Education of the republic of uzbekistan tashkent state technical university named after islam karimov


Electrical and Computer Engineering



Download 17,18 Mb.
Pdf ko'rish
bet182/276
Sana22.07.2022
Hajmi17,18 Mb.
#840106
1   ...   178   179   180   181   182   183   184   185   ...   276
Bog'liq
Сборник журналя Техника Инновэйшн

Electrical and Computer Engineering
187 
𝐴
𝑟
and the rejection rate 
𝑅
𝑟
. The result of the fuzzy system is the computed rate 
𝐶
𝑟
, which 
characterizes the rate of rejection and acceptance in packet traffic and is described by three 
fuzzy variables, including High Rejection, Equal, and High Accept [15]. Figure 1.4 shows 
packet filtering rules flowcharts (Second level). 
Ar = high;
Rr = low 
Ar; Rr;Cr
START
Yes
Cr = high 
acceptance
Ar = high;
Rr = low 
Ar = high;
Rr = low 
Ar = high;
Rr = low 
Cr = equal
Cr = equal
Cr = high 
deviation
Yes
Yes
Yes
END
No
No
No
No
Figure 1.4. Packet Filtering Rules Flowcharts (Second Level) 
 
The output fuzzy values are then defuzzied to generate a clear value for the variable. 
Here, if 
𝐶
𝑟
= high acceptance, then all rules for which there is a permission action are reordered 
and moved to the top of the ACL with the highest priority to execute. Otherwise, if 
𝐶
𝑟
= high 
rejection, then all rules that have a reject action are moved to the beginning of the ACL, taking 
the highest priority for execution and, as a consequence, rules that have an accept action 
stabilize at the end of the ACL. 
CONCLUSION.
Thus, the proposed model has the ability to change the actions of the 
rules in two levels: at the first level, the action of the rule can be changed in accordance with 
the behavior of traffic based on the layer of risk; in the second level, the sequence of rules can 
be dynamically changed to reflect the highest priority of the rules based on the acceptance and 
rejection of packets. 
References 
[1]
Zaitsev D. A. 2013 Toward the Minimal Universal Petri Net IEEE Transactions on 
Systems, Man, and Cybernetics: System P: 47–58
[2]
Gulomov Sherzod, Ganiev Abdukhalil, Vaade Viktoriya. Formalization of the business 
process security. International conference on information science and communications 
technologies applications, trends and opportunities (ICISCT). 4-6 November, 2019, 



Download 17,18 Mb.

Do'stlaringiz bilan baham:
1   ...   178   179   180   181   182   183   184   185   ...   276




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish