242
DOI:10.1051/e3sconf/202343105027