Method of Fault Tolerance Evaluation in Conditions of Destabilizing Factors Influence in Infocommunication Network

In this paper, a method for estimating the fault tolerance of an infocommunication network under conditions of destabilizing factors is proposed, which characterizes the dependence of the effective action coefficient of the infocommunication network on the number of routes, which in turn will allow estimating the network stability under the influence of various destabilizing factors, for example, attacks. The obtained dependence of the network effective network factor on the number of routes allows to determine the rational range of the number of required routes under the influence of the destabilizing factors. The results of the study of the proposed method for assessing fault tolerance will make it possible to justify the requirements for the topology of the infocommunication network and to the choice of means and ways to protect it from failing factors.

[1]  Man Young Rhee,et al.  Internet Security: Cryptographic Principles, Algorithms and Protocols , 2003 .

[2]  Tamara Radivilova,et al.  Provision security in SDN/NFV , 2018, 2018 14th International Conference on Advanced Trends in Radioelecrtronics, Telecommunications and Computer Engineering (TCSET).

[3]  Kishor S. Trivedi,et al.  Ultrahigh Reliability Prediction for Fault-Tolerant Computer Systems , 1983, IEEE Transactions on Computers.

[4]  Sonia Fahmy,et al.  Analysis of vulnerabilities in Internet firewalls , 2003, Comput. Secur..

[5]  William Stallings Zhu,et al.  Network Security Essentials : Applications and Standards , 2007 .

[6]  George Cybenko Metrics Based on the System Performance Perspective , 2019 .

[7]  Michel Bruneau,et al.  Framework for analytical quantification of disaster resilience , 2010 .

[8]  David Eppstein,et al.  Finding the k shortest paths , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.

[9]  Mohammad Modarres,et al.  Reliability engineering and risk analysis : a practical guide , 2016 .

[10]  Igor Linkov,et al.  Operational resilience: concepts, design and analysis , 2015, Scientific Reports.

[11]  A. N. Nazarov LOGICAL-AND-PROBABILISTIC MODELS FOR ESTIMATING THE LEVEL OF INFORMATION SECURITY OF MODERN INFORMATION AND COMMUNICATION NETWORKS , 2010 .

[12]  Yeu-Pong Lai,et al.  Using the vulnerability information of computer systems to improve the network security , 2007, Comput. Commun..

[13]  Benedek Nagy,et al.  Generalized game trees and their evaluation , 2014, 2014 5th IEEE Conference on Cognitive Infocommunications (CogInfoCom).

[14]  A. N. Kopylev,et al.  Modelling of multiservice streams at the decision of tasks of parametric synthesis , 2013, 2013 23rd International Crimean Conference "Microwave & Telecommunication Technology".

[15]  Chen Feng,et al.  A Flexible Approach to Measuring Network Security Using Attack Graphs , 2008, 2008 International Symposium on Electronic Commerce and Security.

[16]  Yu Liu,et al.  Successive survivable routing for node failures , 2001, GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No.01CH37270).

[17]  A. Dmytro,et al.  Multiservice telecommunication systems design with network's incoming self-similarity flow , 2008, 2008 International Conference on "Modern Problems of Radio Engineering, Telecommunications and Computer Science" (TCSET).

[18]  Mark L. Ayers,et al.  Telecommunications System Reliability Engineering, Theory, and Practice , 2012 .