<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3.dtd">
<article article-type="research-article" dtd-version="1.3" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="ru"><front><journal-meta><journal-id journal-id-type="publisher-id">tuzsut</journal-id><journal-title-group><journal-title xml:lang="ru">Труды учебных заведений связи</journal-title><trans-title-group xml:lang="en"><trans-title>Proceedings of Telecommunication Universities</trans-title></trans-title-group></journal-title-group><issn pub-type="ppub">1813-324X</issn><issn pub-type="epub">2712-8830</issn><publisher><publisher-name>СПбГУТ</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="doi">10.31854/1813-324X-2021-7-1-132-140</article-id><article-id custom-type="elpub" pub-id-type="custom">tuzsut-159</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research Article</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="ru"><subject>ТРУДЫ МОЛОДЫХ УЧЕНЫХ</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="en"><subject>YOUNG SCHOLARS RESEARCH</subject></subj-group></article-categories><title-group><article-title>Программная методика оценки эффективности аппаратного состава серверов системы глубокой инспекции пакетов с использованием модернизированного метода Хука ‒ Дживса</article-title><trans-title-group xml:lang="en"><trans-title>Software Methodology for Estimating the Efficiency of the Hardware Composition  of Deep Packet Inspection System Using  the Modernized Hooke ‒ Jeeves Method</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-3226-927X</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Фицов</surname><given-names>В. В.</given-names></name><name name-style="western" xml:lang="en"><surname>Fitsov</surname><given-names>V.</given-names></name></name-alternatives><xref ref-type="aff" rid="aff-1"/></contrib></contrib-group><aff-alternatives id="aff-1"><aff xml:lang="ru">Санкт-Петербургский государственный университет телекоммуникаций им. проф. М.А. Бонч-Бруевича<country>Россия</country></aff><aff xml:lang="en">The Bonch-Bruevich Saint-Petersburg State University of Telecommunications<country>Russian Federation</country></aff></aff-alternatives><pub-date pub-type="collection"><year>2021</year></pub-date><pub-date pub-type="epub"><day>18</day><month>04</month><year>2021</year></pub-date><volume>7</volume><issue>1</issue><fpage>132</fpage><lpage>140</lpage><permissions><copyright-statement>Copyright &amp;#x00A9; Фицов В.В., 2021</copyright-statement><copyright-year>2021</copyright-year><copyright-holder xml:lang="ru">Фицов В.В.</copyright-holder><copyright-holder xml:lang="en">Fitsov V.</copyright-holder><license license-type="creative-commons-attribution" xlink:href="https://creativecommons.org/licenses/by/4.0/" xlink:type="simple"><license-p>This work is licensed under a Creative Commons Attribution 4.0 License.</license-p></license></permissions><self-uri xlink:href="https://tuzs.sut.ru/jour/article/view/159">https://tuzs.sut.ru/jour/article/view/159</self-uri><abstract><p> Системы глубокой инспекции пакетов на сетях связи используются для распознавания приложения порождающего конкретный поток трафика. Вопросы, связанные с моделированием и проектированием систем глубокой инспекции пакетов, остаются малоизученными. В данной работе приводится программная методика оценки эффективности аппаратного состава серверов системы глубокой инспекции пакетов, использующая математическую модель такой системы и методы программного поиска. Дается описание программного поиска методом максимального элемента и методом Хука ‒ Дживса. Предложена модернизация метода Хука ‒ Дживса для монотонно убывающей функции. Проведено сравнение методов по числу шагов поиска. </p></abstract><trans-abstract xml:lang="en"><p> Deep packet inspection systems on communication networks are used to identify the application generating a specific traffic flow. The issues related to modeling and design of deep packet inspection systems remain poorly understood. In this paper, a software technique for evaluating the effectiveness of the hardware composition of the servers of the deep packet inspection system is presented, using a mathematical model of such a system and software search methods. The description of the program search by the maximum element method and the Hook-Jeeves method is given. A modernization of the Hook-Jeeves method for a monotonically decreasing function is proposed. Comparison of the methods by the number of search steps is performed. </p></trans-abstract><kwd-group xml:lang="ru"><kwd>глубокая инспекция пакетов</kwd><kwd>программный поиск</kwd><kwd>метод максимального элемента</kwd><kwd>метод Хука ‒ Дживса</kwd><kwd>математическая модель</kwd></kwd-group><kwd-group xml:lang="en"><kwd>programmatic search</kwd><kwd>maximum element method</kwd><kwd>Hooke-Jeeves method</kwd><kwd>mathematical model</kwd></kwd-group></article-meta></front><back><ref-list><title>References</title><ref id="cit1"><label>1</label><citation-alternatives><mixed-citation xml:lang="ru">Сенченко Ю.Л. Некоторые аспекты высокоскоростной обработки трафика // Технологии и средства связи. 2013. № 1(94). С. 52−53.</mixed-citation><mixed-citation xml:lang="en">Senchenko Yu.L. Some Aspects of High-Speed Traffic Processing. Tekhnologii i sredstva sviazi. 2013;1(94):52−53. (in Russ.)</mixed-citation></citation-alternatives></ref><ref id="cit2"><label>2</label><citation-alternatives><mixed-citation xml:lang="ru">Trammell B., Boschi E., Procissi G., Callegari C., Dorfinger P., Schatzmann D. Identifying Skype Traffic in a Large-Scale Flow Data Repository // Proceedings of the 3rd International Workshop on Traffic Monitoring and Analysis (TMA, Vienna, Austria, 27 April 2011). Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, 2011. Vol. 6613. PP. 72−85. DOI:10.1007/9783-642-20305-3_7</mixed-citation><mixed-citation xml:lang="en">Trammell B., Boschi E., Procissi G., Callegari C., Dorfinger P., Schatzmann D. Identifying Skype Traffic in a Large-Scale Flow Data Repository. Proceedings of the 3rd International Workshop on Traffic Monitoring and Analysis, TMA, 27 April 2011, Vienna, Austria. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer; 2011. vol.6613. p.72−85. DOI:10.1007/978-3-64220305-3_7</mixed-citation></citation-alternatives></ref><ref id="cit3"><label>3</label><citation-alternatives><mixed-citation xml:lang="ru">Sommer R., Feldmann A. NetFlow: Information loss or win? // Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment (IMW '02, Marseille, France, November, 2002). New York: Association for Computing Machinery, 2002. PP. 173‒174. DOI: 10.1145/637201.637226</mixed-citation><mixed-citation xml:lang="en">Sommer R., Feldmann A. NetFlow: Information loss or win? Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, IMW '02, November, 2002, Marseille, France. New York: Association for Computing Machinery; 2002. p.173‒174. DOI: 10.1145/637201.637226</mixed-citation></citation-alternatives></ref><ref id="cit4"><label>4</label><citation-alternatives><mixed-citation xml:lang="ru">Park J., Yoon S., Kim M. Software Architecture for a Lightweight Payload Signature-Based Traffic Classification System // Proceedings of the 3rd International Workshop on Traffic Monitoring and Analysis (TMA, Vienna, Austria, 27 April 2011). Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, 2011. Vol. 6613. PP. 136−149. DOI:10.1007/978-3-64220305-3_12</mixed-citation><mixed-citation xml:lang="en">Park J., Yoon S., Kim M. Software Architecture for a Lightweight Payload Signature-Based Traffic Classification System. Proceedings of the 3rd International Workshop on Traffic Monitoring and Analysis, TMA, 27 April 2011, Vienna, Austria. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer; 2011. vol.6613. p.136−149. DOI:10.1007/978-3-642-20305-3_12</mixed-citation></citation-alternatives></ref><ref id="cit5"><label>5</label><citation-alternatives><mixed-citation xml:lang="ru">Deart V., Mankov V., Krasnova I. Agglomerative Clustering of Network Traffic Based on Various Approaches to Determining the Distance Matrix // Proceedings of the 28th Conference of Open Innovations Association (FRUCT’28, Moscow, Russia, 27‒29 January 2021). IEEE, 2021. Vol. 1. PP. 81−88. DOI:10.23919/FRUCT50888.2021.9347616</mixed-citation><mixed-citation xml:lang="en">Deart V., Mankov V., Krasnova I. Agglomerative Clustering of Network Traffic Based on Various Approaches to Determining the Distance Matrix. Proceedings of the 28th Conference of Open Innovations Association, FRUCT’28, 27‒29 January 2021, Moscow, Russia. IEEE; 2021. vol.1. p.81−88. DOI:10.23919/FRUCT50888.2021.9347616</mixed-citation></citation-alternatives></ref><ref id="cit6"><label>6</label><citation-alternatives><mixed-citation xml:lang="ru">Dainotti A., Pescape A., Sansone C. Early Classification of Network Traffic through Multi-classification // Proceedings of the 3rd International Workshop on Traffic Monitoring and Analysis (TMA, Vienna, Austria, 27 April 2011). Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, 2011. Vol. 6613. PP. 122−135. DOI:10.1007/978-3-642-20305-3_11</mixed-citation><mixed-citation xml:lang="en">Dainotti A., Pescape A., Sansone C. Early Classification of Network Traffic through Multi-classification. Proceedings of the 3rd International Workshop on Traffic Monitoring and Analysis, TMA, 27 April 2011, Vienna, Austria. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer; 2011. vol.6613. p.122−135. DOI:10.1007/978-3-642-20305-3_11</mixed-citation></citation-alternatives></ref><ref id="cit7"><label>7</label><citation-alternatives><mixed-citation xml:lang="ru">Sheluhin O., Kazhemskiy M. Influence Of Fractal Dimension Statistical Charachteristics On Quality Of Network Attacks Binary Classification // Proceedings of the 28th Conference of Open Innovations Association (FRUCT’28, Moscow, Russia, 27‒ 29 January 2021). IEEE, 2021. Vol. 1. 2021. PP. 407−413. DOI:10.23919/FRUCT50888.2021.9347600</mixed-citation><mixed-citation xml:lang="en">Sheluhin O., Kazhemskiy M. Influence Of Fractal Dimension Statistical Charachteristics On Quality Of Network Attacks Binary Classification. Proceedings of the 28th Conference of Open Innovations Association, FRUCT’28, 27‒29 January 2021, Moscow, Russia. IEEE; 2021. vol.1. p.407−413. DOI:10.23919/FRUCT50888.2021.9347600</mixed-citation></citation-alternatives></ref><ref id="cit8"><label>8</label><citation-alternatives><mixed-citation xml:lang="ru">Cascarano N., Ciminiera L., Risso F. Optimizing Deep Packet Inspection for High-Speed Traffic Analysis // Journal of Network and Systems Management. 2011. Vol. 19. PP. 7−31. DOI:10.1007/s10922-010-9181-x</mixed-citation><mixed-citation xml:lang="en">Cascarano N., Ciminiera L., Risso F. Optimizing Deep Packet Inspection for High-Speed Traffic Analysis. Journal of Network and Systems Management. 2011;19:7−31. DOI:10.1007/s10922-010-9181-x</mixed-citation></citation-alternatives></ref><ref id="cit9"><label>9</label><citation-alternatives><mixed-citation xml:lang="ru">Niang B. Bandwidth management ‒ A deep packet inspection mathematical model // Proceedings of the 6th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT, St. Petersburg, Russia, 6-8 October 2014). IEEE, 2014. PP. 169−175. DOI:10.1109/ICUMT.2014.7002098</mixed-citation><mixed-citation xml:lang="en">Niang B. Bandwidth management ‒ A deep packet inspection mathematical model. Proceedings of the 6th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, ICUMT, St. Petersburg, Russia, 6-8 October 2014. IEEE; 2014. p.169−175. DOI:10.1109/ICUMT.2014.7002098</mixed-citation></citation-alternatives></ref><ref id="cit10"><label>10</label><citation-alternatives><mixed-citation xml:lang="ru">Goldstein B., Fitsov V. Dual Mathematical Model for Calculating of Deep Packet Inspection // Proceedings of the 28th Conference of Open Innovations Association (FRUCT’28, Moscow, Russia, 27‒29 January 2021). IEEE, 2021. Vol. 1. 2021. PP. 127−133. DOI:10.23919/FRUCT50888.2021.9347547</mixed-citation><mixed-citation xml:lang="en">Goldstein B., Fitsov V. Dual Mathematical Model for Calculating of Deep Packet Inspection. Proceedings of the 28th Conference of Open Innovations Association, FRUCT’28, 27‒29 January 2021, Moscow, Russia. IEEE; 2021. vol.1. p.127−133. DOI:10.23919/FRUCT50888.2021.9347547</mixed-citation></citation-alternatives></ref><ref id="cit11"><label>11</label><citation-alternatives><mixed-citation xml:lang="ru">Фицов В. Методы построения сетевых архитектур систем DPI // Вестник связи. 2020. № 12. С. 32−37.</mixed-citation><mixed-citation xml:lang="en">Fitsov V. Methods for Constructing Network Architectures of Dpi Systems. Vestnik Svyazi. 2020;12:32−37. (in Russ.)</mixed-citation></citation-alternatives></ref><ref id="cit12"><label>12</label><citation-alternatives><mixed-citation xml:lang="ru">Фицов В. Применение программного кода для оптимизации числа серверов DPI методом максимального элемента // VII Международная научно-техническая и научно-методическая конференция «Актуальные проблемы инфотелекоммуникаций в науке и образовании» (Санкт-Петербург, Россия, 28 февраля – 01 марта 2018). СПб: СПбГУТ, 2018. С. 650−656.</mixed-citation><mixed-citation xml:lang="en">Fitsov V. Employment Software Code for Optimization the Number of Dpi-Servers by Maximal Element Method. Proceedings of the VIIIth International Conference on Infotelecommunications in Science and Education, 28 February ‒ 1 March 2018, St. Petersburg, Russia. St. Petersburg: The Bonch-Bruevich Saint-Petersburg State University of Telecommunications Publ.; 2018. p.650−656. (in Russ.)</mixed-citation></citation-alternatives></ref><ref id="cit13"><label>13</label><citation-alternatives><mixed-citation xml:lang="ru">Якимович С. Управление трафиком и услугами в сетях ШПД с помощью решений DPI // Вестник связи. 2010. № 12. С. 27−29.</mixed-citation><mixed-citation xml:lang="en">Yakimovich, S. Controlling Traffic and Services in Broadband Networks Using DPI Solutions. Vestnik Svyazi. 2010;12: 27−29. (in Russ.)</mixed-citation></citation-alternatives></ref><ref id="cit14"><label>14</label><citation-alternatives><mixed-citation xml:lang="ru">Rec. ITU-T Y.2771 Framework for deep packet inspection. ITU, 2014.</mixed-citation><mixed-citation xml:lang="en">Rec. ITU-T Y.2771 Framework for deep packet inspection. ITU; 2014.</mixed-citation></citation-alternatives></ref><ref id="cit15"><label>15</label><citation-alternatives><mixed-citation xml:lang="ru">Norros I. A storage model with self-similar input // Queueing Systems. 1994. Iss. 16. PP. 387−396. DOI:10.1007/ BF01158964</mixed-citation><mixed-citation xml:lang="en">Norros I. A storage model with self-similar input. Queueing Systems. 1994;16:387−396. DOI:10.1007/ BF01158964</mixed-citation></citation-alternatives></ref><ref id="cit16"><label>16</label><citation-alternatives><mixed-citation xml:lang="ru">Овчаров Л. Прикладные задачи теории массового обслуживания. М.: Машиностроение, 1969. 324 с.</mixed-citation><mixed-citation xml:lang="en">Ovcharov L. Applied Problems of Queuing Theory. Moscow: Mashinostroenie Publ; 1969. 324 p. (in Russ.)</mixed-citation></citation-alternatives></ref><ref id="cit17"><label>17</label><citation-alternatives><mixed-citation xml:lang="ru">Hooke R., Jeeves T.A. «Direct Search» Solution of Numerical and Statistical Problems // Journal of the ACM. 1961. Vol. 8. Iss. 2. PP. 212−229. DOI:10.1145/321062.321069</mixed-citation><mixed-citation xml:lang="en">Hooke R., Jeeves T.A. «Direct Search» Solution of Numerical and Statistical Problems. Journal of the ACM. 1961;8(2): 212−229. DOI:10.1145/321062.321069</mixed-citation></citation-alternatives></ref><ref id="cit18"><label>18</label><citation-alternatives><mixed-citation xml:lang="ru">Сулимов В., Шкапов П., Носачев С. Локальный поиск методом Хука ‒ Дживса в гибридном алгоритме глобальной оптимизации // Наука и образование. 2014. № 6. С. 107−123. DOI:10.7463/0614.0716155</mixed-citation><mixed-citation xml:lang="en">Sulimov V.D., Shkapov P.M., Nosachev S.K. Hooke–Jeeves Method-used Local Search in a Hybrid Global Optimization Algorithm. Science and Education. 2014;6:107−123. DOI:10.7463/0614.0716155 (in Russ.)</mixed-citation></citation-alternatives></ref></ref-list><fn-group><fn fn-type="conflict"><p>The authors declare that there are no conflicts of interest present.</p></fn></fn-group></back></article>
