<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Multi-Criteria Synthesis of the Software-Defined Network Structure</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Kyiv College of Communication</institution>
          ,
          <addr-line>Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National Aviation University</institution>
          ,
          <addr-line>Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2028</year>
      </pub-date>
      <fpage>0000</fpage>
      <lpage>0001</lpage>
      <abstract>
        <p>A software-defined network is a complex system, the basis of which, first of all, is formed by a central controller, switching nodes and data transmission channels ensuring the interaction of these nodes. In the process of designing such systems, special attention must be paid to its topological structure. This is due to several factors. Firstly, the issues of improving the efficiency and reliability of the entire network directly depend on the topological structure. Secondly, topology affects the number of factors when making all the decisions of its design. And finally, the topology completely defines the process of traffic management in a software-defined network, which occurs using a central controller that stores all the information about the network structure. For a comprehensive solution of the general problem of designing software-defined network structure and solving particular problems of optimizing design decisions during its synthesis, the article proposes optimization of system topology using the random search method and the tree structure method. The results of the proposed methods are compared and recommendations are given for combining these methods.</p>
      </abstract>
      <kwd-group>
        <kwd>Software-Defined Network</kwd>
        <kwd>Data Transfer System</kwd>
        <kwd>Topology</kwd>
        <kwd>Optimization</kwd>
        <kwd>Design</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Like all modern technologies, software-defined networks (SDN) are constantly being
improved, undergoing processes of modification and modernization. Taking into
account the complexity of these technologies, improvement processes for objective
reasons are quite lengthy. And although all of them are aimed at the possibility of
exchanging various kinds of information, increasing its reliability, transmission speed
and reliability of the network elements functioning, their common component is the
topological structure of the system. Therefore, the question of the software-defined
network structure optimal synthesis is relevant and quite popular.</p>
    </sec>
    <sec id="sec-2">
      <title>Analysis of publications and goal setting</title>
      <p>
        According to the range of services provided, software-defined networks belong to
data transmission systems [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. An analysis of the work showed that today, close
attention is paid to the research of data transmission systems. This is confirmed by a large
number of publications, and caused by the fact that this topic covers a very wide
range of tasks in various fields. There are many publications that classify and disclose
various ways and methods of data transfer [
        <xref ref-type="bibr" rid="ref2 ref3 ref4 ref5">2-5</xref>
        ]. But in most cases they are
considered either in the context of generally accepted topologies of transmission systems, or
without any description of the latter. There are also publications that are dedicated to
the design of data transmission systems, but they mainly relate to certain industries,
which narrows their scope, since they are focused on the characteristics of this
industry only. Even fewer articles address the issue of optimizing data transmission
systems [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], especially in the context of software-defined networks [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Therefore, the
purpose of this article is to develop a method for optimizing the software-defined
network structure formation, and assess its effectiveness.
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Determining performance indicators of a software-defined network</title>
      <p>When solving the problem of a software-defined network structure synthesing, the
following are used as performance indicators:
─ reduced costs for the creation and operation of the network;
─ characteristics of software-defined network structure reliability;
─ the reliability of consumer information;
─ average response time of network nodes to a request;
─ average message transmission time;
─ network congestion.</p>
      <p>Consider those of the indicators that are most often used to assess the effectiveness of
software-defined network.</p>
      <p>
        The cost of software-defined network Ws is estimated by the quoted annual costs,
which take into account both capital and operating costs. Topology of any information
transmission system, and SDN is no exception, can be represented formally as a
symmetric G – graph. Network elements form the vertices of the graph, and data
transmission channels form the edges of the graph [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>Evaluation of network topology effectiveness can be based on indicators that
characterize the structure of the graph. Such indicators may be:
─ redundancy of the structure Rs. This indicator determines excess of the total
number of connections m over their minimum necessary number n-1 (where n is the
number of nodes), which ensures network connectivity.
─ uneven structure of Ns. The exponent Ns determines quadratic deviation of
connections distribution of given network from a uniform distribution.
─ diameter of the structure Ds. This indicator determines maximum distance of
network nodes.
─ compact structure Bs. The indicator Bs characterizes general proximity of the nodes
to each other.
─ the degree of Cs structure centralization. This indicator displays relative number of
connections that are established through the central controller.</p>
      <p>Redundancy of Rs structure in a certain extent characterizes reliability, that is, one of
the stability components and affects the efficiency of the SDN. At Rs = 0 (star, tree
topology) failure of any element (link or node) produces a partial or complete decay
of the network. An increase in the Rs value reflects an increase in the reliability of
SDN structure, however, a large redundancy (for example, complete interconnection)
makes the network economically disadvantageous and difficult to implement.</p>
      <p>
        Non-uniformity of Ns structure also characterizes reliability of SDN structure, but
only from the point of view of the effect of individual elements failures. Structures
with large values of Ns (star, ring tree, distributed star) are less reliable than with
lower values of unevenness. At Ns = 0 (ring, regular, complete interconnection)
disconnection or failure of a structure node does not disable the network, but only
reduces its performance [
        <xref ref-type="bibr" rid="ref12 ref13 ref14">12-14</xref>
        ].
      </p>
      <p>Diameter of Ds structure and Bs structure compactness determine the average
residence time of information in the network when it is sent between nodes. An increase
in Ds and Bs values generally reflects an increase in the transmission time of messages
in the network. Length of data transmission path in structures with large values of Ds
and Bs (ring, tree, irregular) is longer than in structures with small values of Ds and Bs
(complete relationship). Thus, indicators Ds and Bs characterize both the inertia of
information processes and, to a certain extent, the survivability and noise immunity of
SDN. The lower values of Ds and Bs are the more efficient network structure is, since
its topology with such indicators has a shorter data transmission path and,
consequently, a short residence time of the message in the transmission system. In addition, in
the network structure of this type there are no communication channels, failure of
which leads to the breakdown of the SDN into individual elements.</p>
      <p>In general case, degree of Cs structure centralization indicates the presence or
absence of a central node in networks, and this determines the control method
(centralized, decentralized, and centralized-decentralized). Since the software-defined
network is completely controlled from the central controller, the degree of centralization
in the SDN affects its reliability, operating efficiency in terms of performance of its
individual elements, as well as the software and technical complexity of the processes
for managing all network resources. Cs values are close to one and equal to it (star,
ring tree, tree) show that the systems structures are centralized, and failure of central
node leads to complete destruction of network. Large degree of centralization in SDN
is also associated with uneven distribution of the load among the system elements,
which determines the necessity to create a central controller with high output. In the
case of a network structure with Cs values close to zero or equal to zero (ring, regular,
complete interconnection), network should spend a considerable part of time on
organizing and managing the exchange of information between nodes, in other words, a
software-defined network works like a regular peer-to-peer network.</p>
      <p>Analysis of typical structures shows that Rs, Ns, Ds, Bs and Cs characterize their
survivability, reliability, performance, and cost. Therefore, using these indicators, it is
possible to evaluate the network efficiency in a topological sense.</p>
      <p>Considered indicators have different dimensions and are subject to various
methods of extremization (some of them require minimization, and the rest require
maximization). Therefore, it is necessary to bring them to a dimensionless form and to a
single method of extremization, for example, to make them minimized. After these
operations, we obtain normalized particular criteria of R0, N0, D0, B0, C0 effectiveness
and W0 cost.</p>
      <p>It is believed that these indicators equally characterize the components of
efficiency, therefore, their weight differentiation is impractical. In this case, aggregated
criterion of SDN topology effectiveness can be determined by the following formula:
F0  R0  N0  D0  B0  C0 , F0  0;1.</p>
      <p>
        5
In the case of nonlinear compromise scheme [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], the following expression is used as
the objective function:
  a1(1 F0 )1  a2 (1 W )1,a1  a2 1,
0
where: a1 and а2 – weighting coefficients; ε – some sufficiently small value, which
serves to avoid dividing by zero at W0=1.
4
      </p>
    </sec>
    <sec id="sec-4">
      <title>Solving the problem of software-defined network structure synthesis</title>
      <p>
        Consider two algorithms to solve the problem. This is optimization by random search
and using the tree structure method [
        <xref ref-type="bibr" rid="ref8 ref9">8, 9</xref>
        ].
      </p>
      <p>In the random search method, optimization occurs by generating a certain number
of connected communication networks and choosing the best option from them. As
additional settings for the optimization process are:
─ minimum number of edges to be removed when generating a network Rmin;
─ maximum number of edges to be removed when generating a network Rmax,
─ number of iterations Imax.</p>
      <p>Number of iterations means number of networks that will be generated, and from
which the best option will be selected. The larger value of this parameter, the higher
results reliability, as the number of considered cases increases.</p>
      <p>Minimum number of edges to be removed – allows you to initially exclude very
strongly connected networks from consideration, if it is a priori known that there is no
optimal solution among them. As this value increases, the maximum number of edges
in the generated networks decreases, thus, connectivity of the networks decreases.</p>
      <p>
        Maximum number of edges to be removed – at the initial stage allows to exclude
from the consideration very weakly connected networks, if it is known that there is no
optimal solution among them. When this value decreases, connectivity of the created
networks increases [
        <xref ref-type="bibr" rid="ref15 ref16 ref17">15-17</xref>
        ].
      </p>
      <p>Network generation is as follows. A fully connected network is created. After that,
number R is randomly generated that sets number of edges removed from the network:</p>
      <p>Rmin  R  Rmax .</p>
      <p>
        After that it is randomly removed from the fully connected network of, R edges. It is
controlled so that the network remains connected. For the network thus obtained, the
calculation of the values of particular criteria is performed. After that, the generalized
criterion is calculated using the nonlinear compromise scheme [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] taking into account
the significance coefficients of the criteria. The result obtained is compared with the
optimal solution received at the moment, and if it is better, it is taken as the optimal
solution at this step. This procedure is repeated Imax times.
      </p>
      <p>Consider the description of the algorithm more detailed.</p>
      <p>Step 0. Create a random network S0. Set is as initial and optimal. SOPT = S0.
ФOPT = Ф0.</p>
      <p>Step 1. While I &lt; IMAX repeat. Create a random network SI. If ФI &lt; ФОРТ, then put
SOPT = SI. ФOPT = ФI.</p>
      <p>Step n. Output optimization result SOPT, ФOPT..</p>
      <sec id="sec-4-1">
        <title>Random network generation algorithm</title>
        <p>Step 0. Create a fully connected network.</p>
        <p>Step 1. Randomly determine the integer R: Rmin &lt; R &lt; Rmax</p>
        <p>Step 2. Repeat the procedure for removing a random edge R times. To remove an
edge, it is randomly selected. If while deleting, the graph remains connected, then it is
deleted and if not, then this edge is excluded from further consideration and another
edge is selected for deletion.</p>
      </sec>
      <sec id="sec-4-2">
        <title>Now consider the structure tree method.</title>
        <p>In this case, optimization occurs by selecting the optimal edge for removal at each
step of the iterative process.</p>
        <p>As additional settings for the optimization process are:
─ amount of iteration Imax;
─ a sign of a stop in the absence of leafs of optimization tree with better performance
than non-leaf nodes.</p>
        <p>For optimization, a fully connected network is built, and then the edges are removed
in accordance with the value of the generalized criterion. For optimization, a tree of
optimal solutions is built. Its nodes are network options, and edges are the fact of
removing one corresponding edge from the top-level network. Thus, the lower we
move along the tree, the more edges are removed and the less remains. At each next
step, the leaf vertex of the tree with the best value of the generalized optimization
criterion is selected, and all possible options for removing one edge from the selected
network are considered. All the obtained options and values of the generalized
criterion are entered in the optimization tree, and the selected vertex ceases to be leafy. Now
the best leaf vertex is again selected and the process is repeated until all leaf vertices
are exhausted, the iteration counter is exhausted, or (with the stop sign turned on) a
situation does not occur when the optimal solution does not belong to the leaf node.</p>
        <p>Algorithm can be interrupted at any iteration. In this case, we get the best result for
a given number of iterations.</p>
      </sec>
      <sec id="sec-4-3">
        <title>Consider an optimization algorithm.</title>
        <p>Step 0. Create a fully connected network and set it as the root of the optimization
tree S0.</p>
        <p>Step 1. Find in the optimization tree leaf with the best value of the generalized
criterion (in the first step it will be the root of the tree – since it is the only node of the
tree) S = SI. Calculate all possible options for removing one edge from the network
and enter the result into the optimization tree. Repeat this step until the counter
reaches the limit of the number of iterations or there are no valid leaf nodes left.
5</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Practical application of the proposed algorithms</title>
      <p>Briefly consider the results obtained on a test example. First, we will set the initial
data for optimization and the coordinates of the nodes Tables 1-2.</p>
      <p>Conversion factor of distances from some conventional units to
kilometers. Thus, coordinates of the nodes can be set in any unit of
measurement (dimensionless)
Cost of capital charges for the construction and operation of one
kilometer of communication network (in c.u.)
Return on investment (dimensionless)</p>
      <sec id="sec-5-1">
        <title>Number of network nodes (dimensionless)</title>
        <p>After optimization by random search and tree structure methods, respectively, the
following intermediate and final results of the experiment were obtained Table 3. In
addition, the related nodes obtained by these methods are shown Tables 4-5.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
1 + + + + + + + + + + + +
2 + + + + + + +
3 + + + + +
4 + + + + + +
5 + + + + + +
6 + + + + + + + +
7 + + + + + +
8 + + + + + + + +
9 + + + + + + + +
10 + + + + + + + + + + + + +
11 + + + + + + + +
12 + + + + + + + +
13 + + + + + + +
14 + + + + + +
15 + + + + + + + +
16 + + + + + +
17 + + + +
18 + + + + + + +
19 + + + + +
20 + + + + +</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Conclusion</title>
      <p>Thus, we see that the tree structure method provides the best indicator of efficiency,
but requires large computational resources. In this regard, it seems interesting to
combine both methods. A fully connected network a priori has a poor value of the
optimality criterion and is far from the optimal solution. In this regard, it is inefficient to
use it as a base. Thus, the random search method is effectively to be used to generate
initial basic networks, and the tree structure method is to be used to improve their
characteristics.</p>
      <p>In this case, optimization is carried out in two stages. At the first stage, a random
optimal network is built using the random search method, and then at the second stage
it is used as the base (root) network for the structure tree method – with the help of
which it is improved. Using this approach in software-defined networks will allow the
central controller to significantly reduce its computing load, both in the case of the
initial design of software-defined networks, and in the case of its further
improvement.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>A.E.</given-names>
            <surname>Kolomeets</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.V.</given-names>
            <surname>Surkov</surname>
          </string-name>
          ,
          <article-title>Software-defined SDN Networks - A Fundamentally New Approach to Networking, Modern computer systems and technologies: department collected works “Computer systems and networks” MSTU. named after</article-title>
          <string-name>
            <given-names>N.E.</given-names>
            <surname>Bauman</surname>
          </string-name>
          ,
          <year>2014</year>
          , pp.
          <fpage>33</fpage>
          -
          <lpage>42</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Telecommunication</surname>
          </string-name>
          systems and networks: Textbook: T.
          <fpage>1</fpage>
          - Modern technologies / B.I.
          <string-name>
            <surname>Kruk</surname>
            ,
            <given-names>V.N.</given-names>
          </string-name>
          <string-name>
            <surname>Popantonolulo</surname>
            ,
            <given-names>V.P.</given-names>
          </string-name>
          <string-name>
            <surname>Shuvalov</surname>
          </string-name>
          <article-title>; under the editorship of professor V.P</article-title>
          .
          <string-name>
            <surname>Shuvalova</surname>
          </string-name>
          . - Ed. 3rd, fixed and added, Moscow: Hot line - Telecom,
          <year>2003</year>
          , 647 p.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Marder</surname>
            <given-names>N.S.</given-names>
          </string-name>
          <string-name>
            <surname>Modern telecommunications</surname>
          </string-name>
          , M.: IRIAS,
          <year>2006</year>
          , 384 p.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Abilov</surname>
            <given-names>A.V.</given-names>
          </string-name>
          <article-title>Communication networks and switching systems: Textbook for universities</article-title>
          , Moscow, Radio and communications,
          <year>2004</year>
          , 288 p.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>V.G.</given-names>
            <surname>Olifer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.A.</given-names>
            <surname>Olifer</surname>
          </string-name>
          ,
          <article-title>Computer networks</article-title>
          . Principles, technologies, protocols, St. Petersburg. : Publishing house “Peter”,
          <year>2000</year>
          , 672 p.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Gostev</surname>
            <given-names>V.M.</given-names>
          </string-name>
          <article-title>System for optimizing the design of data transmission networks</article-title>
          ,
          <source>Memoirs of KNU: Physics and mathematics, 2007</source>
          , Vol.
          <volume>149</volume>
          . Book 2, pp.
          <fpage>35</fpage>
          -
          <lpage>48</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7. Mazin Al Hadidi,
          <string-name>
            <given-names>J. Samih</given-names>
            <surname>Al-Azzeh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Tkalich</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Odarchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          , Yu. Khokhlachova. ZigBee, Bluetooth and
          <string-name>
            <surname>Wi-Fi Complex Wireless Networks Performance Increasing</surname>
          </string-name>
          ,
          <source>International Journal on Communications Antenna and Propagation</source>
          , Vol.
          <volume>7</volume>
          , № 1, рр.
          <fpage>48</fpage>
          -
          <lpage>56</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Vetelina</surname>
            <given-names>E.</given-names>
          </string-name>
          <article-title>Study of development trends of modern network technologies using softwaredefined networks as an example, New information</article-title>
          technologies in
          <source>automated systems, № 18</source>
          ,
          <year>2015</year>
          , pp.
          <fpage>502</fpage>
          -
          <lpage>508</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>A.N.</given-names>
            <surname>Voronin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.K.</given-names>
            <surname>Ziatdinov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.V.</given-names>
            <surname>Kuklinskyi</surname>
          </string-name>
          ,
          <article-title>Multicriteria solutions: models and methods: monograph, Kyiv</article-title>
          ,
          <string-name>
            <surname>NAU</surname>
          </string-name>
          ,
          <year>2011</year>
          , 348 p.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <given-names>V.S.</given-names>
            <surname>Mikhalevich</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.I. Kuksa</surname>
          </string-name>
          , Methods of sequential optimization, Moscow: Nauka,
          <year>1983</year>
          , 208 p.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Roman</surname>
            <given-names>Odarchenko</given-names>
          </string-name>
          , Serhii Dakov,
          <article-title>Olexandr Oksiuk and Larisa Dakova, SoftwareControlled Network SDN Reliability Calculation 5th International Scientific-Practical Conference Problems of Infocommunications Science and Technology</article-title>
          ,
          <string-name>
            <surname>PICS</surname>
          </string-name>
          &amp;T 2018, Conference Proceedings, pp.
          <fpage>99</fpage>
          -
          <lpage>103</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Okhrimenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kovtun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Gancarczyk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Karpinskyi</surname>
          </string-name>
          ,
          <article-title>Method of Algorithm Building for Modular Reducing by Irreducible Polynomial</article-title>
          ,
          <source>Proceedings of the 16th International Conference on Control, Automation and Systems</source>
          , Oct.
          <volume>16</volume>
          -
          <fpage>19</fpage>
          , Gyeongju, Korea,
          <year>2016</year>
          , рр.
          <fpage>1476</fpage>
          -
          <lpage>1479</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Al-Azzeh</surname>
            <given-names>J.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Al Hadidi</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Odarchenko</surname>
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gnatyuk</surname>
            <given-names>S.</given-names>
          </string-name>
          , Shevchuk
          <string-name>
            <surname>Z.</surname>
          </string-name>
          , Hu
          <string-name>
            <surname>Z.</surname>
          </string-name>
          <article-title>Analysis of self-similar traffic models in computer networks</article-title>
          ,
          <source>International Review on Modelling and Simulations</source>
          , №
          <volume>10</volume>
          (
          <issue>5</issue>
          ), pp.
          <fpage>328</fpage>
          -
          <lpage>336</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <given-names>R.</given-names>
            <surname>Odarchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Abakumova</surname>
          </string-name>
          ,
          <article-title>Security Key Indicators Assessment for Modern Cellular Networks</article-title>
          ,
          <source>Proceedings of the 2018 IEEE First International Conference on System Analysis &amp; Intelligent Computing (SAIC)</source>
          ,
          <source>Kyiv, Ukraine, October</source>
          <volume>8</volume>
          -
          <issue>12</issue>
          ,
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <given-names>Z.</given-names>
            <surname>Hassan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Odarchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Zaman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Shah</surname>
          </string-name>
          ,
          <article-title>Detection of Distributed Denial of Service Attacks Using Snort Rules in Cloud Computing &amp; Remote Control Systems</article-title>
          ,
          <source>Proceedings of the 2018 IEEE 5th International Conference on Methods and Systems of Navigation and Motion Control, October 16-18</source>
          ,
          <year>2018</year>
          . Kyiv, Ukraine, pp.
          <fpage>283</fpage>
          -
          <lpage>288</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>M. Zaliskyi</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Odarchenko</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Gnatyuk</surname>
            ,
            <given-names>Yu. Petrova. A.</given-names>
          </string-name>
          <string-name>
            <surname>Chaplits</surname>
          </string-name>
          ,
          <article-title>Method of traffic monitoring for DDoS attacks detection in e-health systems and networks</article-title>
          .
          <source>CEUR Workshop Proceedings</source>
          , Vol.
          <volume>2255</volume>
          , pp.
          <fpage>193</fpage>
          -
          <lpage>204</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17. I. Parkhomey,
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Odarchenko</surname>
          </string-name>
          , T. Zhmurko et al,
          <article-title>Method For UAV Trajectory Parameters Estimation Using Additional Radar Data</article-title>
          ,
          <source>Proceedings of the 2016 4th International Conference on Methods and Systems of Navigation and Motion Control</source>
          , Kyiv, Ukraine,
          <source>October 18-20</source>
          ,
          <year>2016</year>
          , рр.
          <fpage>39</fpage>
          -
          <lpage>42</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>