<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Modeling  the  change  detection  process  state  of  objects  in  monitoring data </article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Alexey Bryukhovetskiy</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Dmitriy Moiseev</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Sevastopol state university</institution>
          ,
          <addr-line>33 Universitetskaya str., Sevastopol, 299053</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
      </contrib-group>
      <fpage>36</fpage>
      <lpage>42</lpage>
      <abstract>
        <p>   A model for detecting anomalous data based on the research of sample uniformity is proposed. The method is designed to solve the detecting changes problem in the flow' state of controlled data using normal and gamma distributions models based on the Spearman nonparametric statistics criterion. The research results about intensity values that influence on requests generating, the intensity of servicing applications, the system load, the volume of samples, the time points of measuring characteristics and significance levels on the change the control object state are presented. The method can be used to control the process of detecting changes in UMV resources states. Currently, the process of anomalies rapid detection in the monitoring data of critical infrastructure objects is a complex, time-consuming and difficult to formalize task. Intrusion detection systems are the most effective counter-measure and the most reliable approach to ensure the protection of automotive networks or traditional computer networks.</p>
      </abstract>
      <kwd-group>
        <kwd> 1  Simulation modeling</kwd>
        <kwd>queuing system</kwd>
        <kwd>uniformity of samples</kwd>
        <kwd>heteroskedasticity effect</kwd>
        <kwd>complex systems modeling</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction </title>
      <p>Research conducted to date in the field of vehicle protection has solved a number of safety problems
and offered a many solutions. However, there are still open problems that require further study. The
need to solve problems that ensure the security of the critical information infrastructure in the "smart
city" is due not only to the growth trends of traffic flows, but also to significant changes in the digital
technologies field used on vehicles, when interaction with the environment is carried out through the
network through interfaces: V2V, V2X, V2P ,V2G, V2D. The article considers a simulation model that
allows you to simulate the changes dynamics in the objects states, and can be considered as one of the
possible approaches to improve the methods of protecting critical objects, in particular, intelligent
vehicles in VANET networks.</p>
      <p>
        Currently, the process of anomalies rapid detection in the monitoring data of critical infrastructure
objects is a complex, time-consuming and difficult to formalize task. Intrusion detection systems (IDS)
are the most effective counter-measure and the most reliable approach to ensure the protection of
automotive networks or traditional computer networks [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. In complex information systems for
monitoring critical objects, a decision-making support mechanism is implemented to identify the
control object critical state. The combined use of operational monitoring tools, simulation modeling,
and probabilistic models allows us to predict the dynamics of state changes and proactively perform
corrective actions, thereby preventing the emergencies occurrence.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Problem statement </title>
      <p>It is necessary to develop a software simulation model of a critical object in the form of a queuing
system and conduct a series of experiments on it in order to test the effectiveness of the proposed
intelligent methods for detecting changes in the monitoring objects state, as well as to investigate the
critical parameters influence on changes in the object state:
 request generation rate – λ and σ(λ);
 application service intensity – μ and σ(μ);
 system load – ρ;
 sample sizes – n;
 significance levels – p.
 time moments of characteristics measurements – τ;</p>
      <p>
        The influence of these parameters is estimated using normal and gamma distribution models based
on Spearman's nonparametric statistics criterion. To simulate the changing object state process, a
discrete-event model of the general-purpose simulation environment Anylogic was used [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], the
information metrics calculations was carried out in MATLAB. In terms of the theory of queuing, the
model under study is proposed to be considered as a queuing system (QS) of type G/G1/M/N [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. The
changes detection in the samples uniformity is based on the effect of heteroscedasticity (G-effect), as
an observations heterogeneity, expressed in the unequal random error variance of the regression model
[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. The scheme and procedure of modeling are presented in [
        <xref ref-type="bibr" rid="ref10 ref6 ref7 ref8 ref9">6 - 10</xref>
        ].
3. Conducting model research experiments 
      </p>
      <p>
        Let’s conduct an experiments series in which the receipt intensity and applications processing in the
system are distributed according to the normal law [
        <xref ref-type="bibr" rid="ref10 ref11">10 - 11</xref>
        ].
      </p>
      <p>Consider a single-channel QS with the following characteristics:
 request generation rate M(λ)=0.7, σ(λ)=0.09;
 application service intensity M(μ)=0.8 and σ(μ)=[0.17; 0.2; … ; 0.4];
 storage capacity N=5;
 method of organizing and manipulating applications – FCFS.</p>
      <p>The critical values of the Student's t-test for the given sample sizes and confidence probabilities are
presented in Table 1.</p>
      <p>n=40 
2.711558 
2.980293 
3.565678 </p>
      <p>t(40‐2) 
2.834956 
3.098965 
3.267130 </p>
      <p>n=60 
2.663287 
2.918394 
3.466329 </p>
      <p>t(60‐2) 
3.129703 
3.325995 
3.503136 </p>
      <p>The experimental results from Figure 1: are shown at the diagram on Figure 3:. Critical values are
shown for the sample n=40. As we can see from the graphs with the sample size n=40, and significance
level p=0.01, the model is constantly located in the hetero region, which calls into question the
objectivity of the results obtained. In this example, we recommend using the significance level p=0.001.</p>
      <p>E x p e r i m e n t a l r e s u l t s f o r d i f f e r e n t v o l u m e s n</p>
      <p>We will conduct a series of experiments on the simulation model, varying the time points τ= 21, 31,
41] of characteristics, for samples with volume n= 20, 40, 60]. The generating requests intensity M(λ)
and servicing requests intensity M(μ) don’t change. Critical values are shown for the sample n=20. The
experimental results - t(n) for different time points τ, at n=20 are shown on Figure 2:. For the time points
τ=21,41 at n=20 G- the effect does not appear.</p>
      <p>E x p e r i m e n t a l   r e s u l t s   f o r   d i f f e r e n t   t i m e   p o i n t s   a t  </p>
      <p>n = 2 0
0.26 
0.32 
0.33 
0.35 
0.37 
0.38 
0.4 
4,5</p>
      <p>4
ts3,5
e
‐tt 3
2,5
2
5
4
t
s3
e
t
‐
t2
1
0
itself, and is stable for τ=31, 41.</p>
      <p>At τ=21 the G-effect is unstable for the specified sample volumes.</p>
      <p>Let’s conduct a series of experiments with the changed values of the mathematical expectation and
the standard deviation:


the intensity of requests received M(λ)=0.8, σ(λ)=0.02;
request service intensity M(μ)=0.9 and σ(μ)= [0.17; 0.2; …; 0.43].</p>
      <p>Experimental results - t(n) for n= [20, 40, 60] are shown at Figure 3:. Critical values are shown for
the sample n=40.</p>
      <p>E x p e r i m e n t a l   r e s u l t s   w i t h   c h a n g e d   v a l u e s   o f  
m a t h . e x p e c t a t i o n s   a n d   m e a n   s q u a r e   d e v i a t i o n  
ts 2,5
e
t
‐
t
4,5</p>
      <p>4
3,5
3
2
1
0
1,5
0,5
ρ=0.5 and ρ=0.375 the model is permanently located in the hetero region.
4. Gamma distribution of requests intensities   </p>
      <p>Let’s conduct a series of experiments in which the intensity of receipt and processing of applications
in the system is distributed according to the gamma law. The random value generator using the gamma
distribution –gamma (α, β) has two parameters: α – shape parameter &gt; 0, β – scale parameter &gt; 0. The
scale parameter  and shape parameter  of this distribution are related to the mathematical expectation
and variance by two equations:
α ∗ β
α ∗ β
σ</p>
      <p>α=5.5, β=0.128.
 
 </p>
      <p>The solution of this system of equations allows us to determine the maximum plausible values of
the parameters of the gamma distribution. We convert the parameters values of the normal distribution
to the gamma distribution. We get the following request generation rate: for M(λ)=0.7, σ(λ)=0.09 =&gt;</p>
      <p>Values of the requests service intensity are shown at the Table 3.</p>
      <p>We present gamma distribution graphs for some examples of parameter values presented in Table 4
 
Table 4  
Examples of parameter values for a gamma distribution  </p>
      <p>μ  σ(μ) 
Parameter  Example 1 
alpha  3.7 
beta  0.215 
mathematical 
expectation 
dispersion 
mode 
 
α 
Example 2 
2 
0.4 
0.80 
0.32 
0.40 
 </p>
      <p>β 
Example 3 
1.6 
0.5 
0.80 
0.40 
0.30 </p>
      <p> 
α 
3.7 
3,2 
2.7 
2.45 </p>
      <p>2 
1.92 
1.8 
1.73 
1.7 
1.6 
10
8
t 6
s
e
t
‐t 4
2
0</p>
      <p>After converting the parameters, we will perform a system simulation for the parameters from Figure
3:. The simulation results for different samples are presented on Table 5, where we note the observed
values for p=0.001 – blue, p=0.005 – green, p=0.01 – red, which correspond to the G-effect.
 
Table 5  
Experimental results for different volumes of n  </p>
      <p>When the sample size is n=60 he model is constantly located in the hetero region. When comparing
the results obtained for the gamma distribution with the normal distribution, the most stable areas of
the G-effect were observed, as before, with a sample size of n=40, p=0.001.</p>
    </sec>
    <sec id="sec-3">
      <title>5. Conclusions </title>
      <p>Experiments were carried out to determine the influence of a number parameter values on changes
in objects state using the gamma distribution. The results obtained allow us to state that the established
parameters of the gamma distribution allow us to ensure the adequacy of the simulation model. The
simulation results for the gamma distribution confirm the stable G-effect detection regions obtained for
the normal law of intensity distribution. Moreover, in a model based on the gamma distribution, the
hetero regions have a larger time span compared to the model using the normal distribution law.</p>
      <p>Experiments have shown that the most optimal choice for the gamma distribution, which provides a
high confidence in the detection of the G=effect, is to use a sample size of n=40. When using a sample
of n=20, the heteroscedasticity is unstable, and when using a sample of n=60, the model was constantly
in the hetero region.</p>
      <p>Various points of time τ for measuring the characteristics were investigated. Thus, it was found that
for τ = 21 and τ =41 the G-effect was rarely observed, and for τ=51 – it was practically not observed.
Based on the above, it is recommended to use τ=31 in order to increase the reliability of monitoring
objects.</p>
      <p>The general recommendation for evaluating the detection of the G-effect is the following. Depending
on the monitored system purpose, whether it is a critical purpose or not, the expert has the right to set
values of the significance level – p, for which, on the one hand, high reliability of the characteristics
values of the monitored objects will be ensured, on the other hand, the minimum errors number of the
first and second kind is achieved, which means that the risks of making erroneous decisions will be
reduced, which in turn will ensure minimal losses.</p>
      <p>The results obtained in the conducted experiments with models based on various distribution laws
of the requests flow intensity and the criteria used are used as input information for intelligent decision
support systems for choosing a monitoring strategy, depending on the such parameters values as the
required volume random variables samples; frequency, depth, monitoring frequency; moments of
measurement of the characteristics of the control objects; the environment state, and others.</p>
    </sec>
    <sec id="sec-4">
      <title>6. Acknowledgements </title>
      <p>The research was carried out with the financial support of the RFBR in the framework of scientific
projects № 19-29-06015 and № 19-29-06023.</p>
    </sec>
    <sec id="sec-5">
      <title>7. References </title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>I.</given-names>
            <surname>Butun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. D.</given-names>
            <surname>Morgera</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Sankar</surname>
          </string-name>
          ,
          <article-title>A survey of intrusion detection systems in wireless sensor networks</article-title>
          ,
          <source>IEEE communications surveys &amp; tutorials 16(1)</source>
          (
          <year>2014</year>
          )
          <fpage>266</fpage>
          -
          <lpage>282</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Mohammed</given-names>
            <surname>Ali Hezam Al Junaid</surname>
          </string-name>
          ,
          <article-title>Syed A. A</article-title>
          . et al.
          <article-title>Classification of Security Attacks in VANET: A Review of Requirements and Perspectives</article-title>
          ,
          <source>MATEC Web of Conferences</source>
          <volume>150</volume>
          , (
          <year>2018</year>
          ) 06038, https://doi.org/10.1051/matecconf/201815006038.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>V. D.</given-names>
            <surname>Boev</surname>
          </string-name>
          ,
          <article-title>Conceptual system design in Anylogic 7</article-title>
          and
          <string-name>
            <given-names>GPSS</given-names>
            <surname>World</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          ,
          <string-name>
            <surname>NOI</surname>
          </string-name>
          , p.
          <fpage>556</fpage>
          ,
          <year>2016</year>
          .
          <source>ISBN: 978-5-9556-0161-8</source>
          .
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>F.</given-names>
            <surname>Sakiz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Sen</surname>
          </string-name>
          ,
          <article-title>A survey of attacks and detection mechanisms on intelligent transportation systems: Vanets and IoV Ad Hoc Networks 61 (</article-title>
          <year>2017</year>
          )
          <fpage>33</fpage>
          -
          <lpage>50</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Aivazian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. S.</given-names>
            <surname>Mhitaryan</surname>
          </string-name>
          , Applied statistics and fundamentals of econometrics, Moscow, High School, Publ «Yunity»,
          <year>1998</year>
          , p.
          <fpage>1000</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Skatkov</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bryukhovetskiy</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shevchenko</surname>
            <given-names>V</given-names>
          </string-name>
          .
          <article-title>Monitoring of qualitative changes of network traffic states based on the heteroscedasticity effect</article-title>
          ,
          <source>Application of Information and Communication Technologies</source>
          ,
          <string-name>
            <surname>AICT</surname>
          </string-name>
          <year>2016</year>
          ,
          <string-name>
            <surname>Conference</surname>
            <given-names>Proceedings</given-names>
          </string-name>
          , Baku,
          <fpage>12</fpage>
          -
          <lpage>14</lpage>
          Oct.
          <year>2016</year>
          .
          <volume>7991765</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>P. D.</given-names>
            <surname>Zegzhda</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Poltavtseva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. S.</given-names>
            <surname>Lavrov</surname>
          </string-name>
          ,
          <article-title>Systematization of cyberphysical systems and assessment of their security? Problems of information security Computer system 2 (</article-title>
          <year>2017</year>
          )
          <fpage>127</fpage>
          -
          <lpage>138</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>H.</given-names>
            <surname>Hasrouny</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Samhat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Bassil</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Laouiti</surname>
          </string-name>
          ,
          <article-title>Vanet security challenges and solutions: A survey Vehicular Communications 7 (</article-title>
          <year>2017</year>
          )
          <fpage>7</fpage>
          -
          <lpage>20</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>B.</given-names>
            <surname>Mokhtar</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Azab, Survey on security issues in vehicular adhoc networks Alexandria</article-title>
          <source>Engineering Journal</source>
          <volume>54</volume>
          (
          <issue>4</issue>
          ) (
          <year>2015</year>
          )
          <fpage>1115</fpage>
          -
          <lpage>1126</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>А. V.</given-names>
            <surname>Skatkov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Bryukhovetskiy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. V.</given-names>
            <surname>Moiseev</surname>
          </string-name>
          ,
          <article-title>Intelligent monitoring system for solving large-scale scientific tasks in cloud computing environments</article-title>
          ,
          <source>Information and control systems 2</source>
          (
          <year>2017</year>
          )
          <fpage>19</fpage>
          -
          <lpage>25</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>A. V.</given-names>
            <surname>Skatkov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Bryukhovetskiy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. V.</given-names>
            <surname>Moiseev</surname>
          </string-name>
          ,
          <article-title>Kullback measure in dynamic clustering problems of environment state observations</article-title>
          ,
          <source>Environmental monitoring systems</source>
          ,
          <volume>3</volume>
          (
          <issue>37</issue>
          ) (
          <year>2019</year>
          )
          <fpage>35</fpage>
          -
          <lpage>38</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>