<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Exposing Deviations in Information Processes using Multifractal Analysis</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Yevhen Ivanichenko</string-name>
          <email>y.ivanichenko@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Valerii Kozachok</string-name>
          <email>v.kozachok@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yurii Dreis</string-name>
          <email>dreisyuri@gmail.com</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Olena Nesterova</string-name>
          <email>o.d.nesterova@npu.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kate Dmytriienko</string-name>
          <email>k.dmytriienko.asp@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Borys Grinchenko Kyiv University</institution>
          ,
          <addr-line>18/2 Bulvarno-Kudriavska str., Kyiv, 04053</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National Pedagogical Dragomanov University</institution>
          ,
          <addr-line>9 Pyrohova str., Kyiv, 01601</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Polissia National University</institution>
          ,
          <addr-line>7 Staryi ave., Zhytomyr, 10008</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>251</fpage>
      <lpage>259</lpage>
      <abstract>
        <p>The main requirement for modern systems of intrusion detection is the possibility of identifying deviations in information processes in order to detect unknown attack types. An overview of existing approaches to identifying network deviations based on multifractal analysis methods is given. The results of the calculation of the Hurst exponent for the time series of CPU usage for different types of user activity are presented.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Fractal analysis</kwd>
        <kwd>the Hurst exponent</kwd>
        <kwd>network deviation detection</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Signature methods of analysis used in modern intrusion detection systems aimed at identifying
known and more specific methods of attacks, appear not to be able to detect their modifications or new
types, which makes the use of such systems ineffective. Existing solutions to individual cases of
detection of network deviations to this time do not allow to develop a single universal mechanism for
detecting previously unknown attack types.</p>
      <p>
        The current task at the moment is to find more effective universal methods for detecting network
deviations that are a consequence of technical failures or unauthorized impacts. The main requirement
for these methods is the possibility of identifying arbitrary types of intruders, including distributed in
time. Statistical studies of network traffic indicate that it has the properties of fractality or
selfsimilarity, as well as the variability of these characteristics in the event of deviations in the network,
which allows the use of fractal analysis to detect attacks [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ].
      </p>
      <p>The purpose of this study is an overview of modern existing approaches to identifying network
deviations based on the method of fractal analysis.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Methods of Detecting Attacks</title>
      <p>of attacks and modifications that exist without a clear formalization of keywords of network traffic and
updating the signature database.</p>
      <p>Behavioral methods are intended to identify unknown attacks and are based on detection of
deviations from normal operation mode. Advantages of behavioral methods comprise the possibility of
analyzing the dynamics of processes and the possibility of identifying new types of attacks.
Disadvantages of behavioral methods include higher requirements for computing resources and
capacities and lower probability of detection.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Fractal Analysis</title>
      <p>The time series is a sequence of values of the studied magnitude measured at regular intervals.
The central concepts of fractal analysis are fractal dimension (D) and the Hurst exponent (H).
The fractal dimension of the set (according to Hausdorff) is determined by:</p>
      <p>D = − εl→im∞ lgl⁡[gN⁡((εε))] , (1)
where N(ε) – the minimum number of non-empty cells ε that cover a given set.</p>
      <p>The Hurst exponent characterizes the degree of similarity of the process:
1. 0 &lt;H &lt;0.5 – random process, which does not have self-similarity and is characterized by a
tendency for average value;
2. H = 0.5 – a completely random process without a pronounced tendency;
3. H&gt; 0.5 – a trend-resistant process that has a long memory and is self-similar.</p>
      <p>The fractal dimension is directly related to the Hurst exponent: D = 2 – H.</p>
      <p>
        This ratio is fair when the structure of the curve that describes the fractal function is investigated
with high resolution, that is, in the local limits. One of the popular methods of finding fractal dimension
is R / S analysis [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]:
      </p>
      <p>M [RS((nn))] ~cnH, n → ∞ (2)
where n – high resolution; с – a positive finite constant that does not depend on n; Н – the Hurst
exponent; R(n) – the scope of the time series.</p>
      <p>R(n) = 1m≤ja≤nx∆j − ⁡ 1m≤ji≤nn ∆j
∆j = ∑in=n xi − kx̅, k = ⃗1⃗⃗,⃗⃗⃗n
x̅ = n1 ∑in=1 xi</p>
      <p>S(n) = n−11 ∑in=1(xi − x̅)2</p>
    </sec>
    <sec id="sec-4">
      <title>4. Review of Existing Methods and Approaches</title>
      <p>
        In [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], a method of maximum modules of wavelet transform (MMWT) is used to detect traffic
deviations, which allows us to detect the singularity of the signal. The network traffic collected on the
boundary router of the university network was taken as the analyzed data. Each sequence is about 24
hours long with a sampling step of 1 second. Samples of "pure" traffic without attacks, and also with
various deviations are presented: at DDoS-attacks of different types of scanning. The algorithm for
estimating the parameters of the multifractal spectrum is as follows:
      </p>
      <p>The output signal f (t) is decomposed by means of a wavelet transform by the mother wavelet Ψ (t)
into the corresponding coefficients:</p>
      <p>The partition function is calculated:</p>
      <p>S(q, j) = ∑p|Wf(up, j|
For each value of q∈R it is necessary to calculate the scale indicator:
τ(q, j) = logj→0inflnS(q,j)
ln2j</p>
      <sec id="sec-4-1">
        <title>Then the multifractal spectrum fl (a), using the Legendre transformation is calculated:</title>
        <p>Wf(u, i) = (f(t), Ψu,s(t)) = 2−2j ∫ t−2u</p>
        <p>j dt
q
fl(a) = mq∈iRn[q (a + 12) − τ(q)]
For each octave j, the multifractal dimension of the order q is calculated:</p>
        <p>Dq,j = q−11 [q(a(q, j) − f(a(q), j))] (11)</p>
        <p>When q &lt;0, the value of S (q, j) depends on small maxima of the amplitude | W_f (u_p, j) |, as a
result, the calculations may not be stable.</p>
        <p>In order to avoid the emergence of false maxima of modules created by computing errors in areas
where f is almost constant, wavelet-maxima are combined in a chain to form a maximum curve
depending on the scale.</p>
        <p>If Ψ = (−1)Pθ(p), where θ = 1 e−2t2 – Gaussian function, then all lines of maxima up(j) are
√2π
determined by curves that are limited by j = 0. Therefore, all maximum lines that do not extend to the
smallest scale are deleted when calculating S (q, j).</p>
        <p>Formalizing the difference in traffic spectra with certain deviations and without them, it is possible to
compare the fractal dimensions D1, correlation dimensions D2 and intervals characterizing the “width”
of the Lezhandr spectrum for each of the implementations for each octave of decomposition of j.</p>
        <p>Information dimensions of the comparative implementations D1 are distinguished by a small stable
value and practically do not depend on the number of levels of sampling. This allows us to conclude
that the presence of long-term attacks in the signal and non-predicted activity changes the self-similar
nature of traffic, and this property can be used in the future to detect attacks.</p>
        <p>
          In [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ] it is proposed to determine the deviations, based on their identity and distribution of "heavy
tails". Network deviations may occur as a result of overloads, errors by network devices, DDOS attacks,
attempts of unauthorized access. To reduce the impact of the periodicity of network traffic on the
estimation of the Hurst exponent, the time series is divided into 24 sets of values.
        </p>
        <p>For each set, a histogram is built for 24 equal intervals. For each group there are a packet number
and the average package length for the same time intervals. At the next stage, the Hurst exponent is
calculated by the method of periodogram that use the slope of the power spectrum. The Hurst exponent
is calculated from the ratio:</p>
        <p>β − 1 = 1 − 2Н, (12)
where β -the slope of the line on a logarithmic scale.</p>
        <p>In practice, you must first analyze traffic in the regular network operation mode during the day.
When the deviation detection mode is turned on, at first the Hurst exponent is calculated and compared
with the corresponding reference value calculated in normal mode, for each parameter separately.</p>
        <p>
          In the paper [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ], an algorithm for detecting deviations based on a discrete stationary wavelet
transform and fractal dimension is used. As the first step, a time series filtering with a discrete stationary
wavelet transform is performed. This preliminary processing is necessary to increase the accuracy of
the proposed method: the main components are allocated, the details are filtered.
        </p>
        <p>The main advantage of the discrete stationary wavelet transform over a classic one is the preservation
of the time information of the output signal at each level. In the second step, the time series is bypassed
by two adjacent windows R and S. For each window, a fractal dimension is calculated according to the
algorithm:</p>
        <p>lg(da)
where L – the length of the time series, d – the distance between the first point of the series and the
farthest from it, a - the average distance between two adjacent points of the series.</p>
        <p>Changes in the statistical parameters of the signal are reflected in the fractal dimension, to account
for which the following function is introduced:</p>
        <p>Gk = |FDk+1 − FDk|, k = 1, … , n (14)
where n = number of points G.</p>
        <p>The third step is the search for local maxima G that exceed a given threshold, which are considered
as deviations from normal behavior. The accuracy of the method is significantly affected by the length
of the window. For the analyzed window of length l, the energy of the function⁡Gl⁡⁡⁡⁡ is calculated as:
2
FD =</p>
        <p>lg⁡(aL)
Gl =
∑ k|Glk|</p>
        <p>N</p>
        <sec id="sec-4-1-1">
          <title>The window length is calculated as the minimum of the standard energy function EGl.</title>
          <p>
            In [
            <xref ref-type="bibr" rid="ref5">5</xref>
            ], a method for detecting DDOS attacks is offered based on the estimation of the Hurst exponent
using the Fourier fractional transformation, which makes the transition to the frequency-time area.
          </p>
          <p>For the signal x (t) the fractional Fourier transform is determined as:</p>
          <p>Xa(u) = Fa(u) = ∫−∞∞ x(t)Ka(t, u)dt (16)
Ka(t, u) = ⁡ √1 − i ∙ cot(α) ∙ exp⁡[iπ(t2cot⁡(α) − 2ut∙ csc(α) + u2cot⁡(α))], α ≠ nπ (17)
Ka(t, u) = δ(t − u), a = (2 ∓ 1)π (18)
n ∈ Z, α = a2π (19)
where a – the order of fractional Fourier transformation, provided that a=1, then the formula changes
to the usual Fourier transformation.</p>
          <p>Using a discrete wavelet transform and a multi-scale method of analysis, we can calculate the Hurst
exponent if we analyze the expression:</p>
          <p>G(j) ↔ (2H + 1)j + constan,twhere j – scale.</p>
          <p>
            Next, the optimal selection of the range of scale intervals is made, using the method of
onedimensional weighted estimation of least squares [
            <xref ref-type="bibr" rid="ref8">8</xref>
            ].
          </p>
          <p>Experimental verification of the proposed method showed its high accuracy, which reduced the
number of false positives and omissions during the detection of the attack.</p>
          <p>It was stated that network traffic is divided into several disjoint segments. The Hurst exponent for
each segment is estimated. When the threshold values are exceeded, the traffic loses the property of
self-similarity, which is regarded as a DDoS attack. But the intensity of the DDoS attack can change,
which leads to a change in the Hurst exponent, so detection methods based on a fixed threshold require
flexibility and adaptability.</p>
          <p>This article proposes a method consisting of two stages:
1. Statistical analysis of the time series of network traffic using discrete wavelet transform and the
Schwartz information criterion to find the change point of the Hurst exponent, which signals the start
of a DDoS attack.</p>
          <p>2. Adaptive regulation of the intensity of a DDoS-attack on the basis of fuzzy logic, by analyzing
the Hurst exponent and the rate of its change. The Schwartz information criterion is based on the
maximum likelihood function for the model and can be used to detect the presence of a threshold point
by comparing the probability of a null hypothesis (no point) and an alternative (point of presence).</p>
          <p>The Hurst exponent is estimated using a discrete wavelet transform, because in practice this method
is one of the most reliable, as it is more resistant to gentle polynomial trends and noise.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. The Evaluation is Performed According to the Following Algorithm</title>
      <p>For the time series of network traffic X in real time, the wavelet coefficients d (j, k) are calculated
for each scale j and position k. Next, it is necessary to perform a detailed assessment of the dispersion
at each scale j:</p>
      <p>Sj = ∑nk=j1 d2(j, k) (20)
where nj⁡– the number of wavelet coefficients that are available in scale j</p>
      <p>We assume that a new sample of traffic is received, then the amount will be updated as follows:
nj ≠ nj + 1 (21)</p>
      <p>Sj = Sj + d2(j, nj) (22)
Estimation of variance in scale j:</p>
      <sec id="sec-5-1">
        <title>Next, the dependence of log2(εj) on scaling j is constructed and a weighted linear regression is</title>
        <p>performed for the linear section, α is calculated.You do not need to build this dependency every time
you receive a new segment of traffic, this action is performed only when necessary.</p>
        <p>Then the Hurst exponent is calculated
(23)
(24)
εj =</p>
        <p>Sj
nj
H = α+21</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>6. The Principle of Detecting Attacks</title>
      <p>Let X be a time series of normal traffic, Y is a time series of traffic with deviations, Z - a time series
of deviations, i.e. the relation Y = X + Z holds. Based on the theorems, we can conclude that regardless
of the presence of self-similarity in Z, if X is a stationary self-similar process of the second order, then
Y will still be a self-similar process. But the degree of self-similarity may change.</p>
      <sec id="sec-6-1">
        <title>Let ry, rz be autocorrelation functions X, Y, Z, respectively. Then a ‖ry − rx‖, is of interest during</title>
        <p>the attack, and ry = rx + rz. For each value of H ∈ (0.5,1] there is only one autocorrelation function
on self-similarity. Thus, we examine ‖Hy − Hx‖, where Hx⁡and Hx is an average values of the Hurst
exponents Y and X, respectively.</p>
        <p>The disadvantage of this method is that the wavelet transform coefficients and statistics based on
the Schwartz information criterion are updated at the moment when new traffic values arrive, and the
detection of the traffic self-similarity threshold will be restarted for each scale. Thus, a signal of the
change in the point of self-similarity will be given, even if this change occurred on a different scale at
the same moment.</p>
        <p>After an attack is detected, close to the detection time the traffic is divided into parts. By analyzing
the Hurst exponent and the speed of its change (the difference between the Hurst exponents of traffic
parts before and after the moment of detection), we can determine the intensity of DDoS-attack, using
the rules of fuzzy logic.</p>
        <p>Determining the point of change of traffic self-similarity by the Schwartz information criterion
which is based on the assumption that the entropy of a sequence with a variable self-similarity boundary
point is greater than the entropy of the sequence in which this point is fixed. Suppose there is a sequence
of length M. It is assumed that there is only one point of the self-similarity boundary at position 1 &lt;g
&lt;M. In order to calculate the presence and location of this point, you need to calculate the entropy of
the whole sequence, as well as parts f1 = (1, … , g) and f2 = (g + 1, … , M), compare their values and
conclude whether the point g is marginal. If the entropy of the individual parts is much less than the
entropy of the whole sequence, the point g is considered to be marginal.</p>
        <p>General scheme of attack detection is presented in Fig.1.</p>
        <p>New data of network traffic</p>
        <p>Renewal of network traffic</p>
        <p>Renewal of wavelet coefficients
No</p>
        <p>Renewal of Schwartz criterion</p>
        <p>Determination of intensity
Search of critical points</p>
        <p>Fuzzy adaptive rules
Too many boundary points?
yes</p>
        <p>Assessment of Hurst exponent</p>
        <p>and speed of action</p>
        <p>In the paper the Hurst exponents for four metrics of traffic by the iterative method in real time are
calculated. Next, the collection and normalization of the results of anomaly detection to assess the
security of network traffic is carried out.</p>
        <p>The following scheme of traffic network security assessment is proposed (Fig. 2).
Reference model of traffic</p>
        <p>Detection of deviations</p>
        <p>Assessment of security
Evaluation of Hurst exponent</p>
        <p>Statistical analysis</p>
        <p>Traffic analysis</p>
        <p>The algorithm for assessing traffic safety is divided into five stages:
1. Traffic collection.
2. Statistical analysis.
3. Assessment of the Hurst exponent Hearst index.
4. Detection of anomalies.
5. Security assessment.</p>
        <p>To reduce the impact on the normal functioning of the network, traffic is duplicated on a special
server that collects traffic. The software for collecting traffic on the server includes a hardware and
technica complex, which has excellent performance when collecting network packets.</p>
        <p>From the packets received from the router, information about the packet type is extracted, as well as
four traffic metrics: the total number of packets, the number of TCP packets, UDP packets, ARP packets
per unit of time. The Hurst exponent Hearst indices for four traffic metrics are calculated by an iterative
real-time estimation method. These values are used to detect deviations and update the normal traffic
model.</p>
        <p>The current calculated value of the Hurst exponent is compared with the value from the normal
model of traffic behavior. If the value is outside the allowable range, the traffic is considered abnormal.
A normal traffic model is built by analyzing the normal operation of the network over a period of time.</p>
        <p>The model includes a normal value of the Hurst exponent Hearst index and a confidence interval,
and can be updated when a deviation is detected.</p>
        <p>The criterion for assessing safety is the level of risk, which is calculated by the method of weighted
averages, which takes into account the results of detection of deviations from the four traffic metrics.
The level of risk provides administrators with the current state of data transmission in the network in
terms of security.</p>
        <p>Let Xn(n = 1,2,3, … ) - discrete stochastic process, and it is performed as follows:</p>
        <p>Xi(m) = m1 ∑ikm=(i−1)m+1 Xk (25)
Then X(m) is called aggregated processes Xn of the order m with autocorrelation function pm(k) of
i
the order m.</p>
        <p>The stationary in a broad sense stochastic process Xn(n = 1,2, … ) is called self-similar, provided
Xn and its aggregated processes X(m), of the order m which have the same autocorrelation functions
n
pm(k) = p(k)(m = 1,2, … ).</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>7. Algorithm for Iterative Evaluation of the Hurst Exponent</title>
      <sec id="sec-7-1">
        <title>If the stationary mode, in a broad sense, is the time series⁡⁡Хi of network traffic acquires self</title>
        <p>similarity function during the ith period of time, and its autocorrelation function satisfies:
pK = H(2H − 1)K2H−2, K → ∞ (26)
where H(0,5&lt;H&lt;1) - the Hurst exponent, which increases with increasing degree of self-similarity of
the process.</p>
      </sec>
      <sec id="sec-7-2">
        <title>As ∑ kpk → ∞ self-similar process is often called long-scale correlation. The greater is K, the</title>
        <p>more relevance a time series has . The iterative formula for calculating H:</p>
        <p>Hi+1 = √(pkk2−2Hi) ∙ 0,5, k → ∞
For a given time series Х1, … , Хn it is calculated as:
1) expected value:
2) co-variance:
3) the autocorrelation function:
μ̂= ̅X = n1 ∑in=1 Xi</p>
        <p>1
ŷk= n−k ∑in=−1k(Xi − ̅X)(Xi+k − ̅X)
p̂k= ŷk, k = 0,1, … (30)</p>
        <p>ŷ0</p>
        <p>The estimate of the autocorrelation function (p_k) serves as a replacement for p_k, then the iterative
formula for calculating H takes the form:</p>
        <p>Ĥi+1 = √(p̂kk2−2Ĥi+ Ĥi) ∙ 0.5,⁡⁡⁡⁡⁡k → ∞</p>
        <p>The results of the experiment showed that the iterative estimation of the Hurst exponent has a high
speed and accuracy and also smaller confidence intervals for normal values compared to the methods
of VarianceTime Plot. For a long-term large-scale correlation process is considered as Ĥ0= 0,5.</p>
        <sec id="sec-7-2-1">
          <title>An important condition for the execution of the iterative formula for Ĥi+1 is that k → ∞, but the</title>
          <p>results of the experiment show that at k = 1 using this formula you can get the Hurst exponent with
sufficient accuracy, reducing a significant number of calculations. In addition, the result is imperfect,
even if k is large enough, so we take k = 1, and the formula takes the simplified form:</p>
          <p>Ĥi+1 = √(p̂1+ Hi) ∙ 0,5 (32)</p>
          <p>In normal operating mode, network traffic satisfies the pattern of daytime use. To reduce the impact
of network traffic periodicity on the Hurst exponent, it is necessary to process traffic at different periods
of time.</p>
          <p>In practice, the four above-mentioned normal traffic metrics are at first calculated during the week.
Then the average weekly normal values of the Hurst exponents for four traffic metrics are calculated
for each day.</p>
          <p>After that it is necessary to use the effective method of Ketani and Gubner to calculate 98% of the
confidence intervals of the Hurst exponent (0,5 ≤ Н ≤ 0,95).</p>
          <p>It is necessary to establish the initial state of the normal traffic model. When detected in real time
mode, the value of the current calculated Hurst exponent is checked to fall into the confidence interval
of the normal traffic model for each metric. If the value falls within the confidence interval, the traffic
is considered normal, the detection result is 0, otherwise the traffic is considered with a deviation, and
the detection result is 1. In the first case it is necessary to update the Hurst exponent and the confidence
interval in the normal traffic model</p>
          <p>The method of normalized security assessment is based on the weighted average method for
accounting of all four traffic metrics. The level of risk is calculated as follows:</p>
          <p>Ftraffic = ∑i4=1 w(i) ∙ Fobs(i),⁡⁡⁡⁡⁡⁡∑i4=1 w(i) = 1
obs= {1 − all⁡packet,s2 − TCP⁡packet,s3 − udp⁡packet,s4⁡arp⁡packet}s
In order to conduct the study, software was used for fractal analysis of time series (Fig. 3).
(33)
(27)
(28)
(29)
(31)</p>
          <p>Also, a graphical image of the Hurst exponent for the time series of processor's load and user
expectations were modelled as you can see it in Fig. 4.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-8">
      <title>8. Conclusions</title>
      <p>In this review we are talking mainly about network traffic, for which numerous studies have shown
that it has the property of self-similarity, which allows us to use this fact to create a model of normal
behavior.</p>
      <p>In this article, an experiment was performed for a time series of CPU usage, the fractal properties of
which are unknown.</p>
      <p>The results show that the Hurst exponent of the time series of this parameter changes when changing
the type of user activity in a wide range, which does not allow to make a conclusion about the presence
or absence of self-similarity and makes it impossible to detect anomalies using only this method for
this parameter.</p>
    </sec>
    <sec id="sec-9">
      <title>9. References</title>
      <p>[10] Bondarenko, S., Liliya, B., Krynytska, O., Inna, G. Modelling instruments in risk management
(2019) International Journal of Civil Engineering and Technology, 10 (1), pp. 1561-1568
[11] Dobrynin, I., Radivilova, T., Maltseva, N., Ageyev, D. Use of Approaches to the Methodology of
Factor Analysis of Information Risks for the Quantitative Assessment of Information Risks Based
on the Formation of Cause-And-Effect Links (2019) 2018 International Scientific-Practical
Conference on Problems of Infocommunications Science and Technology, PIC S and T 2018
Proceedings, art. no. 8632022, pp. 229–232.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Shelukhin</surname>
            ,
            <given-names>O. I.</given-names>
          </string-name>
          <article-title>Multifractals: infocommunication applications / O. I. Shelukhin</article-title>
          . Hotline-Telecom,
          <year>2014</year>
          . 579 p.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Porshnev</surname>
            ,
            <given-names>S. V.</given-names>
          </string-name>
          <article-title>Mathematical models of information flows in high-speed backbone Internet channels: a tutorial / S. V. Porshnev</article-title>
          . Hotline-Telecom,
          <year>2016</year>
          . 233 p.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <article-title>[3] Modeling and analysis of security and risk in complex systems:</article-title>
          <source>Proceedings of the International Scientific School IABR - 2016 (St. Petersburg, October 25 - 28</source>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>D.P.</given-names>
            <surname>Zegzhda</surname>
          </string-name>
          .
          <article-title>Cybersecurity of the digital industry</article-title>
          .
          <article-title>Theory and practice of functional resistance to cyber attacks</article-title>
          . E.B.
          <string-name>
            <surname>Alexandrova</surname>
            ,
            <given-names>M.O.</given-names>
          </string-name>
          <string-name>
            <surname>Kalinin</surname>
            ,
            <given-names>A.S.</given-names>
          </string-name>
          <string-name>
            <surname>Markov</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          <string-name>
            <surname>Yu. Zhukov</surname>
            ,
            <given-names>D.V.</given-names>
          </string-name>
          <string-name>
            <surname>Ivanov</surname>
            ,
            <given-names>A.S.</given-names>
          </string-name>
          <string-name>
            <surname>Konoplev</surname>
            ,
            <given-names>D.S.</given-names>
          </string-name>
          <string-name>
            <surname>Lavrova</surname>
            ,
            <given-names>D.A.</given-names>
          </string-name>
          <string-name>
            <surname>Moskvin</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          <string-name>
            <surname>Yu</surname>
            . Pavlenko,
            <given-names>M.A.</given-names>
          </string-name>
          <string-name>
            <surname>Poltavtseva</surname>
            ,
            <given-names>N.N.</given-names>
          </string-name>
          <string-name>
            <surname>Shenets</surname>
            ,
            <given-names>A.D.</given-names>
          </string-name>
          <string-name>
            <surname>Dakhnovich</surname>
            ,
            <given-names>V.M.</given-names>
          </string-name>
          <string-name>
            <surname>Krundyshev</surname>
          </string-name>
          . - Moscow. Hotline - Telecom,
          <year>2020</year>
          . -
          <fpage>560s</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>O.Y.</given-names>
            <surname>Ruslyachenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.O.</given-names>
            <surname>Osadchuk</surname>
          </string-name>
          .
          <article-title>Discrete data transfer technologies [Text] Module 3: Teaching manual for laboratory works and practical seminars. Information security and data transmission department. - Odessa: ONAT by the name of A.S</article-title>
          . Popov,
          <year>2013</year>
          . 60 p
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Bogachuk</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sokolov</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Buriachok</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          (
          <year>2018</year>
          ).
          <source>Monitoring Subsystem for Wireless Systems Based on Miniature Spectrum Analyzers</source>
          . 2018 International Scientific-Practical Conference Problems of Infocommunications. Science and
          <string-name>
            <surname>Technology (PIC S&amp;T)</surname>
          </string-name>
          .
          <source>DOI: 10</source>
          .1109/infocommst.
          <year>2018</year>
          .
          <volume>8632151</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Pereverzev</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ageyev</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <article-title>Design method access network radio over fiber (</article-title>
          <year>2013</year>
          ).
          <source>2013 12th International Conference: The Experience of Designing and Application of CAD Systems in Microelectronics, CADSM</source>
          <year>2013</year>
          ,
          <article-title>art</article-title>
          . no.
          <issue>6543268</issue>
          , pp.
          <fpage>288</fpage>
          -
          <lpage>292</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Kostrov</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <article-title>Intrusion detection systems (</article-title>
          <year>2002</year>
          ) Byte,
          <volume>8</volume>
          (
          <issue>49</issue>
          ), pp.
          <fpage>14</fpage>
          -
          <lpage>21</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Radivilova</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hassan</surname>
            ,
            <given-names>H.A.</given-names>
          </string-name>
          <article-title>Test for penetration in Wi-Fi network: Attacks on WPA2-PSK and WPA2-enterprise (</article-title>
          <year>2017</year>
          ) 2nd
          <source>International Conference on Information and Telecommunication Technologies and Radio Electronics</source>
          , UkrMiCo 2017 - Proceedings, art. no.
          <issue>8095429</issue>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>