distributed systems

METHODOLOGY FOR COMPARATIVE ANALYSIS OF MAXIMAL EXTRACTABLE VALUE (MEV) IN DECENTRALIZED EXCHANGE PROTOCOLS

The development of smart contracts in blockchain networks has enabled the creation of sophisticated decentralized finance (DeFi) protocols, encompassing decentralized exchanges, lending platforms, and algorithmic crypto-assets. Despite decentralization and transparency, blockchain networks do not guarantee a predictable transaction execution order, leading to the emergence of the phenomenon known as Maximal Extractable Value (MEV) – an additional profit extracted by certain network participants who influence transaction ordering.

FEATURES OF ON-SITE CALIBRATION OF MEASUREMENT CHANNELS IN DISTRIBUTED SYSTEMS

This paper substantiates an approach to performing calibration procedures for measurement channels on-site in distributed cyber-physical systems. A conceptual model of a local metrological supervision system is proposed, which provides calibration considering real operating conditions. Special attention is paid to the use of code-controlled measures to generate reference signals and a centralized module for remote control, data processing, and storage.

Real-time Anomaly Detection in Distributed Iot Systems:a Comprehensive Review and Comparative Analysis

The rapid expansion of the Internet of Things (IoT) has resulted in a substantial increase of diverse data from distributed devices. This extensive data stream makes it increasingly important to implement robust and efficient real-time anomaly detection techniques that can promptly alert about issues before they could escalate into critical system failures.

HYBRID MODEL OF NETWORK ANOMALIES DETECTION USING MACHINE LEARNING

The increasing complexity of cyber threats requires the development of effective methods for detecting and classifying attacks in network traffic. This study analyzes the effectiveness of three popular machine learning algorithms: Random Forest, which is used for anomaly detection, Support Vector Machines (SVM), which performs cyber threat classification, and autoencoders, which are used for data preprocessing and deep traffic analysis.

ANALYSIS OF METHODS AND TOOLS FOR DESIGNING EMBEDDED SYSTEMS OF THE INTERNET OF THINGS

The article analyzes the methods and tools for designing embedded Internet of Things (IoT) systems. The main stages of developing IoT systems are considered, the main design approaches are compared, and their advantages and limitations are identified. The analysis of hardware platforms, their characteristics, performance, energy efficiency, and applications in various fields is conducted. Considered Software tools and their effectiveness in developing IoT solutions.

COMPREHENSIVE APPROACH TO PROTECTING DATA AND THE INFORMATION SYSTEM INTEGRITY

The article discusses key information security principles, focusing on confidentiality, integrity, availability, traceability, and the DIE model (Distributed, Immutable, Ephemeral). Confidentiality emphasizes the importance of secrecy and controlling access to prevent sensitive information from misappropriation. Integrity ensures that data remains accurate and trustworthy, with measures to prevent unauthorized modifications.

DEVELOPMENT OF A MODEL OF A CYBER THREATS DETECTION SYSTEM WITH SUPPORT AND UPDATE OF ATTACK DETECTION RULES

The article addresses the issue of data protection in information and communication systems amid the growing volume of traffic and the increasing number of cyber threats, necessitating improvements in the effectiveness of intrusion detection and prevention systems. Various types of Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS), their advantages, and disadvantages are considered. The methods of threat detection are analyzed, including signature-based methods, anomaly detection methods, and machine learning-based methods.

DEVELOPMENT OF A PLATFORM FOR RESEARCHING AUTOMATIC CONTAINER SCALING AND LOAD BALANCING IN DISTRIBUTED SYSTEMS

Quality of Service (QoS) is identified as a key task for distributed systems because meeting user needs is an important aspect of their successful functioning. Most container autoscaling solutions focus on resource optimization and cost management. However, these solutions often do not consider the dynamic user requirements for Quality of Service (QoS), resulting in delays in resource allocation and a decrease in service quality. Existing autoscaling and load balancing algorithms inadequately account for load dynamics, which is a significant issue.

Distributed Transactions in Microservice Architecture: Informed Decision-making Strategies

The emergence of microservice architecture has revolutionized software development practices by decentralizing components, facilitating scalability, and enabling agility in system design and deployment. There are some benefits of incorporating microservices instead of a single server, however, distributed components introduce extra constraints and complexities in maintaining data consistency as well. As microservices interact independently, coordinating data updates across multiple services becomes challenging, particularly in scenarios where transactional integrity is required.

Domination in linear fractional-order distributed systems

This paper investigates the notion of domination in linear fractional-order distributed systems in a finite-dimensional state.  The objective is to compare or classify the input operators with respect to the output ones, and we present the characterization and property results of this concept.  Then, we examine the relationship between controllability and the notion of domination.  Finally, we provide a numerical example to illustrate our results.