Issue |
E3S Web Conf.
Volume 431, 2023
XI International Scientific and Practical Conference Innovative Technologies in Environmental Science and Education (ITSE-2023)
|
|
---|---|---|
Article Number | 05027 | |
Number of page(s) | 7 | |
Section | IT and Mathematical Modeling in the Environment | |
DOI | https://doi.org/10.1051/e3sconf/202343105027 | |
Published online | 13 October 2023 |
Algorithms for detecting and eliminating interference attacks in information systems
Department of Computing Techniques and Electronics, Altai State Technical University, 656038 Barnaul, Russia
* Corresponding author: y-osokin@mail.ru
This article discusses the problems of fast algorithms for detecting and eliminating interference attacks, which is an actual problem of information reliability of control systems. Active algorithms of this type are essential in protecting telemetry systems from presentation attacks. With the progress of information technology, many traditional methods of detecting attacks have lost their relevance. Instead, they require interactive methods that achieve state-of-the-art results. The paper considers variants of fast algorithms that provide the required efficiency of the detection and elimination of interference attacks. Existing fast recognition systems were based on selectable characteristic properties of interference, such as: tracking in certain dynamic ranges gives correct results in some cases, but is useless for combating deliberate jamming attacks. Examples of algorithms based on the use of options for controlling automatic manipulators with program cycles are considered, taking into account the features of a real action. Improving reliability under the influence of spurious interference, when there is an interference of an informational nature through communication channels, through radio channels in certain frequency ranges, as well as from interference and distortion in optoelectronic networks and other influences that violate the safe conditions for the operation of telecommunications equipment. A comparative analysis has been carried out with system variants having similar technological characteristics, in particular, when controlling manipulators operating as part of automatic complexes.
© The Authors, published by EDP Sciences, 2023
This is an Open Access article distributed under the terms of the Creative Commons Attribution License 4.0, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.