Time filter

Source Type

Shaikhanova A.K.,Kazakh National Technical University | Zolotov A.D.,Semey State University Named after Shakarim | Muhametov E.M.,Semey State University Named after Shakarim | Karpinski M.P.,Academy of Technologies and the Humanities in Bielsko Biala | Kozhahmetova D.O.,Semey State University Named after Shakarim
Research Journal of Applied Sciences, Engineering and Technology | Year: 2015

Basic concepts of evaluation of algorithm complexity such as time and space complexity were considered by its consumption of basic computer resources. Comparative investigation of operations of binary, β and sliding window method of modular exponentiation with "left-to-right" and "right-to-left" reading bits of exponent was conducted. © Medwell Journals, 2015.


Shangytbayeva G.A.,Kazakh National Technical University | Akhmetov B.S.,Academy of Technologies and the Humanities in Bielsko Biala | Karpinski M.P.,Academy of Technologies and the Humanities in Bielsko Biala | Beysembekova R.N.,Kazakh National Technical University | Ospanov E.A.,Semey State University Named after Shakarim
Research Journal of Applied Sciences | Year: 2015

The study discusses the mathematical model of system of protection of computer networks against attacks to denial of service, allowing in practice to detect attacks such as denial of service. Grounded way to prevent attacks through the use of network reconfiguration procedures, it is difficult for practical implementation attacks such as denial of service. The algorithm to create new virtual data channels to ensure a minimum amount of traffic regardless of reconfiguring computer network. This method helps to ensure the minimum amount of traffic regardless of the reconfiguration of the network. © Medwell Journals, 2015.


Shangytbayeva G.A.,Kazakh National Technical University | Akhmetov B.S.,Kazakh National Technical University | Karpinski M.P.,Academy of Technologies and the Humanities in Bielsko Biala | Beysembekova R.N.,Kazakh National Technical University | Ospanov E.A.,Semey State University
Biosciences Biotechnology Research Asia | Year: 2015

This paper deals with the questions of computer network, attacks, threats, network attacks, "Denial of Service", DoS - attacks, DDoS - attacks, DRDoS - attacks, mathematical model. The article presents an approach to detection of the distributed network attacks to refusal in service, the offered method increases efficiency of use of the calculated resource of a computer network at the big distributed network attacks to "Denial of Service". The paper proposes a mathematical model of compromised node and the number of all possible routes that can have an admission to access points, have done a comparative characteristics of attacks DoS / DDoS / DRDoS in computer network.


Gulmira S.,Kazakh National Technical University | Mikolaj K.,Academy of Technologies and the Humanities in Bielsko Biala
Journal of Engineering and Applied Sciences | Year: 2014

The study presents approach to detection of the distributed network attacks the "Denial of Service". In study, the technique is offered is developed architecture and is constructed realization of system of detection of network attacks like "Denial of Service". The technique is based on modeling of the studied network by networks of mass service with the subsequent assessment of probability of losses of demands in a network. © Medwell Journals, 2014.

Loading Academy of Technologies and the Humanities in Bielsko Biala collaborators
Loading Academy of Technologies and the Humanities in Bielsko Biala collaborators