{"title":"Choosing an appropriate architecture to protect the information system from multi-level DDOS attacks","authors":"V. V. Borodan, D. Guy","doi":"10.31673/2409-7292.2021.013540","DOIUrl":"https://doi.org/10.31673/2409-7292.2021.013540","url":null,"abstract":"The paper examines multi-level DDoS attacks, which are a type of denial of service (DoS) attack, which aims to ban network services by failing target servers or consuming their resources, so that these servers can no longer provide services to legitimate users. DDoS attacks are divided into several classes, which include: Telnet brute force attack, SYN flood attack, ICMP flood attack, Smurf attack, Ping flood, HTTP Get Flooding request attack and HTTP Post. It is concluded that in order to create an effective information security architecture and, at the same time, effective measures to combat DDoS attacks, it is important to understand the different methods of DDoS. The architecture of information system protection against multilevel DDoS-attacks based on SDN and analysis of network traffic correlation is presented. Recommendations for protecting the information system from multi-level DDoS-attacks have been developed. It is noted that in addition to technical measures, organizations also need to implement procedural measures at the level of protection, detection and response.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133012794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Formal mathematical models for providing information security","authors":"O. Laptyev, V. Stepanenko, Yu. O. Tykhonov","doi":"10.31673/2409-7292.2019.015963","DOIUrl":"https://doi.org/10.31673/2409-7292.2019.015963","url":null,"abstract":"","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"AES-17 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114119187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information security and the human factor","authors":"Y. Maslova, I. Kushnir","doi":"10.31673/2409-7292.2020.044145","DOIUrl":"https://doi.org/10.31673/2409-7292.2020.044145","url":null,"abstract":"The article considers the problems that may arise during the implementation and operation of information security systems without proper assessment of risks and possible shortcomings of direct technical solutions. Certain aspects of implementation, the most common problems and risks that may be due to the human factor.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114201689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Threat analysis of web-applications based on REST architecture","authors":"K. Prus","doi":"10.31673/2409-7292.2022.012733","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.012733","url":null,"abstract":"The paper analyzes the problem of cybersecurity of Web-applications, defines the purpose and objectives for securing Web-applications. The analysis of vulnerabilities of Web-applications is carried out. Based on the research conducted in the work, recommendations for the use of methods for protecting Web-applications have been developed.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116392642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yu. M. Shcheblanin, O. Kurchenko, N. A. Goncharenko
{"title":"Software Development to Protect Information from Unauthorized Access","authors":"Yu. M. Shcheblanin, O. Kurchenko, N. A. Goncharenko","doi":"10.31673/2409-7292.2019.048287","DOIUrl":"https://doi.org/10.31673/2409-7292.2019.048287","url":null,"abstract":"","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"292 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116518207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Savchenko, V. Akhramovych, T. Dzyuba, S. Laptіev, M. V. Matvienko
{"title":"The method of calculating the protection of information from the interaction of users in social networks","authors":"V. Savchenko, V. Akhramovych, T. Dzyuba, S. Laptіev, M. V. Matvienko","doi":"10.31673/2409-7292.2021.010613","DOIUrl":"https://doi.org/10.31673/2409-7292.2021.010613","url":null,"abstract":"The elements of user interaction in social networks are considered: it is shown that the method of analysis of user interactions is based on assumptions when the magnitude of the influence depends on the centrality of users in the social network; the greater the consonance, the higher the nature of the influence, the interaction is a nonlinear function; it is indicated that interaction is a process that has a time interval, the linear model of protection of the information protection system from user interaction is considered; the obtained equations of protection are the equation of a harmonic oscillator with damping amplitude, the iteration of oscillations of the protection system in the pre-resonant, resonant and post-resonant zones is shown.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114660908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technology to protect the E-mail of the corporate information system from spam","authors":"M. V. Volkov, O. D. Shapovalenko","doi":"10.31673/2409-7292.2021.020304","DOIUrl":"https://doi.org/10.31673/2409-7292.2021.020304","url":null,"abstract":"A study of the impact of spam messages and modern threats to the process of e-mail exchange of corporate information system. The role of spam and its impact in corporate information systems is studied. The peculiarities of counteraction directions and technologies of providing protection of e-mail against spam are investigated. Based on the research conducted in the work, recommendations for improving the secure e-mail exchange of the corporate information system have been developed.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114789005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security problems and countermeasures against attacks in NFC","authors":"R. V. Khvorostyanyy","doi":"10.31673/2409-7292.2023.010005","DOIUrl":"https://doi.org/10.31673/2409-7292.2023.010005","url":null,"abstract":"Near Field Communication (NFC) technology is widely used due to its ease of use. However, NFC is vulnerable to security attacks such as man-in-the-middle; denial of service (DOS), etc. These attacks lead to the leakage of important user data, which can affect any organization that uses NFC applications and technologies. This article discusses NFC vulnerabilities and different types of NFC attacks. The article also discusses possible solutions that could protect NFC from these security threats.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115027257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study of the degree of security of Web applications based on the analysis of their structure and information content","authors":"O. Y. Anypchenko","doi":"10.31673/2409-7292.2022.033947","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.033947","url":null,"abstract":"The article examines the security issues of Web applications depending on their morphological structure and structure. It is shown that Web applications are one of the most vulnerable systems today. The more critical and sensitive data the software stores, the more important it becomes to control its security. The definition of user information content in the WWW, which exists, was analyzed, and it was found that it is highly specialized and mutually contradictory. A new conceptual definition of user information content is proposed - as information content that was created by website users who are not representatives of its owner organization and placed on the WWW as part of a creative, communicative, promotional or other process without prior professional editing.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131799069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ensuring cyber protection of a computer network object of information activity","authors":"A. Kotenko, M. Yasko","doi":"10.31673/2409-7292.2021.046469","DOIUrl":"https://doi.org/10.31673/2409-7292.2021.046469","url":null,"abstract":"Ways to obtain unauthorized information on computer networks and threats to cyber security in them are described. It is shown that in order to ensure reliable protection of information in computer systems, in addition to ensuring the security of information in the network, it is necessary to ensure the security of the physical environment of the computer network. It is recommended to use the recommendations of the X.805 standard to ensure the security of information on the computer network.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134260253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}