<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>North West Echelon</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>JSC St-Petersburg</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Russia a.begaev@nwechelon.ru</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>32nd Department Budyonny Military Academy of Communications</institution>
          ,
          <addr-line>St-Petersburg</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Mikhail Chesnakov</institution>
          ,
          <addr-line>Yuriy Starodubtsev</addr-line>
        </aff>
      </contrib-group>
      <abstract>
        <p>- This paper proposes a method of mixed traffic model formation, which allows to create statistical models of mixed traffic for each network element as well as to have sustainable statistical data characterizing mixed traffic on each network element. It also shows diversity of network traffic by its basic characteristics. Limitations of applicability of existing models and methods complex for mixed network traffic specification are discussed herein. We offer a variant of mixed stream decomposition to uniform streams using the Theory of Pattern Recognition methods. We offer a variant of uniform stream representation as random numerical sequences relevant to packets arrival time. There is grounding for selection of rules for checking of accordance between experimental and theoretical distribution in respect to uniform streams of network traffic typical for existing and perspective information telecommunication systems.</p>
      </abstract>
      <kwd-group>
        <kwd />
        <kwd>traffic</kwd>
        <kwd>stream</kwd>
        <kwd>model</kwd>
        <kwd>network</kwd>
        <kwd>information telecommunication systems</kwd>
        <kwd>Theory of Pattern Recognition</kwd>
        <kwd>statistical analysis</kwd>
        <kwd>random values distribution law</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>I. INTRODUCTION</title>
      <p>The rationale for developing of method of mixed traffic
model formation is predetermined by significant number of
actual circumstances and importance of date characterizing
traffic for practice.</p>
      <p>
        These data are necessary for solving important practical
tasks on calculation of probabilistic time-response
characteristics of specified subnetwork elements, required
performance determination –  , at specified traffic intensity – 
and at assigned service procedure by switching nodes, and
finding facts and reasons for traffic parameters abnormal
alteration [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        Relating to the statistical and uniform traffic, we developed
a complex of models and methods [
        <xref ref-type="bibr" rid="ref2 ref3 ref4 ref5">2, 3, 4, 5</xref>
        ] which allows to
solve practical tasks with adequate accuracy.
      </p>
      <p>However, the current multiservice communication systems
are characterized by a number of distinguishing features which
do not admit of traditional methodological approach.</p>
      <p>
        Clear representation about the scope of information
processed by switching nodes in current information
telecommunication systems can be obtained examining statistic
of overall traffic transferred through Internet Exchange Points.
The overall traffic transferred through node MSK-IX1 is shown
on Figure 1 [
        <xref ref-type="bibr" rid="ref9">8</xref>
        ].
      </p>
      <p>II. METHOD OF MIXED TRAFFIC MODEL FORMATION
Significant traffic volumes allow to have a huge sampling
that is substantially different from the situation where the
number of experiments is relatively small.</p>
      <p>The method of mixed traffic model formation is expected to
be realized in relatively stand-alone five phases. Graphical view
of model formation process is shown on Figure 2.</p>
      <p>Mixed traffic
Mixed traffic
fixation</p>
      <p>Algorithm for
recognition of mixed</p>
      <p>traffic
Database of streams
reference description</p>
      <p>Mixed traffic
decomposition to
uniform streams</p>
      <p>Unit for the 1-st
stream ID creating
Unit for the i-th
stream ID creating
Unit for the k-th
stream ID creating
Timer t0 to Δt
Measurement and
creating of input data
(ID) for subsequent
statistical processing</p>
      <p>Sequential hypothesis</p>
      <p>testing
Sequential hypothesis</p>
      <p>testing
Sequential hypothesis</p>
      <p>testing
Database of random
values distribution</p>
      <p>functions
Statistical processing</p>
      <p>Random values
distribution law
Random values
distribution law
Random values
distribution law
Model collection for
subnetwork element
of communication
network</p>
      <p>The first phase involves elements fixation for traffic
processed by  –th element of selected communication
subnetwork.</p>
      <p>There are dedicated means — network protocol analyzers
which are used for mixed traffic fixation and resulted IP packets
header values determination. The typical functions of network
protocol analyzer are packets capturing, decryption, packet
analysis and displaying. As an example the most common
network protocol analyzers could be considered: Wireshark,
York, SoftPerfect Network Protocol Analyzer, Accurate
Network Monitor and etc. All of them allow to have information
concerning date and time of packet capturing, source and
destination IP address, protocol type (network, transport or
application layer) and other information about captured data.</p>
      <p>During the second phase, based on the set of specified
characteristics a mixed traffic stream is decomposed to uniform
ones. The model is suitable for various network protocols traffic
processing, at the same time packet header formats may differ
by structure. The header formats have considerable number of
fields which can take on considerable but limited number of
values. Decomposition based on packet classification condition
with exactly identical values in all fields will lead to
unnecessarily increasing of uniform stream number that make
more difficult to realize proposed model.</p>
      <p>Based on existing tasks it is acceptable to ignore some of
fields values. From the other hand it is possible to perform
packets classification conditions according to all header fields
values. Moreover we can use specific traffic analyzers to make
classification according to packet body content. It confirms the
model flexibility.</p>
      <p>We present the mixed traffic stream in a form of some data
aggregate. In the proposed model decomposition is based only
on header characteristics, characteristics of payload transferred
in packet when assigning stream to certain class will be ignored.</p>
      <p>The recognition performs two basic operations. At first, it is
calculation of realization similarity factor with all references.
Second operation is assigning of realization to reference with
highest similarity. The recognition as decomposition of some set
to certain number of non-empty disjoint subsets using selected
criteria.</p>
      <p>The primary criterion is the assignment of mixed traffic
stream to one of existing network protocol (IP, X.25, etc.), at a
later stage classification is performed based on criteria arising
from differences of packet header fields values. Network packet
structure and fill range of permissible fields values are always
known and finite which is necessary condition for combining of
various networks to single one. Up to date described in RFC 791
specification IPv4 protocol and its sequel, IPv6, are basic
network protocols. This protocol is used as an example for
further description but the developed method allows to work
with any primary date.</p>
      <p>IP packet header size may vary from 20 bytes to 60 bytes and
contain as minimum 12 fields (Version, IHL, Type of Service,
Total Length, Identification, Flags, Fragment Offset, Time to
Live, Protocol, Header Checksum, Source Address, Destination
Address), therefore, assignment of packets with identical
headers to separate class would create its huge number.</p>
      <p>Format of IP packet header is shown on Figure 3.</p>
      <p>IHL: 4 bits. Internet Header Length is the length of the
internet header in 32 bit words, and thus points to the
beginning of the data.</p>
      <p>Type of Service: 8 bits. The Type of Service provides an
indication of the abstract parameters of the quality of
service desired.</p>
      <p>Total Length: 16 bits. Total Length is the length of the
datagram, measured in octets, including internet header
and data. This field allows the length of a datagram to be
up to 65,535 octets.</p>
      <p>Identification: 16 bits. An identifying value assigned by
the sender to aid in assembling the fragments of a
datagram.</p>
    </sec>
    <sec id="sec-2">
      <title>Flags: 3 bits. Various Control Flags.</title>
      <p>Time to Live: 8 bits. This field indicates the maximum
time the datagram is allowed to remain in the internet
system. If this field contains the value zero, then the
datagram must be destroyed. This field is modified in
internet header processing.</p>
      <p>Protocol: 8 bits. This field indicates the next level
protocol used in the data portion of the internet datagram.
Options: variable. The options may appear or not in
datagrams.</p>
      <p>Full description of IP packet header fields you can find at
RFC 7912.</p>
      <p>In the context of the current task the subject of interest is only
uniform streams with a large share in overall stream. It is
reasonable to group all relatively uncommon streams into
separate class.</p>
      <p>Packet reference description database may be presented in
logic table format. Let’s define by  a set containing selected
classes of homogeneous in the sense of equality of header
selected fields values or disjoint values ranges, and by  a set of
all possible header fields values or disjoint values ranges. In this
case if j-th header field value corresponds to  -th class of packets
then table element   ( ,  ) = 1, otherwise   ( ,  ) = 0.</p>
      <p>A table such as the one described above but containing all
possible variants of values would have dramatic dimension that
is not necessary because in practice only packet classes
containing certain values in header are interesting.</p>
      <p>To assign any mixed traffic packet to closest uniform class
we will use the Theory of Pattern Recognition methods. The
Theory of Pattern Recognition method based on pair-wise
2 https://tools.ietf.org/html/rfc791
3 www.ibm.com/support/knowledgecenter/ru/SSLVMB_24.0.0/
spss/base/cmd_proximities_sim_measure_binary.html
comparison of object to be recognized with reference set. The
following similarity measures are available for binary data3:</p>
      <p>Russell-Rao. This is a binary version of the inner (dot)
product. Equal weight is given to matches and nonmatches. This
is the default for binary similarity data.</p>
      <p>Simple matching. This is the ratio of matches to the total
number of values. Equal weight is given to matches and
nonmatches.</p>
      <p>Jaccard. This is an index in which joint absences are
excluded from consideration. Equal weight is given to matches
and nonmatches. Also known as the similarity ratio.</p>
      <p>Dice. This is an index in which joint absences are excluded
from consideration, and matches are weighted double. Also
known as the Czekanowski or Sorensen measure.</p>
      <p>Rogers and Tanimoto. This is an index in which double
weight is given to nonmatches and others.</p>
      <p>The indices listed above can be used as a function
 ( 1,  2, … ,   ), which determines the "distance" between
classes in the attribute space with the coordinates  1,  2, … ,   .</p>
      <p>The task of pattern recognition using the methods of
statistical recognition theory is realized in two stages. The stage
of learning and constructing the standard descriptions of classes
and the stage of recognition.</p>
      <p>The source of information about recognizable images is the
set of results of independent observations (sampling values) that
make up the learning (learning) (  )1  = ( 1,  2, … ,    ) and
the control (exam) (  )1 = ( 1,  2, … ,   ) samples, and
depending on the nature of the recognition problem
(onedimensional or multidimensional)   can be either a
onedimensional or a  - dimensional random variable.</p>
      <p>Training is aimed at the formation of standard class
descriptions. The decisive rule based on the formation of the
likelihood ratio and its comparison with a certain threshold  ,
the value of which is determined by the selected quality
criterion:
 ̂ =  ̂  ( 1, 2,…,  | 2) ≥ 
 ̂  ( 1, 2,…,  | 1)
(1)
where  ̂  ( 1,  2, … ,   |  ) is the he estimate of the
conditional joint  -dimensional probability density  1,  2, … ,  
provided they belong to the class   .</p>
      <p>At the stage of training and the construction of reference
class descriptions, the following actions are performed:
1) Form a set of characteristics from the number of available
to measure the characteristics of the object  1,  2, … ,   .</p>
      <p>2) Specify the function  ( 1,  2, … ,   ) that defines the
"distance" between classes in the characteristic space with the
coordinates  1,  2, … ,   .</p>
      <p>Define the probability distribution of probability
characteristics for classes.
sum  = 2 |
= ∑

 =1   ,).</p>
      <p>4) Calculate and select  new characteristics  1,  2, … ,   ,
 &lt;  , which correspond to the minimal eigenvalues   in the</p>
      <p>The above sequence of actions will reduce the number of
features that will reduce the cost of performing measurements
and calculations.</p>
      <p>The recognition problem can be reduced to the problem of
recognition
of
multidimensional
normal
populations.</p>
      <p>
        Approaches to the solution of this problem are clearly set forth
in [
        <xref ref-type="bibr" rid="ref10">9</xref>
        ].
      </p>
      <p>At the stage of measuring and creating of primary data for
further statistical processing the random numerical sequences
relevant to arrival time of packets belonging to uniform stream
will be received in a form of sequences of arrival times of
packets belonging to
uniform
streams:   (  ;   +  ) =
{ 1 , … ,  l , … ,    },, where   - numerical sequence of arrival
times of packets belonging to uniform stream;   ;   + 
current time range;  1 - arrival time of  -th packet,  -th stream.</p>
      <p>The selection of set of distribution functions was conducted
on the basis of physical meaning of random value specifying
time intervals between uniform traffic packets arrivals. Random
values will be located only on positive semiaxis and uniform by
nature traffic for which IP-header fields values are equal may be
overall traffic of large number of users or applications used one
type communication service.</p>
      <p>Database of distribution functions may be created from
following
distribution
laws:
gamma
distribution,</p>
    </sec>
    <sec id="sec-3">
      <title>Erlang</title>
      <p>distribution, Rayleigh distribution, Pareto distribution and others
which are not contrary to physical meaning of random value
specifying time intervals between uniform traffic packets
arrivals.</p>
      <p>Mentioned above distribution laws are presented in Table 1.</p>
      <p>
        During fourth stage statistical processing of uniform network
traffic streams performs to establish continuous distribution law
which most highly specifies random value sample of which was
obtained
during
experimental observations, a
hypothesize
concerning accordance between experimental and theoretical
distribution put forward which may be checked applying various
accordance criteria [
        <xref ref-type="bibr" rid="ref10">9</xref>
        ].
      </p>
      <p>The most frequently applicable in practice criteria are: 1)</p>
    </sec>
    <sec id="sec-4">
      <title>Criteria</title>
      <p>of  2
type; 2)</p>
    </sec>
    <sec id="sec-5">
      <title>Various non-parametric</title>
      <p>
        criteria:
Kolmogorov criterion, Smirnov criterion, Mises criterion. They
differed in the conditions of applicability when testing the
accordance hypothesize for various distribution laws (see GOST
 0:  ( ) =  ( ,  0), where  ( ) - density function;  0 - known
scalar or vector parameter of theoretical distribution which used
during accordance testing. The complex hypothesize has a form
 0:  ( ) ∈ { ( ,  ),  ∈  }, where Θ – space of parameters and
scalar or vector parameter estimator  ̂ is calculated using the
same sampling as for accordance hypothesize testing [
        <xref ref-type="bibr" rid="ref12 ref13">11, 12</xref>
        ].
      </p>
      <p>From the proposed in the method sequence of events taking
into account characteristics of obtained uniform traffic streams
and applicability of various accordance criteria we offer use
hypothesize testing criterion of  2 type for testing accordance
between experimental and theoretical distribution. Application
of  2 type criteria is described in GOST R 50.1.</p>
      <p>When testing simple hypothesize concerning accordance
between experimental and theoretical distribution of random
value  , the following sequence of actions is implemented:
a) Form a tested hypothesize by choosing a theoretical
distribution of random value  ( ,  ) accordance of which is
worth checking.</p>
      <p>b) Make random sampling of  volume from aggregation.
c) According to sampling volume  select interval number
 .
values   ( ).</p>
      <p>d) Select edge points of group interval. In doing so the
sampling</p>
      <p>may be stratified into intervals of equal length,
intervals of equal probability or according to asymptotically
optimum grouping for selected distribution law, but because
distribution laws for various ∆ may be different, we suggest to
use the stratifying into intervals of equal length. In this case it is
necessary to calculate number   and determine probability
e) After calculations   and   ( ) according to selected
testing criterion it is necessary to calculate test statistics value  ∗
according to the formula (2) or (3):</p>
      <p>2 =  ∑ =1</p>
      <p>( )
(  ⁄ −  ( ))2, (2)
 оп = −2 ln  = −2 ∑ =1   ln (  ( )
).</p>
      <p>(3)
  ⁄
f) According to  2−1 - distribution in accordance with the
formula (4) calculate value  {
&gt;  ∗}. If  {
&gt;  ∗} &gt;  , where
 is specified significance level, then there is no reason for
rejecting of tested hypothesize. Otherwise, tested hypothesize is
rejected.</p>
      <p>1 ∫∞   ⁄21  − ⁄2
 {  2 &gt;   ∗2} = 2 ⁄2Γ( ⁄2)   2
&gt; 
(4).</p>
      <p>Calculated test statistics value  ∗ is compared with critical
value   , , where  =  − 1 is the number of degrees of freedom
defined by the equation:
1</p>
      <p>Values   , are given in the various handbooks. Accordance
hypothesize is rejected if test statistics value is in critical range,
i.e. at  ∗ &gt;   , .</p>
      <p>During complex hypothesize testing and parameter
estimators calculation on grouped date, as a result of
minimization of statistics predetermined by formulas (2) and (3)
a checking sequence is similar to case of simple hypothesize
with setting the number of degrees of freedom  =  − 1, where
 is number of parameters estimated according to this sampling.
Herewith, recommendations regarding grouping method remain
valid.</p>
      <p>At the firth stage reasonable set of distribution functions is
received, each function specify particular network traffic packet
stream as well as their aggregate traffic source.</p>
    </sec>
    <sec id="sec-6">
      <title>III. CONCLUSIONS</title>
    </sec>
    <sec id="sec-7">
      <title>Developed method allows to:</title>
      <p>

</p>
      <p>Create statistical models of mixed traffic for each
network element.</p>
      <p>Obtain statistical models of mixed traffic which can be
used for analysis of real communication networks and
design of perspective communication networks.</p>
      <p>Provide its updating when implementing perspective
protocols.</p>
      <p>With additional development of methods of model
intercomparison for various network elements obtained using
proposed method fix the fact of abnormal traffic change and
identify its reasons.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>Staroduvtsev</given-names>
            <surname>Yu</surname>
          </string-name>
          .I.,
          <string-name>
            <surname>Begaev</surname>
            <given-names>A.N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Davlyatova</surname>
            <given-names>M.A.</given-names>
          </string-name>
          <string-name>
            <surname>Quality Management of Information Services</surname>
          </string-name>
          . - SPb: SPbSTU,
          <year>2017</year>
          ,
          <year>454p</year>
          . (In Russ.).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Anisimov</surname>
            <given-names>V.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Begaev</surname>
            <given-names>A.N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Staroduvtsev</surname>
            <given-names>Yu.I.</given-names>
          </string-name>
          <article-title>Functional model of communication network with unknown level of confidence and assess its capabilities to provide VPN service with specified quality</article-title>
          .
          <source>Voprosy kiberbezopasnosti [Cybersecurity issues]</source>
          .
          <source>2017. N</source>
          <volume>1</volume>
          (
          <issue>19</issue>
          ), pp.
          <fpage>6</fpage>
          -
          <lpage>15</lpage>
          . DOI:
          <volume>10</volume>
          .21681/
          <fpage>2311</fpage>
          -3456-2017-1-6-15.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Gross</surname>
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shortle</surname>
            <given-names>J.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Thompson</surname>
            <given-names>J.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Harris</surname>
            <given-names>C.M.</given-names>
          </string-name>
          <article-title>Fundamentals of Queueing Theory</article-title>
          . 4th Ed. Wiley-Interscience,
          <year>2008</year>
          , 528 p.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Krylov</surname>
            <given-names>V.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Samohvalov</surname>
            <given-names>S.S. Teletraffic</given-names>
          </string-name>
          <article-title>and its application theory</article-title>
          .  Spt.: BHV - Peterburg,
          <year>2005</year>
           288 p.
          <article-title>(In Russ</article-title>
          .).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Starodubtsev</given-names>
            <surname>Yu</surname>
          </string-name>
          .I.,
          <string-name>
            <surname>Begaev</surname>
            <given-names>A.N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kozachok</surname>
            <given-names>A.V.</given-names>
          </string-name>
          <article-title>The method of controlling access to information resources of multi-service networks of various levels of confidentiality</article-title>
          .
          <source>Voprosy kiberbezopasnosti [Cybersecurity issues]</source>
          .
          <source>2016. N</source>
          <volume>3</volume>
          (
          <issue>16</issue>
          ), pp.
          <fpage>13</fpage>
          -
          <lpage>17</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <given-names>Markov A.</given-names>
            ,
            <surname>Luchin</surname>
          </string-name>
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Rautkin</surname>
          </string-name>
          <string-name>
            <given-names>Y.</given-names>
            ,
            <surname>Tsirlov</surname>
          </string-name>
          <string-name>
            <surname>V</surname>
          </string-name>
          .
          <article-title>Evolution of a Radio Telecommunication Hardware-Software Certification Paradigm in Accordance with Information Security Requirements</article-title>
          .
          <source>In Proceedings of the 11th International Siberian Conference on Control and Communications (Omsk</source>
          , Russia, May
          <volume>21</volume>
          -23,
          <year>2015</year>
          ). SIBCON-
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <surname>IEEE</surname>
          </string-name>
          ,
          <year>2015</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          . DOI:
          <volume>10</volume>
          .1109/SIBCON.
          <year>2015</year>
          .
          <volume>7147139</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Vencel</surname>
            <given-names>E.S.</given-names>
          </string-name>
          <article-title>The theory of probability: Textbook for university students. 9-th ster</article-title>
          . ed. - M.:
          <source>Publishing House "Academia"</source>
          ,
          <year>2003</year>
          . - 576 p.
          <article-title>(In Russ</article-title>
          .).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Buranova</surname>
            <given-names>M.A.</given-names>
          </string-name>
          <article-title>Analysis of statistical characteristics of multimedia traffic aggregation node in a multiservice network</article-title>
          . / M.A.
          <string-name>
            <surname>Buranova</surname>
            ,
            <given-names>V.G.</given-names>
          </string-name>
          <string-name>
            <surname>Kartashevsky</surname>
            ,
            <given-names>M.S.</given-names>
          </string-name>
          <string-name>
            <surname>Samoilov</surname>
          </string-name>
          . // Radio-technical
          <source>and telecommunication systems. Systems, networks and devices of telecommunications. -Murom</source>
          ,
          <year>2014</year>
          . - No
          <volume>4</volume>
          (
          <issue>16</issue>
          ). - P.
          <fpage>63</fpage>
          -
          <lpage>69</lpage>
          . (In Russ.).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Y.A.</given-names>
            <surname>Fomin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.R.</given-names>
            <surname>Tarlovskii</surname>
          </string-name>
          .
          <source>Statistical Theory of Recognition of Images. - M .: Radio and Communication</source>
          ,
          <year>1986</year>
          . -264 p.
          <article-title>(In Russ</article-title>
          .).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Anisimov</surname>
            <given-names>V.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Begaev</surname>
            <given-names>A.N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Starodubtsev</surname>
            <given-names>Yu.I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sukhorukova</surname>
            <given-names>E.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fedorov</surname>
            <given-names>V.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chukarikov</surname>
            <given-names>A.G.</given-names>
          </string-name>
          ,
          <article-title>The way of purposeful transformation of the model parameters of the real fragment of the communication network</article-title>
          .
          <source>Printed: May</source>
          <volume>23</volume>
          ,
          <year>2016</year>
          , Bul.
          <source>N 15</source>
          ,
          <year>2620200</year>
          . (In Russ.).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Begaev</surname>
            <given-names>A.N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Starodubtsev</surname>
            <given-names>Yu.I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fedorov</surname>
            <given-names>V.G..</given-names>
          </string-name>
          <article-title>A method for estimating the manageability of a fragment of a public communication network, taking into account the influence of a plurality of control centers and destructive program influences</article-title>
          .
          <source>Voprosy kiberbezopasnosti [Cybersecurity issues]</source>
          .
          <source>2017 N</source>
          <volume>4</volume>
          (
          <issue>22</issue>
          ), pp.
          <fpage>32</fpage>
          -
          <lpage>39</lpage>
          . DOI:
          <volume>10</volume>
          .21681/
          <fpage>2311</fpage>
          - 3456-2017-4-
          <fpage>32</fpage>
          -39.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Starodubtsev</surname>
            <given-names>Yu.I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grechishnikov</surname>
            <given-names>E.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Komolov D</surname>
          </string-name>
          .V.
          <article-title>Use of neural networks to ensure stability of communication networks in conditions of external impacts</article-title>
          .
          <source>Telecommunications and Radio Engineering</source>
          .
          <year>2011</year>
          . V. 70. N 14. P.
          <volume>1263</volume>
          -
          <fpage>1275</fpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>