Languages

Evgeny Tumoyan

 Evgeny Tumoyan
 

 Associated professor of

the
Department of Security in Data Processing Technologies

 

 

Research interests

Research interests are closely connected with formal modeling of computer network attacks. Computer attacks and software vulnerability exploitation are the most serious threats to computer systems and networks. A lot of works in this area is concentrated on development of attack detection methods, but not on their research and formalization. Therefore the development of formal model of remote network attacks is promising.This model should cover all stages of an attack, attacker’s goals, his or her candidate actions and also attack’s results.The development of the model includes:

  • formalization of probable attack goals and criteria of its success;
  • development of formal model of network attack stages with goals and implementation mechanisms on each stage;
  • development of methods for formal model handling;
  • development of software for implementation of theoretical results.

These problems can be solved with combination of artificial neural networks and probabilistic systems, such as probabilistic suffix trees and hidden Markov models. Design of such hybrid models is not sufficiently investigated sphere of mathematical simulation. There are no theorems that could estimate applicability of such models and even definitions of basic operations for them.

Evgeny Tumoyan is the author of 32 research papers, 2 teaching papers and a patent.  His primary works are devoted to application of neural networks to diametric identification, pattern recognition, as well as their application in cryptography.

Links

Neural networks vs NUSHU 

Publications

  • Galushkin, A.I. Neurocomputer processing of the images in the task of tuberculosis contageons identification / A.I. Galushkin, V.S. Zlobin, S.V.Korobkova, E.I.Rjabtsev, N.S.Tomashevich, E.P.Tumoian // Neural Information Processing,  Proc. 9th International Conference ICONIP '02, 2002. – Vol. 4. – P. 2029 – 2032.
  • Makarevich,O. B. Approach for voice password conversion into cryptographic keys using neural networks [Text]/ O. B. Makarevich, L.K. Babenko, E.P. Tumoyan// Proc.  IEEE Conference AIS’04 and CAD-2004. – 2004. – P. 61-66.
  • Makarevich,O. Biometrical cryptography: Approach for biometrical parameters conversion into cryptographic keys [Text]/ O. B. Makarevich, L.K. Babenko, E.P. Tumoyan // Proc. International Scientific Workshop «High-performance computing systems». –
    2004. – P. 214 - 218.
  • Tumoian,E. Network Based Detection of Passive Covert Channels in TCP/IP [Text]/E.Tumoian, M. Anikeev // Proc. IEEE Conference on Local Computer Networks 30th Anniversary (LC"5). – Sydney, 2005. – P. 802-809.