,

<<

 >>  , ,
Pages:     | 1 ||

...

-- [ 2 ] --

621.394.147, 519. .. , . , 2(76)2013 - , .

: ;

;

;

;

.

() () () () ().

1. .., .., .., .. // . 3. .: , 2011. . 3-9.

2. .., .., .. . .: , 1971. 312 .

3. CDM-600 Open Network Satellite Modem (2.4 kbps 20 Mbps) Installation and Operation Manual For Firmware Version 2.0.1 or higher [ ]. . . . (CD ROM).

4. / .. , .. , .. . / . .. . .: , 1985. 272 .

5. .. . .: , 1949. 434 .

6. .. - . .: , 1998. 268 .

7. .., .. // . 315. .:

, 2009. . 130-139.

8. ., . . .: , 1987. 384 .

9. - . . , , . .: , 2005. 320 .

10. .. . .: , 1998. 575 .

11. ., ., . . .: , 1977. 221 .

12. .., .., .. . 1. .: . / 33965, 1990. 390 .

13. . . .: , 1962.

, . .: 8 953 811 50 E-mail: shinakovsv@mail.ru S.V. SHINAKOV (Employee) Academy of Federal Agency of Protection of the Russian Federation, Orel PROCEDURE OF DECODING OF BLOCK CODES IN MULTIPLEX CHANNELS In the article model of discrete multiplex channel is considered, which allows markovs properties of shared message sources and mistakes sources. Procedure of decoding of block codes is introduced which involves mode of estimation statistical performances of message sources in shared multiplex channels, method of estimation statistical performances of error flow and algorithm of decoding of block codes based on minimum of average risk criterion.

2(76) Keywords: block code;

multiplexing;

discrete channel;

markovs chain;

minimum of average risk criterion.

BIBLIOGRAPHY (TRANSLITERATED) 1. Konyshev M.Yu., Pankratov A.V., Shinakov S.V., Baranov S.V. Neparametricheskoe dekodirovanie blokovyx kodov v kanalax s negaussvymi shumami // Telekommunikacii. 3. M.: Nauka i texnlogii, 2011. S. 3-9.

Blox E.L., Popov .V., Turin V.Ya. Modeli istochnika oshibok v kanalax peredachi cifrovoj informacii.

2.

M.: Svyaz, 1971. 312 s.

CDM-600 Open Network Satellite Modem (2.4 kbps 20 Mbps) Installation and Operation Manual For 3.

Firmware Version 2.0.1 or higher [Elektronnyj resurs]. Elektr. opt. disk. (CD-ROM).

Pomexustojchivost i effektivnost sistem peredachi informacii / A.G. Zyuko, A.I. Falko, I.P. Panfilov i 4.

dr. / pod red. A.G. Zyuko. M.: Radio i svyaz, 1985. 272 s.

Romanovskij V.I. Diskretnye cepi Markova. M.: Gostexizdat, 1949. 434 s.

5.

Grigorev V.A. Peredacha signalov v zarubezhnyx informacionno-texnicheskix sistemax. SPb.: VAS, 6.

1998. 268 s.

7. Shkerdin A.N., Yudin O.F. Ispravlenie oshibok staffingovaniya v sistemax svyazi s peresprosom // Izvestiya Tomskogo politexnicheskogo universiteta. Tom 315. Tomsk.: TPU, 2009. S. 130-139.

Klark Dzh., Kejn Dzh. Kodirovanie s ispravleniem oshibok v sistemax cifrvoj svyazi. M.: Radio i 8.

svyaz, 1987. 384 s.

Morelos-Saragosa R. Iskusstvo pomexoustojchivogo kodirovaniya. Metody, algoritmy, primenenie. 9.

M.: Texnsfera, 2005. 320 s.

Ventcel E.S. Teoriya veroyatnostej. M.: Vysshaya shkola, 1998. 575 s.



10.

Li Cz., Dzhadzh D., Zelner A. Ocenivanie parametrov markovskix modelej po agregirovannym 11.

vremennym ryadam. M.: Statistika, 1977. 221 s.

Gluxov M.M., Elizarov V.P., Nechaev A.A. Algebra. Chast 1. M.: Izd. v/ch 33965, 1990. 390 s.

12.

Middlton D. Vvedenie v statisticheskuyu teoriyu svyazi. M.: Sovetskoe radio, 1962.

13.

004. .. , .. . , - . . .

: ;

-;

.

.. . -2007. 14. 107 .

1.

.. 2.

( ) [ ]. URL:

http://dostizenie.ucoz.ru/document/content-filter.pdf ( : 13.06.2012).

13.09.2005 561 3.

2005-2009 .

4.

1991 2124-I.

114- 5.

2002 .

" " 13 2006 38-.

6.

7.

156146-3.

2(76)2013 - .200 () ISO 7498 (ISO), / 7498-1- 8.

. .

1997 9.

. .

.., .., .., .. 10.

: . : , 2003. 143 .

.., .., .. . .: -, 11.

2002. 272 .

.., .. / 12.

. .. . .: . , 1973. 328 .

.., .. 13.

. .: , 1983. 288 .

.. . . 14.

. [ ]. URL:

http://dwl.kiev.ua/art/dz/index.html.

. ., .., .. . .:

15.

, 1977. 384 .

. - . 16.

: , 1987. 204 .

.. - 17.

// . : , 2007. 40 .

.. . .:

18.

, 2007. .RU [ ] / URL:

http://www.textology.ru/libr/borodkin.htm.

. : . .: - 19.

, 2000.

, . E-mail: admin@nikitka.net , . D.O. MARKIN (Employee) V.V. KOMASHINSKIJ (Candidate of Engineering Sciences) Academy of Federal Agency of Protection of the Russian Federation, Orel CONTENT FILTERING IN COMPUTER NETWORKS Actual trends of content filtering development in computer networks is considered. Main common and the standardly legal demands to content filtering is provided. Content filtering methods classification is provided. Detailed analysis of content filtering instruments by group of different indicators is made.

Keywords: content filtering;

content analysis;

computer networks.

BIBLIOGRAPHY (TRANSLITERATED) Starostina E.V. Informacionnoe pravo. Nauchnaya sessiya MIFI-2007. Tom 14. 107 s.

1.

Badanov A.G. Organizaciya bezopasnogo dostupa k seti Internet v obrazovatelnom uchrezhdenii 2.

(kontentnaya filtraciya) [Elektronnyj resurs]. URL: http://dostizenie.ucoz.ru/document/content filter.pdf (data obrashheniya: 13.06.2012).

2(76) Postanovlenie Pravitelstva Rossijskoj Federacii ot 13.09.2005 561 O federalnoj celevoj programme 3.

Kompleksnye mery protivodejstviya zlupotrebleniyu narkotikami i ix nezakonnomu obortu na 2005 2009 gody.

Federalnyj zakon Rossijskoj Federacii O sredstvax massovoj informacii ot 27 dekabrya 1991 goda 4.

2124-I.

Federalnyj zakon O protivodejstvii ekstremistskoj deyatelnosti 114-FZ ot 25 iyulya 2002 goda.

5.

Federalnyj zakon Rossijskoj Federacii O reklame ot 13 marta 2006 goda 38-FZ.

6.

Proekt federalnogo zakona Rossijskoj Federacii Ob igornom biznese v Rossijskoj Federacii 7.

156146-3.

Rekomendacii .200 (MKKTT) i ISO 7498 (ISO), GST R ISO/MEK 7498-1-99 Vzaimosvyaz 8.

otkrytyx sistem. Bazovaya etalonnaya model.

Rukvodyashhij dokument FSTEK ot 1997 goda po sredstvam vychislitelnoj texniki Mezhsetevye 9.

ekrany. Zashhita ot nesankcionirovannogo dostupa k informacii.

Xoroshko V.O., Azarov O.D., Shelest M.E., Yaremchuk Yu.E. Osnovy kompyuternoj steganografii:

10.

posobie dlya studentov i aspirantov. Vinnica: VDTU, 2003. 143 s.

Gribunin V.G., Okov I.N., Turincev I.V. Cifrovaya steganografiya. M.: SOLON-Press, 2002. 272 s.

11.

Belonogov G.G., Bogatyrev V.I. Avtomatizirovannye informacionnye sistemy / pod red. K.V.

12.

Tarakanova. M.: Sov. radio, 1973. 328 s.

Belonogov G.G., Kuznecov B.A. Yazykovoe sredstva avtomatizirovannyx informacionnyx sistem. 13.

M.: Nauka, 1983. 288 s.

Lande D.V. Dobycha znanij. Glubinny analiz tekstov. TExnologiya effektivnogo analiza tekstovyx 14.

dannyx. [Elektronnyj resurs]. URL: http://dwl.kiev.ua/art/dz/index.html.

Piotrovskij R.G., Bektaev K.B., Piotrovskaya A.A. Matematicheskaya lingvistika. M.: Vysshaya 15.

shkola, 1977. 384 s.

Tuldava Yu. Problemy i metody kvantitativno-sistemnogo issledovaniya leksiki. Tallin: Valgus, 1987.

16.

204 s.

Tuzovskij A.F. Ontolgo-semanticheskie modeli v korporativnyx sistemax upravleniya znaniyami // 17.

Avtoreferat dissertacii na soiskanie uchyonoj stepeni doktora texnicheskix nauk. Tomsk: TPU, 2007. 40 s.

Borodkin L.I. Matematicheskie metody i kompyuter v zadachax atribucii tekstov. M.: OOO 18.

Lingvisticheskie kmpyuternye sistemy, 2007. Biblioteka elektronnogo zhurnala Tekstologiya.RU [Elektronnyj resurs] / URL: http://www.textology.ru/libr/borodkin.htm.

Gavrilova T. Bazy znanij intellektualnyx sistem: uchebnik dlya VUZov. SPb.: Izd-vo Piter, 2000.

19.

.. , .. . , , .

: ;

;

;

;

.

1. .., .. . .: , 2008. 320 .: .

2. Denning. Dorothy E. (SRI International). An Intrusion Detection Model. IEEE Transaction on Software Engineering (SE-13). 2 (February 1987): 222-232.

3. , - . : / . . .: , 2005. 396 .

, . 2(76)2013 - .: 8 (4862) 41-45-50, 8 903 880 23 E-mail: mishinds@mail.ru ʻ, . ,

.: 8 (4862) 76-19- E-mail: sv-5771@mail.ru D.S. MISHIN (Candidate of Juridical Sciences) Law Institute of the Russian Interior Ministry, Orel S.V. EREMENKO (Post-graduate Student of Department Electronics, Computer Science and Information Security) State University ESPC, Orel METHODOLOGICAL ASPECTS OF COUNTERACTION TO WRONGFUL ACCESS TO DATA TRANSMISSION SYSTEMS In given article problems of maintenance of information security in modern systems of data transmission are considered. The attention to essential danger which is represented by internal malefactors is paid, and ways of counteraction are offered cases of infringements of safety of the information.

Keywords: information security;

telecommunication networks;

malefactor;

gateway screens;

system of detection of attacks.

BIBLIOGRAPHY (TRANSLITERATED) 1. Skiba V.Yu., Kurbatov V.A. Rukovodstvo po zashhite ot vnutrennix ugroz informacionnoj bezopasnosti. SPb.: Piter, 2008. 320 s.: il.

2. Denning. Dorothy E. (SRI International). An Intrusion Detection Model. IEEE Transaction on Software Engineering (SE-13). 2 (February 1987): 222-232.

3. Xogland Greg, Mak-Grou Gari. Vzlom programmnogo obespecheniya: analiz i ispolzovanie koda / per. s angl. M.: Izdatelskij dom Vilyams, 2005. 396 s.

(: ), 1(25)2013, 07.514.11.4137 - 2007-2013 .

, , 4 4 9 ;

.

, .

.

2(76) , , , ( ).

, , :

;

, , , ;

;

;

;

.

Times New Roman, 12 pt , ;

1,25 , 2 , 2 , 2 .

:

- - ( ) - ( ) - ( ) - , .

, , , , , .

Microsoft Equation 3.0 :

12 pt, 10 pt, 8 pt. , , ! , , .

(, , , , ) , . , , *.eps (Encapsulated PostScript) TIF 300 dpi.

10 pt : , , ( );

, , , , , , ( ).

.

2(76)2013

Pages:     | 1 ||
 
 >>  , ,

:





 
<<     |    
2013 www.netess.ru -

, .
, , , , 1-2 .