Yaroslav Voznyi, Mariia Nazarkevych, V. Hrytsyk, N. Lotoshynska, Bohdana Havrysh
{"title":"DESIGN OF BIOMETRIC PROTECTION AUTHENTIFICATION SYSTEM BASED ON K-AVERAGE METHOD","authors":"Yaroslav Voznyi, Mariia Nazarkevych, V. Hrytsyk, N. Lotoshynska, Bohdana Havrysh","doi":"10.28925/2663-4023.2021.12.8595","DOIUrl":"https://doi.org/10.28925/2663-4023.2021.12.8595","url":null,"abstract":"The method of biometric identification, designed to ensure the protection of confidential information, is considered. The method of classification of biometric prints by means of machine learning is offered. One of the variants of the solution of the problem of identification of biometric images on the basis of the k-means algorithm is given. Marked data samples were created for learning and testing processes. Biometric fingerprint data were used to establish identity. A new fingerprint scan that belongs to a particular person is compared to the data stored for that person. If the measurements match, the statement that the person has been identified is true. Experimental results indicate that the k-means method is a promising approach to the classification of fingerprints. The development of biometrics leads to the creation of security systems with a better degree of recognition and with fewer errors than the security system on traditional media. Machine learning was performed using a number of samples from a known biometric database, and verification / testing was performed with samples from the same database that were not included in the training data set. Biometric fingerprint data based on the freely available NIST Special Database 302 were used to establish identity, and the learning outcomes were shown. A new fingerprint scan that belongs to a particular person is compared to the data stored for that person. If the measurements match, the statement that the person has been identified is true. The machine learning system is built on a modular basis, by forming combinations of individual modules scikit-learn library in a python environment.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126553743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hennadii Hulak, V. Buriachok, P. Skladannyi, Lydia Kuzmenko
{"title":"CRYPTOVIROLOGY: SECURITY THREATS TO GUARANTEED INFORMATION SYSTEMS AND MEASURES TO COMBAT ENCRYPTION VIRUSES","authors":"Hennadii Hulak, V. Buriachok, P. Skladannyi, Lydia Kuzmenko","doi":"10.28925/2663-4023.2020.10.628","DOIUrl":"https://doi.org/10.28925/2663-4023.2020.10.628","url":null,"abstract":"This paper examines the security threats to guaranteed information systems, as well as measures to combat encryption viruses. A typical sequence of cyberattacks with information encryption using software tools to implement attacks is determined. The sequence of procedures of the WannaCry encryption part is described. The paper proposes a description of the computational complexity of encrypted data recovery problems, including methods for parallelizing the solution of cryptanalysis problems, methods used to solve problems of cryptosystem stability assessment, vulnerability search and decryption depending on basic mathematical methods. The application of distributed computing technology to solve problems of recovery of encrypted resources is described. The paper states that in modern conditions of constant development of cryptography methods with a high level of stability and their wide availability a necessary condition for improving the recovery of encrypted programs - data seekers is to create a special software security monitor and build specialized multiprocessor systems to implement cryptanalysis methods with wide access of authorized users. , from the point of view of minimizing the ratio \"cost - the result\" the most rational approach to creating specialized multiprocessor systems is to build a cluster system based on the most powerful general-purpose computers using hardware computing accelerators based on programmable logic integrated circuits to increase the effectiveness of attacks on cryptographic software tools for the implementation of attacks, it is advisable to develop technologies for active actions in cyberspace, in particular, those that provide the formation of hidden channels.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114353518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Lakhno, A. Blozva, Maksym Misiura, D. Kasatkin, B. Gusev
{"title":"MODEL OF CURRENT RISK INDICATOR OF IMPLEMENTATION OF THREATS TO INFORMATION AND COMMUNICATION SYSTEMS","authors":"V. Lakhno, A. Blozva, Maksym Misiura, D. Kasatkin, B. Gusev","doi":"10.28925/2663-4023.2020.10.113122","DOIUrl":"https://doi.org/10.28925/2663-4023.2020.10.113122","url":null,"abstract":"The article proposes a model for estimating the quantitative indicator of current risks of threats and cyber attacks on transport information and communication systems (TICS). The model differs from the existing one in taking into account the degree of impact of each threat or cyber attack within the class on the probability of an accident that occurs during cyberattacks on components of transport information and communication systems, which in many cases can be attributed to critical computer systems. It is shown that the current risks may be insignificant if all potentially dangerous parameters of transport information and communication systems are maintained within the established limits, or increase, becoming threatening, when such parameters deviate from the norm. The necessity to describe the degree of current danger of risks of threats and cyberattacks with the help of some quantitative indicator is substantiated. The value of this indicator may depend on the deviations of the parameters related to the cyber security of information and communication systems of transport. An appropriate calculation formula is proposed to determine the current risk of the threat to information and communication systems of transport. To test the proposed model, a simulation experiment was conducted, the results of which are also presented in the article. Simulation modeling was also performed to verify the adequacy of the proposed model and the algorithm for estimating the current risk indicator for components of transport information and communication systems. It is taken into account that many components of transport information and communication systems work in real time. It is shown that the proposed model takes into account the current values of information security metrics and new classes of cyber threats for transport information and communication systems.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126356623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Lakhno, Volodymyr Malukov, D. Kasatkin, A. Blozva, T. Litovchenko
{"title":"MODEL FOR SUPPORTING DECISIONS OF A GROUP OF A SMART CITY PROJECT INVESTORS, TAKING INTO CONSIDERATION MULTIFACTORIALITY","authors":"V. Lakhno, Volodymyr Malukov, D. Kasatkin, A. Blozva, T. Litovchenko","doi":"10.28925/2663-4023.2019.6.5770","DOIUrl":"https://doi.org/10.28925/2663-4023.2019.6.5770","url":null,"abstract":"Creating a multi-factor decision support model for a group of investors for Smart City development. The article describes the method of using of the mathematical decision support model in the evaluation of investment projects. The results are based on the decision of a bilinear multi-step quality game with several terminal surfaces. The model is focused on further software implementation of the decision support system (DSS) or expert system for cross-platform software products. In doing so, players control a dynamic system in multidimensional project spaces. The scientific novelty of the article is that, in contrast to the existing solutions and close to the conceptual focus of research, in the article, for the first time we consider a new class of bilinear multiplayer games. For the first time, we have proposed a solution that allows us to appropriately and correctly describe the investment processes, considering the multifactorial nature of the problem. Computational experiments were performed in MatLab to find sets, investor preferences, and their optimal financial strategies in the analysis of Smart City development projects. The results of the computational experiments confirmed the correctness and capability of the model. In terms of practical importance, the scope of investing in Smart City development projects is considered, given the multifactorial nature of the task and the potential financial strategies of investor groups. The model makes it possible to evaluate the attractiveness for the investor groups (players) of the projects being analyzed.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129265807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Banovsha Mekhdiyeva, Guluzade Rustam, L. Ivanova, Natalia Korshun, P. Skladannyi
{"title":"GETTING AND PROCESSING GEOPRODITIONAL DATA WITH MATLAB MAPPING TOOLBOX","authors":"Banovsha Mekhdiyeva, Guluzade Rustam, L. Ivanova, Natalia Korshun, P. Skladannyi","doi":"10.28925/2663-4023.2019.6.94104","DOIUrl":"https://doi.org/10.28925/2663-4023.2019.6.94104","url":null,"abstract":"The article considers the problems of providing water, necessary for the needs of the population and the national economy on a global scale and for Azerbaijan in particular. One of the means for the accumulation and storage of water are artificial reservoirs formed, as a rule, in the river valley by water-supporting structures for the accumulation and storage of water for the purpose of its use in the national economy. The main parameters of reservoirs are considered in the article, such as: volume, area of the mirror and the amplitude of fluctuations in water levels in the conditions of their operation, as well as modes of their operation, which became the basis for constructing a mathematical model of the cascade reservoir, which reliably describes the hydrological processes that take place in the reservoirs. Monitoring the status of reservoirs will allow to plan activities, simulate the situation that may arise in other reservoirs that make up the cascade, and make forecasts. The article presents a data processing model in the MATLAB application development environment, which is one of the most popular software in the world. The model is based on the method of calculating differential indices based on multispectral data. Having a large number of additions to the main program in the form of toolboxes, or sets of specialized tools, makes it possible to apply MATLAB in a wide variety of areas of programming. The Mapping Toolbox is specifically designed to leverage MATLAB's richest geospatial capabilities. This article shows how to use Mapping Toolbox tools at all stages of working - from receiving and importing into the workspace of the program, processing and further outputting results in the form of files or finished electronic maps. The task of identifying and mapping the hydrological objects that make up the cascade of reservoirs on the largest waterway in Azerbaijan - the Kura River - was chosen as an example.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116728952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SECURITY OF DATA TRANSFER TO THE INTERNET OF THINGS","authors":"Belej Olexander, Lohutova Tamara","doi":"10.28925/2663-4023.2019.6.618","DOIUrl":"https://doi.org/10.28925/2663-4023.2019.6.618","url":null,"abstract":"The article discusses the MQTT protocol for the Internet of Things and touch wireless networks, its features, applications, and specific procedures. The information elements and principles of the message owner are analyzed. This article covers topics such as secure storage of the Internet of Things, the transfer of that data through the secure interface of mobile devices and web applications. It also looks at all the key tools provided by MQTT for information security. The proposed identification of users in this article is to identify them from the Cloudant database. This application works on the Node.js server in IBM Bluemix and provides an API or RESTful that requires mobile client authentication. The mobile client access service is designed to call these two APIs in any authentication application. It is suggested to use separate authentication approaches: for the web application - on the Cloud Directory and for the mobile application - MobileFirst Client Access. However, both the web and mobile applications use the same level of application security to allow the user to access device data. To improve the security of messages, it is suggested to use a transport layer security protocol that uses different cryptographic methods. We are offered homomorphic encryption of these protocols. The transport layer security protocol increases the performance of the protocol and reduces the computational cost, but it does not apply when initially connecting to the server or when a previous session has already expired. The article presents an algorithm for the detection of weak symmetry breaking for the analysis of the chance of a recovered e-mail. A method of homomorphic encryption and authentication of users and their emails in wireless sensor networks of the Internet of Things is proposed.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120973094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SELECTION OF AGGREGATION OPERATORS FOR A MULTI-CRITERIA EVALUTION OF SUTABILITY OF TERRITORIES","authors":"S. Kuznichenko, I. Buchynska","doi":"10.28925/2663-4023.2019.6.4656","DOIUrl":"https://doi.org/10.28925/2663-4023.2019.6.4656","url":null,"abstract":"The article discusses the issues of improving the adequacy and validity of the results of the convolution of criteria evaluation into a generalized evaluation when conducting a multi-criteria analysis of the land suitability by choosing the appropriate type of aggregation operator that can be performed in the GIS environment and has the properties that allow the most complete formalization of expert knowledge about the features of this applied area. Based on the analysis of the causes of the fuzziness of information in multicriteria decision-making models, the properties that the aggregation operator must have are formulated. A comparative analysis of various aggregation operators for the construction of complex maps of the suitability of territories is carried out. The features of the execution of aggregation operators are investigated: minimum, maximum, arithmetic mean, weighted sum, OWA Yager operator. It is shown that the most justified choice is to use the OWA Yager operator with fuzzy quantifiers, which allows you to provide expert information on the acceptable form of a compromise between evalutions by individual criteria. The use a family of the RIM quantifiers to formalize the attitude of DM to risk in making decisions is proposed. An example of the use of the OWA Yager operator with fuzzy quantifiers for calculating the convolution of criteria evalutions is given. It is shown that the Yager OWA operator with fuzzy quantifiers is a universal aggregation operator, since it has the ability to implement a wide range of decision-making strategies: from minimum operator to maximum operator.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114768112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. Brzhevska, N. Dovzhenko, H. Haidur, Andriy O. Anosov
{"title":"CRITERIA FOR MONITORING THE RELIABILITY OF INFORMATION IN THE INFORMATION SPACE","authors":"Z. Brzhevska, N. Dovzhenko, H. Haidur, Andriy O. Anosov","doi":"10.28925/2663-4023.2019.5.5260","DOIUrl":"https://doi.org/10.28925/2663-4023.2019.5.5260","url":null,"abstract":"This article is about criteria of reliability of information. The validity period of the information\u0000has been determined. It is established that an important stage of selection, development of\u0000methods and mechanisms for ensuring the reliability of information is the analysis of the\u0000processes of its processing. The definition of the information reliability assessment is given, and it\u0000is also established that the complexity of the information reliability assessment is information\u0000evaluation. To assess the accuracy of information, such features as the doubtfulness of the facts\u0000presented, the emotional coloring of the content, the tone of the content in relation to an object or event, the sensational content, the hidden content. These features will be based on monitoring the\u0000reliability of information in the information space, which aims to minimize the subjectivity of\u0000peer review of the content of authors from the point of view of their influential orientation\u0000towards individuals of the information space. In order to minimize this subjectivism, the basis of\u0000evaluations is the key criteria for the reliability of information, which, unlike estimates, are\u0000largely fully measured: the criterion of balance of information, the criterion for separating facts\u0000from opinions, the criterion for the accuracy and reliability of information, the criterion for\u0000completeness of information. Thus, there is a need to create an algorithm for assessing the\u0000reliability of information in the information space, which makes it possible to investigate\u0000information resources for the impact on them, identify problems of information security in a\u0000timely manner, recommend proven solutions for use at critical sites, organize and to carry out\u0000special trainings at the state level, etc.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124900417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DEFINING REQUIREMENTS TO DEVELOP INFORMATION SECURITY CONCEPT N HYBRID THREATS CONDITIONS. PART 3","authors":"Yurii Borsukovskyi","doi":"10.28925/2663-4023.2019.5.6172","DOIUrl":"https://doi.org/10.28925/2663-4023.2019.5.6172","url":null,"abstract":"This article provides the modern cybersecurity trends directly related to aim ant tasks of criminals. It reflect the assessment of global technological risks discussed at 2020 World Economic Forum. The article covers estimations on increase on negative impact of geopolitical sharpness elements on economic potential of next generation technologies. Data fraud and cyberattacks are considered as priority key indicators at assessment of the most possible global risks, and attacks at informational infrastructure are equal to the cyberattacks risks at the rating of the most possible risks. Forecast indicates that cyberattacks are the most likely to be used as indirect conflicts between countries which look forward to expand their range on influence. In such situation the cybersecurity issues can`t stay on the second place or be the issues which should be solved at existence of direct cyber threats to the modern informational systems, IoT systems and SCADA. Obviously, we should revise the approaches to creation and development of modern informational technologies and cybersecurity issues should be considered as constituent element in development of modern informational systems from the very moment of its initiation, projecting, and on all stages of production and support. Reorientation of informational system developers to creation of new integrated platforms with cybersecurity constituent elements demands the research and implementation of new approaches to its development, as well as engagement of the world community at elaboration of relevant standards and protocols, which ensure the secure functioning of informational systems at world net. The article provides the basic requirements to constituent elements at development of concept of informational and cyber security in conditions of hybrid threats especially provides recommendations on organizational structure for informational security department and general principles to organize the activities and controls on informational and cyber protection. The article defines tasks for informational security department, provides the list of basic actions to secure information, and formulates the tasks, which should be ensured by technical infrastructure, organizational, procedural and hardware and technical actions to manage the informational security, and other principles to ensure informational security in development of concept of informational security within the hybrid threats conditions.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125366163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"METHOD OF PROTECTION OF MATERIAL INFORMATION CARRIED OUT BY LATENT ELEMENTS","authors":"M. Nazarkevych, Yaroslav Voznyi","doi":"10.28925/2663-4023.2019.3.2741","DOIUrl":"https://doi.org/10.28925/2663-4023.2019.3.2741","url":null,"abstract":"The method of protection of latent elements for the printed documents at the stage of preprint preparation with the further withdrawal of printing forms and prints is developed. The choice of the minimum thickness of lines for the offset printing method is substantiated. The measurements of the relative size of the raster point, optical light shrinkage when printed on different papers are studied using the Sheberstov-Murray-Davis formula. The study of the properties of fifteen paper models used for printing and their densitometric indices, which influence the quality of printing, are shown. The comparison of thin lines with offset printing and office equipment, which uses the method of printing an electrophotography, is carried out. Digital protective latent elements are developed. A graphical way of protecting printed documents is created by creating hidden images when choosing high resolution lines. The method of protection is that for the protective elements, the displacement of the part of the lines of the raster is formed by half the size of the step of the raster lines. Improved latent element protection by overlaying fractal nets, which makes it possible to create graphic traps. The printing of developed protective elements on paper models has been investigated. Protective items are printed on Heidelberg offset printing machine. From the prints there are made copies which, compared with the originals, using the method of pixel comparisons of the signal-to-noise ratio, the results of comparing the originals among themselves, the originals and their copies are presented in this paper. Experimental research was conducted on the basis of the Full Pixel Comparison (PSNR) method of the original of the protective element printed on the offset machine with the original, and the original with its copy. On the basis of researches the reliability of documents is established. Also compare the originals of documents among themselves.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128025419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}