METHOD OF DETECTING SIGNALS OF SILENT INFORMATION RECEIVING MEANS BASED ON THEIR DIFFERENTIAL TRANSFORMATIONS AND APPROXIMATION
DOI:
https://doi.org/10.31891/2219-9365-2024-78-21Keywords:
differential transformations, approximation, method, resonance nodes, T-spectrumAbstract
Life in modern society in recent years is impossible to imagine without the information and technical means that are used. People cannot imagine their existence without "smart" devices. The growing value of information leads to the growing importance of its preservation and protection. As the importance and value of information grows, so does the importance of its protection. In our time, information is sold and bought, and therefore any loss of information or its leakage is a material loss.
Leakage of information from a technical channel means the uncontrolled spread of information from a protected information carrier through the physical environment to a technical device that intercepts the information.
According to existing research, about three-quarters of companies and government agencies have experienced industrial espionage. At the same time, criminals secretly obtain up to 90 percent of information using technical means.
Means of reception and transmission of intercepted information have taken a significant step in their development over the past few years. Many automated detection systems for these tools are simply unable to detect them with acceptable probability. Devices for transmitting information using the latest devices and algorithms are actively developing. Devices with the accumulation of intercepted information, its further compression and extremely short transmission time began to be used especially actively. The most dangerous direction in the development of such tools is the direction where they use legal channels of communication.
Thus, there is an important problem: to distinguish between a legitimate device that works as intended, and a device that is used to covertly obtain information. Therefore, the development of methods and techniques for detecting the means of secretly obtaining information is relevant.
The article deals with the issue of detecting the signals of means of secretly obtaining information, which use radio channels to transmit intercepted information.
The novelty of the method consists in the combination of two methods: the method of differential transformations and the method of approximation of the spectral function based on the transfer functions of second-order resonant nodes. Signals of means of covert information acquisition can be approximated by means of differential Taylor transformations, while the obtained differential images are also differential T-spectra.
To detect signals from the means of tacitly obtaining information, it is proposed to use the Taylor differential transformation method in the first step to obtain the signal spectrum, and in the second step, in order to obtain signal components, it is proposed to use the spectral function approximation method based on the transfer functions of second-order resonant nodes.
With the help of the MATLAB numerical analysis application program, a simulation was carried out, in which the function of the signal from the means of tacitly obtaining information is approximated in an exponential form. The analysis of the obtained graphical results confirms the reliability of the proposed method.