http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Sattarova Feruza 인문사회과학기술융합학회 2011 예술인문사회융합멀티미디어논문지 Vol.1 No.2
In any system, the network firewall is the main feature which will be protecting the system from getting attacked from any illegal intruders who will try to hack the system and steel the information from the network. These firewalls have been involving in the optimization that has to be done when any other tries to come through the other firewall and sharing the information will improve the network performance very well. Firewall will be mainly concentrating on intra firewall and also inter firewall optimization that will be helpful to improve the security of the network. Previously, there has been the use of cross-domain privacy preserving cooperative firewall policy optimization protocol. But there is no improvement that made a lot of difference in the native methods used. So we propose secure multi-party computation of union which will be improving the firewall optimization and also improving the security very well when compared to the all the previous methods.
Network Productivity and Quality Indicators of Broadband Connection Channels: a Review
Sattarova Feruza Y.,Tadjibayev Furkhat A.,Debnath Bhattacharyya 보안공학연구지원센터 2009 International Journal of Hybrid Information Techno Vol.2 No.4
This article dedicated to a review of modern methods of researching and estimation of productivity of IEE 802.11 protocol, based on Markov models and allows effectively estimate main indices of productivity of network functioning. The researches of estimation of network functioning is taking on special significance because of adaptation of IEEE 802.11 standard for network construction on a city and regional scale, that solved the problem of providing data in distant regions. A mathematical model of information transmission processes using radio link discreet channels. This model represents the quality indicators of broadband communication channels. The model helps to generate main quality indicators of super broadband communication channel and to calculate the coverage of broadband access networks in field applications. In article on the basis of the theory of reliable communication and mathematical modeling the comparative analysis of efficiency of communication channels in conditions of the limited by power and by a pass band without and with use of system of channel encoding is made. All calculations and results in detail analyze on the basis of model of a plane “band-efficiency"
Cryptographic Protection of the Information and Algorithms of Enciphering
Sattarova Feruza Y.,Tadjibayev Furkhat A.,Seung-Hwan Jeon 보안공학연구지원센터 2009 International Journal of Hybrid Information Techno Vol.2 No.4
In order to organize informational security the juridical documents, technical means and cryptographically algorithms, systematic, apparatus-systematic or apparatus-technical means are widely used. And with the advent of high-speed digital lines of information transfer requirements for cryptographic means of enciphering is growing more and more. In cryptosystem based on stream ciphers the entering information is not late in cryptosystem and it allows developing high-speed cryptographic hardware. Besides generated pseudo-casual and truly casual sequences it is widely used in cryptosystems for generation of initial values of confidential parameters and the secret key in the electronic digital signature. The idea of working out of algorithm EDC was developed using operations of algebra parameters. Mathematical model of the digital signature, including parts of formation and the signature check, satisfying to conditions of demanded firmness in a composition of algorithm of enciphering and existing complexities of calculations are developed. In this article also methods of estimation crypto stability of stream cipher algorithm of enciphering and practical results of an estimation of the new developed algorithm are resulted. Also the criteria of protection documentary, vocal and information video in information-communication systems and using cryptographic means are given in this article.
Feruza Sattarova Yusufovna 사단법인 인문사회과학기술융합학회 2011 예술인문사회융합멀티미디어논문지 Vol.1 No.2
In any system, the network firewall is the main feature which will be protecting the system from getting attacked from any illegal intruders who will try to hack the system and steel the information from the network. These firewalls have been involving in the optimization that has to be done when any other tries to come through the other firewall and sharing the information will improve the network performance very well. Firewall will be mainly concentrating on intra firewall and also inter firewall optimization that will be helpful to improve the security of the network. Previously, there has been the use of cross-domain privacy preserving cooperative firewall policy optimization protocol. But there is no improvement that made a lot of difference in the native methods used. So we propose secure multi-party computation of union which will be improving the firewall optimization and also improving the security very well when compared to the all the previous methods.
Advanced Security Model of BSM with New Approach
Feruza Sattarova Yusufovna 보안공학연구지원센터 2008 보안공학연구논문지 Vol.5 No.2
Information is an essential resource for all businesses today and is the key to growth and success. However, we need to ensure that the information held on our IT systems is secure. The impact of a security breach may be far greater than we would expect. The loss of sensitive or critical information directly may not only affect our competitiveness and cash flow but also damage our reputation - something which may have taken us years to establish and which may be impossible to restore. In our paper we introduce a structure of Business Service Management (BSM) with security approach offering an advanced model of integrated secure BSM model.
Separated SCADA Environment as a Security Approach
Feruza Sattarova Yusufovna,Rosslin John Robles,Min-kyu Choi,Maricel O. Balitanas,Farkhod Alisherov Alisherovich,Nayoun Kim,Tai-hoon Kim 한국정보기술학회 2009 Proceedings of KIIT Conference Vol.2009 No.-
Supervisory Control and Data Acquisition (SCADA) systems are critical to the safe, reliable and efficient operation of many essential services that affect the daily lives of millions of people. These services include power generation plants, potable water systems, wastewater treatment facilities, oil and gas production and transportation/distribution networks. In today’s uncertain world, security stands beside profitability, productivity, performance and control as a key element for maintaining business activities in industrial facilities. Prevention of malicious attacks against business infrastructure has become as vital to ongoing success as has the widespread use of the computer systems which make such attacks so easy and so painful. The vulnerabilities and condition of security of SCADA networks are considered in this paper. Also approaches on how to best secure SCADA system are discussed.
Implementing Intrusion Detection System against Insider Attacks
Feruza Sattarova Yusufovna,Seong-eon Cho 한국정보기술학회 2009 Proceedings of KIIT Conference Vol.2009 No.-
Insiders pose the top corporate security threat today. Recent reports indicate that insider breaches have risen from 80% to 86% of all incidents, with more than half occurring after employee termination. Not surprisingly, internal employees who are authorized to access company systems are most likely to be linked to fraud or a security breach?and of all employees, IT staff members have the most resources to do so.
Design of Integrated Secure Business Service Management
Feruza Sattarova Yusufovna,Min-kyu Choi,Tai-hoon Kim 한국정보기술학회 2009 Proceedings of KIIT Conference Vol.2009 No.-
In this paper a structure of business service management integrated with security management is offered. Our integrated BSM model with security approach is the hierarchy of data management in any growing business. It creates a logical flow of data from its inception into the organization through the management levels. Thus, allowing for proactive business decisions to be made on a consistent basis. The end result is an increase in both corporate flexibility and profitability. It encompasses the process and use of Customer Data Management, Customer Relationship Management, Enterprise Resource Planning and Business Insurance all supported by a robust Service Desk.
An Effective Approach in Building an Intelligent Intrusion Detection System
Feruza Sattarova Yusufovna,Seong-eon Cho 한국정보기술학회 2009 Proceedings of KIIT Conference Vol.2009 No.-
Intrusion detectionsystems have proved to be an effective instrument for protecting computer and network resources. In addition to preventive security mechanisms as authentication, encryption, or access control, they provide an automatic detection of security violations. Inour paper we propose a new model of Intrusion Detection System (IDS) which combines fuzzy logic with data mining with simplified structure.