Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Andrei Vladyko is active.

Publication


Featured researches published by Andrei Vladyko.


International Conference on Next Generation Wired/Wireless Networking | 2016

Fuzzy Model of Dynamic Traffic Management in Software-Defined Mobile Networks

Andrei Vladyko; Ivan Letenko; Anton Lezhepekov; Mikhail Buinevich

Nowadays, in mobile networks, latency-sensitive services may compete for the bandwidth of other services, thus degrading overall performance. Software-defined mobile networks opening many new possibilities for dynamic traffic management. This gives chances to ensure strict requirements of the service quality in changing conditions. We considered two requirements for the quality of service: bandwidth and latency. Providing the required bandwidth is relatively simple compared to the end-to-end delay, as its guarantee requires a complex model that takes into account the mutual influence of flows throughout the entire path. Our model includes the following metrics: maximum channel utilization, traffic priority, the number of “hops”. Fuzzy balancer module has been developed for the Floodlight controller in Java. This module calculates the weights of the links in accordance with the proposed method. Simulation network was held in Mininet environment. During the experimental implementation, it has been shown that simple algorithm based on mathematical apparatus of fuzzy logic allows dynamically adapting the network to the change of the traffic volume, as well as its structure.


international conference on advanced communication technology | 2016

The life cycle of vulnerabilities in the representations of software for telecommunication devices

Mikhail Buinevich; Konstantin Izrailov; Andrei Vladyko

This article investigates the problem of search for software vulnerabilities in terms of their life cycle. Each point life of vulnerability determined by the state of software with form and content - software representation. A typical sequence of representations in the field of telecommunication devices is given. Description prototype of software tool for Methodological Support System for Development of Safe Software is given.


international conference on advanced communication technology | 2015

Method for partial recovering source code of telecommunication devices for vulnerability search

Mikhail Buinevich; Konstantin Izrailov; Andrei Vladyko

The article describes a automated method for searching of low level and medium level vulnerabilities in machine code, which is based on its partial recovering. Vulnerability search is positioned in the field of telecommunication devices. Typical vulnerabilities in source code and algorithms for its search is given. There is forecast to develop methods and utilities in the near future.


international conference on advanced communication technology | 2016

Method and prototype of utility for partial recovering source code for low-level and medium-level vulnerability search

Mikhail Buinevich; Konstantin Izrailov; Andrei Vladyko

The article describes a automated method for searching of low-level and medium-level vulnerabilities in machine code, which is based on its partial recovering. Vulnerability search is positioned in the field of telecommunication devices. All various and typical vulnerabilities in source code and algorithms for its search is given. The article contains examples of usage method and its utility. There is forecast to develop methods and utilities in the near future.


international conference on advanced communication technology | 2017

Testing of utilities for finding vulnerabilities in the machine code of telecommunication devices

Mikhail Buinevich; Konstantin Izrailov; Andrei Vladyko

The article is devoted to the authors machine code algorithmization utility to find vulnerabilities in telecommunication devices. The utility is compared with its closest analogue — the IDA Pro software and its plug-in — Hex-Rays. The paper presents the key tests that are used for such comparison and the results of software tools operation for them. The formalized outcome of the comparative analysis justifies the advantages of the authors utility for solving this task.


2017 Systems of Signal Synchronization, Generating and Processing in Telecommunications (SINKHROINFO) | 2017

Centralized control of traffic flows in wireless LANs based on the SDN concept

Aleksey Amelyanovich; Mikhail Shpakov; Ammar Muthanna; Mikhail Buinevich; Andrei Vladyko

The paper proposes to use a solution based on software-defined networks (SDN) to control traffic flows in wireless local area networks (Wi-Fi). The paper examines the testing methods for a software-configurable wireless local area network based on the model network of the St. Petersburg State University of Telecommunications. Classify traffic based on DSCP values in the IP-headers of packets. After classification, traffic will be given priority over the OpenFlow port of the switch. This method allows for end-to-end quality support and support for traffic classification when interworking. In the course of practical experiment, the interaction of access points (AP), which are emulated in Mininet with the SDN controller, is considered. When using the OpenDaylight controller, the network topology can be controlled through the user-friendly graphical interface (GUI) of the SDN. As a result, methods were examined using DSCP values for QoS management in SDN networks.


international conference on advanced communication technology | 2018

Metric of vulnerability at the base of the life cycle of software representations

Mikhail Buinevich; Konstantin Izrailov; Andrei Vladyko


international conference on advanced communication technology | 2018

Combine method of forecasting VANET cybersecurity for application of high priority way

Mikhail Buinevich; Konstantin Izrailov; Ekaterina Stolyarova; Andrei Vladyko


ieee conference of russian young researchers in electrical and electronic engineering | 2018

VANET/ITS cybersecurity threats: Analysis, categorization and forecasting

Ekaterina Stolyarova; Denis M. Shiryaev; Andrei Vladyko; Mikhail Buinevich


ieee conference of russian young researchers in electrical and electronic engineering | 2017

High-level vulnerabilities of software-defined networking in the context of telecommunication network evolution

Daria Mostovich; Pavel Fabrikantov; Andrei Vladyko; Mikhail Buinevich

Collaboration


Dive into the Andrei Vladyko's collaboration.

Top Co-Authors

Avatar

Mikhail Buinevich

St. Petersburg State University of Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Konstantin Izrailov

St. Petersburg State University of Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Anton Lezhepekov

St. Petersburg State University of Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Ekaterina Stolyarova

St. Petersburg State University of Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Ivan Letenko

St. Petersburg State University of Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Aleksey Amelyanovich

St. Petersburg State University of Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Ammar Muthanna

St. Petersburg State University of Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Daria Mostovich

St. Petersburg State University of Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Denis M. Shiryaev

St. Petersburg State University of Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Mikhail Shpakov

St. Petersburg State University of Telecommunications

View shared research outputs
Researchain Logo
Decentralizing Knowledge