Comparative analysis of platforms for digitalization of public services

V.V. Britvina, A.С. Agostinho, G.P. Konyukhova


A comparative analysis of the technologies used in public services is presented. Based on the results of the review, conclusions are presented on the applicability of this experience in the Republic of Angola. Attention is also paid to the study of one of the main types of threats to web services and portals, especially those of a state nature. Based on the study of distributed denial of service, it is understood that developers of DDoS attack tools have flexible initialization capabilities and their design methods. This gives DDoS attacks the characteristics of uncertainty and unpredictability. As a result of these reasons, the focus falls on studying this threat in order to collect the required knowledge that will allow us to identify some patterns in scenarios and find a universal solution for prevention or forecasting. With this knowledge, you can increase the effectiveness of protection against DDoS attacks. Part of the research work is devoted to simulating a DDoS attack using the mathematical model M/M/k/n for queuing systems in order to determine the quantitative measure of its impact on the victim. The experiments conducted in this study show that the server is practically not used in its usual conditions, thus it has high availability and low average load. However, at the time of creating a large volume of false requests from an attacker, its load increases dramatically and, thus, leads to a decrease in availability. An example of using T. Saati's method to select a priority object from the selected alternatives is shown. The results of the experiment make it possible to predict the damage from a DDoS attack with varying degrees of intensity and, based on the values obtained, apply protective measures in the process of developing a web portal.

Full Text:

PDF (Russian)


A.C. Agostinho, V.V. Britvina, G.P. Konyukhovaa, A. V. Gavrilyuk, and G. E. Nurgazina “Development of a management model for public services on digital platforms in the Republic of Angola”, Proc. SPIE, p. 12564, 2023.

J. E. M. Diaz, “Internet of Things and Distributed Denial of Service as Risk Factors in Information Security,” IntechOpen, p. 368, 2020.

K. V. Pitelinsky, N. V. Fedorov, A. I. Chaichits and O. A. Shirokova. “Management of the information circuit of a university and its protection using biometric identification: some methods and means,” Issues of information security, No. 1 (128), p. 19-29, 2020. [rus]

A. Bala, Y. Osais, “Modelling and simulation of DDOS Attack using SimEvents”, International Journal of Scientific Research in Network Security and Communication, no. 1, p. 2321-2321, 2020.

L. Kleinrock, “The Theory of Queuing”, Moscow, Mechanical Engi-neering. 1979. [rus]

V.V. Lokotchenko, “Comparison of network monitoring systems” In Research of young scientists: materials of the VIII International. scientific conf., Kazan: Young scientist, p. 4-7, 2020. [rus]

K.V. Pitelinsky, N.V. Fedorov, S.O. Makovey, M.P. Sigida. “On the clustering of bionic robots by their functionality using machine learn-ing methods,” Defense Complex for Scientific and Technical Progress of Russia, No. 4, p. 39-49, 2021. [rus]

E. W. Lubua, A. A. Semlambo and C. G Mkude. “Factors Affecting the Security of Information Systems in Africa: A Literature Review” University of Dar es Salaam Library Journal, vol. 17, no. 2, p. 94-114, 2023.


  • There are currently no refbacks.

Abava  Кибербезопасность MoNeTec 2024

ISSN: 2307-8162