V. Lakhno, V. Smolii, A. Blozva, D. Kasatkin, T.Yu. Osypova, Maksym Misiura
{"title":"MODEL OF ADAPTIVE ACCESS RIGHTS MANAGEMENT USING PETRI NETS","authors":"V. Lakhno, V. Smolii, A. Blozva, D. Kasatkin, T.Yu. Osypova, Maksym Misiura","doi":"10.28925/2663-4023.2022.15.135147","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.15.135147","url":null,"abstract":"The article describes the conceptual model of adaptive management of cybersecurity of the information and educational environment of a modern university (IOSU). Petri nets are used as a mathematical apparatus to solve the problem of adaptive management of access rights of IOS users. A simulation model is proposed and modeling in PIPE v4.3.0 package is performed. The possibility of automating the procedures of user profile adjustment to minimize or neutralize cyber threats in IOS is shown. The model of distribution of tasks of the user in computer networks of IOSU is offered. The model, in contrast to the existing ones, is based on the mathematical apparatus of Petri nets and contains variables that reduce the power of the state space. The method of access control (ICPD) has been supplemented. The additions addressed aspects of the verification of access rights, which are required by the tasks and requirements of the security policy, the degree of coherence of tasks and allowed access to the IOSU nodes. Adjusting security rules and metrics for new tasks or reallocating tasks is described in Petri net notation.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130803632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Svitlana Shevchenko, Yuliia Zhdanovа, P. Skladannyi, S. Spasiteleva
{"title":"MATHEMATICAL METHODS IN CIBERNETIC SECURITY: GRAPHS AND THEIR APPLICATION IN INFORMATION AND CYBERNETIC SECURITY","authors":"Svitlana Shevchenko, Yuliia Zhdanovа, P. Skladannyi, S. Spasiteleva","doi":"10.28925/2663-4023.2021.13.133144","DOIUrl":"https://doi.org/10.28925/2663-4023.2021.13.133144","url":null,"abstract":"This article is devoted to the problem of applying graph theory in cybersecurity systems and is an overview. Widespread penetration of mathematical methods in the development of information technology characterizes the current stage of our society. Among the mathematical methods used in information and cyber security, a large niche is graph technology. A streamlined system of special terms and symbols of graph theory allows you to easily and easily describe complex and subtle things both geometrically and algebraically. A graph is a mathematical model of a wide variety of objects, phenomena, and the relationships between them. This justifies the choice and relevance of this study. The article outlines the main elements of graph theory, the wide scope of their implementation and provides a historical perspective on the development of this theory. The analysis of scientific works allowed to determine the main directions of application of properties, characteristics of graphs and graph algorithms in information and cyber security. Among them are studies related to the use of graphs in information systems and programming; with modeling, analysis and application of attack graphs; with cryptographic transformations; with the construction of a decision tree in decision-making tasks in conditions of risk and uncertainty. It is proved that the ability to operate with the methods of graph technologies contributes to the development of software and hardware for information protection. The considered approaches to the application of graph theory in information and cyber security can be implemented during the study of the discipline \"Special methods in security systems: discrete mathematics\" for students majoring in 125 Cybersecurity, as well as in training in research or course work or thesis. By increasing the professional orientation of training, future cybersecurity workers gain a thorough knowledge of fundamental disciplines.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127823140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DEVELOPMENT OF A METHOD FOR CALCULATING THE PROTECTION OF PERSONAL DATA FROM THE CENTRALITY OF THE NETWORK","authors":"V. Akhramovich","doi":"10.28925/2663-4023.2022.15.3552","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.15.3552","url":null,"abstract":"A mathematical model has been developed and a study of the model of personal data protection from network clustering coefficient and data transfer intensity in social networks has been carried out. Dependencies of protection of the system from the size of the system (and from the amount of personal data); information security threats from the network clustering factor. A system of linear equations is obtained, which consists of the equation: rate of change of information flow from social network security and coefficients that reflect the impact of security measures, amount of personal data, leakage rate, change of information protection from network clustering factor, its size, personal data protection. As a result of solving the system of differential equations, mathematical and graphical dependences of the indicator of personal data protection in the social network from different components are obtained. Considering three options for solving the equation near the steady state of the system, we can conclude that, based on the conditions of the ratio of dissipation and natural frequency, the attenuation of the latter to a certain value is carried out periodically, with decaying amplitude, or by exponentially decaying law. A more visual analysis of the system behavior is performed, moving from the differential form of equations to the discrete one and modeling some interval of the system existence.Mathematical and graphical dependences of the system natural frequency, oscillation period, attenuation coefficient are presented. Simulation modeling for values with deviation from the stationary position of the system is carried out. As a result of simulation, it is proved that the social network protection system is nonlinear.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115008819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Diana Tsyrkaniuk, V. Sokolov, N. Mazur, V. Kozachok, V. Astapenya
{"title":"METHOD OF MARKETPLACE LEGITIMATE USER AND ATTACKER PROFILING","authors":"Diana Tsyrkaniuk, V. Sokolov, N. Mazur, V. Kozachok, V. Astapenya","doi":"10.28925/2663-4023.2021.14.5067","DOIUrl":"https://doi.org/10.28925/2663-4023.2021.14.5067","url":null,"abstract":"The number and complexity of cybercrime are constantly growing. New types of attacks and competition are emerging. The number of systems is growing faster than new cybersecurity professionals are learning, making it increasingly difficult to track users' actions in real-time manually. E-commerce is incredibly active. Not all retailers have enough resources to maintain their online stores, so they are forced to work with intermediaries. Unique trading platforms increasingly perform the role of intermediaries with their electronic catalogs (showcases), payment and logistics services, quality control - marketplaces. The article considers the problem of protecting the personal data of marketplace users. The article aims to develop a mathematical behavior model to increase the protection of the user's data to counter fraud (antifraud). Profiling can be built in two directions: profiling a legitimate user and an attacker (profitability and scoring issues are beyond the scope of this study). User profiling is based on typical behavior, amounts, and quantities of goods, the speed of filling the electronic cart, the number of refusals and returns, etc. A proprietary model for profiling user behavior based on the Python programming language and the Scikit-learn library using the method of random forest, linear regression, and decision tree was proposed, metrics were used using an error matrix, and algorithms were evaluated. As a result of comparing the evaluation of these algorithms of three methods, the linear regression method showed the best results: A is 98.60%, P is 0.01%, R is 0.54%, F is 0.33%. 2% of violators have been correctly identified, which positively affects the protection of personal data.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124651334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MATHEMATICAL MODEL OF AUTHENTICATION OF A TRANSMITTED MESSAGE BASED ON A MCELIECE SCHEME ON SHORTED AND EXTENDED MODIFIED ELLIPTIC CODES USING UMAC MODIFIED ALGORITHM","authors":"Alla Havrylova, O. Korol, S. Milevskyi","doi":"10.28925/2663-4023.2019.5.4051","DOIUrl":"https://doi.org/10.28925/2663-4023.2019.5.4051","url":null,"abstract":"The subject of the research is a mathematical model of authentication of the transmitted message\u0000based on the McEliese scheme on shortened and elongated modified elliptic codes using the\u0000modified UMAC algorithm. The aim of this work is to develop such a scheme for the information\u0000exchange over Internet commverification and integrity of the transmitted information, taking into account the prevention of an\u0000increase in the costs of the actions taken. Tasks: analysis of existing ways to increase the\u0000resistance to hacking of transmitted messages over telecommunication networks; analysis of a\u0000message transfer scheme using blockchain technology; formalized description of a mathematical\u0000model for providing clear text authentication using a modified UMAC algorithm, as the formation\u0000of key data, a crypto-code construction (CCC) is used on the McEliese scheme on modified elliptic\u0000codes (MEС); development of data encryption and decryption algorithms using CCC based on\u0000McEliese on the MEC and UMAC algorithm. Аn approach was proposed to verify the\u0000authentication and verification of the information packet during transmission and reception via\u0000telecommunication channels, which allows using already known hashing methods to compare\u0000generated codegrams and transmitted messages for their correspondence, which increases the\u0000level of cryptographic stability of the transmitted data and the reliability of the received data. The\u0000developed schemes of algorithms for generating codеgrams and their decryption using the\u0000proposed approach make it possible to gradually demonstrate the implementation of procedures\u0000for generating codegrams and their hash codes using both shortening and lengthening the code.\u0000Further research should prove from a practical point of view the effectiveness of using this\u0000approach when transmitting a message regarding the preservation of its integrity and\u0000authenticity. Therefore, it is necessary to develop a test system that should implement the\u0000proposed approach, as well as evaluate the results obtained.unication channels, which would ensure the proper level of","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128267962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Muzhanova, S. Lehominova, Yuriy Yakymenko, I. Mordas
{"title":"TECHNOLOGIES OF USER ACTIVITIES MONITORING AND ANALYSIS IN PREVENTING INSIDER THREATS OF INFORMATION SECURITY OF AN ORGANIZATION","authors":"T. Muzhanova, S. Lehominova, Yuriy Yakymenko, I. Mordas","doi":"10.28925/2663-4023.2021.13.5062","DOIUrl":"https://doi.org/10.28925/2663-4023.2021.13.5062","url":null,"abstract":"The increase in the number of information security incidents related to personnel activities, the frequency of which has almost doubled in the last two years, has led organizations to use effective technologies that prevent and counteract internal threats to information security. An important role in this context belongs to the tools of monitoring and analysis of user activity. According to experts, in the coming years, such technologies will be implemented in 80% of solutions to identify threats and prioritize information security incidents.\u0000\u0000The article reveals the essence and analyzes the functionality of several systems that monitor and analyze employee behavior, including Data Loss Prevention (DLP), Access Control, Analysis of User Behavior and IT objects (UBA / UEBA).\u0000\u0000The authors establish that the DLP system monitors and reports on user attempts to transmit confidential information by monitoring mail and web traffic, wireless access, external storage, input/output devices, user workstation software, audio and video surveillance of its activities, etc.\u0000\u0000Access control tools perform, in particular, the functions of monitoring access and movement of a person in protected areas of the object, collecting information from surveillance cameras, keeping records of working time. In the context of a pandemic, solutions have been developed that allow identifying a person in a mask on the face, to perform the functions of monitoring health.\u0000\u0000Analysis of the functional characteristics of UBA / UEBA behavioral analytics systems showed that they not only solve the problem of collecting data from all possible available sources (software and hardware, logs, user correspondence, etc.), but also analyze the collected data and report atypical user behavior in case of its detection.\u0000\u0000The article notes that behavioral analytics is used in a number of security technologies, such as Security Information and Event Management system, Intrusion Detection and Prevention System, and others, complementing and expanding their capabilities, helping to create comprehensive information security solutions.\u0000\u0000The authors recommend organizations to use tools for monitoring and analyzing the user activities in different combinations or as part of integrated Information Security Management solutions to achieve the appropriate information security level in the face of growing threats from personnel.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129981081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"INFORMATION PROTECTION MODEL BASED ON INFORMATION SECURITY RISK ASSESSMENT FOR SMALL AND MEDIUM-SIZED BUSINESS","authors":"Svitlana Shevchenko, Yuliia Zhdanovа, Kateryna Kravchuk","doi":"10.28925/2663-4023.2021.13.158175","DOIUrl":"https://doi.org/10.28925/2663-4023.2021.13.158175","url":null,"abstract":"This study focuses on the protection of information resources on the basis of risk-oriented approach for small and medium-sized businesses with an emphasis on risk assessment of information security (IS). The analysis of scientific sources allowed to characterize the essence of the risk-oriented approach and to formulate the main provisions for creating a model of information protection based on this technology. The content line of the model focuses on conducting qualitative and quantitative IS risk assessment, namely, SWOT-analysis, statistical method, expert assessment method and Monte Carlo method. The step-by-step procedure of carrying out the stages of analysis and implementation of these methods for IS risk assessment is described. In order to obtain a comprehensive map of IS risks at the initial stage, it is proposed to conduct a SWOT analysis, in particular to identify business weaknesses and external and internal threats. Use a statistical method to quantify IS risk if there are sufficient analytical reports. Otherwise, implement the method of expert assessments. The final step is to generate a script using the Monte Carlo method. To effectively describe the context of each information resource, use the technology of forming multiple pairs \"threat - vulnerability\".\u0000\u0000The relevance and possibilities of using this model as a methodology of information for small and medium businesses are substantiated.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130026953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Serhii Smirnov, L. Polishchuk, T. Smirnova, O. K. Konoplitska-Slobodeniuk, Oleksii Smirnov
{"title":"A METHOD OF FORMING OF ANTI-VIRUS PROTECTION OF DATA IS WITH THE USE OF SAFE ROUTING OF METADATAS","authors":"Serhii Smirnov, L. Polishchuk, T. Smirnova, O. K. Konoplitska-Slobodeniuk, Oleksii Smirnov","doi":"10.28925/2663-4023.2019.3.6387","DOIUrl":"https://doi.org/10.28925/2663-4023.2019.3.6387","url":null,"abstract":"","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130088329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Gnatyuk, Vasyl Kinzeryavyy, Yuliia Polishchuk, O. Nechyporuk, Bohdan Horbakha
{"title":"ANALYSIS OF METHODS FOR DATA CONFIDENTIALITY ENSURING DURING TRANSMITTING FROM UAV","authors":"S. Gnatyuk, Vasyl Kinzeryavyy, Yuliia Polishchuk, O. Nechyporuk, Bohdan Horbakha","doi":"10.28925/2663-4023.2022.17.167186","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.17.167186","url":null,"abstract":"The rapid development of unmanned aerial vehicles (UAVs), as well as the expansion of the list of actions performed by modern UAVs, led to increased requirements for the safety and reliability of data transmission. In the context of warfare, when confidential information is collected, the protection of such information is a top priority. The practical level of conducting aerial reconnaissance during current warfare demonstrates the urgent need to create UAV which capable of performing flight tasks and aerial reconnaissance in the mode of installed radio interference, and also emphasizes the importance of ensuring the data confidentiality about target objects transmitted by an optical channel for the implementation of their processing in automated systems. The paper provides a review and comparative analysis of modern cryptoalgorithms that are used to ensure data confidentiality during their transmission by radio channel from UAV to ground objects. There are the system of criteria (multi criteria analysis) was used to compare following cryptographic algorithms (similar to AES, NESSIE, etc competitions): block and key sizes; modes of operation; encryption speed; memory requirements; resistance (security) to cryptanalysis. The conducted analysis showed that each cryptographic algorithm has advantages and disadvantages. Also, there is no universal cryptographic algorithm that capable to resolve all privacy problems in UAV. According to the limited resources in the process of UAV operation, it is necessary to create a universal set (dataset) of cryptographic algorithms that could solve various problems in different conditions including different aspects of UAV exploitation. It is these studies that will be devoted to the further work of the authors within the framework of the ongoing scientific project.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132386890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Svitlаnа Rzаiеvа, Dmуtrо Rzаiеv, V. Kraskevich, A. Roskladka, V. Gamaliy
{"title":"AUTOMATED LOGISTIC FLOW SYSTEM FOR TRADING ENTERPRISE","authors":"Svitlаnа Rzаiеvа, Dmуtrо Rzаiеv, V. Kraskevich, A. Roskladka, V. Gamaliy","doi":"10.28925/2663-4023.2020.7.7284","DOIUrl":"https://doi.org/10.28925/2663-4023.2020.7.7284","url":null,"abstract":"The article addresses one of the most pressing problems for a trading enterprise, namely the problem of routing logistics flows for efficient enterprise management. To optimize itineraries, we use state-of-the-art electronic navigation and mapping systems that can be implemented in modern computer technology, from online services available on any computer to mobile devices. Navigation and mapping systems are distributed software complexes with an array of information stored in database management systems. They involve millions of static objects and huge amounts of dynamic data around the world.\u0000To optimize the logistics flows, an algorithm for an automated routing system is described. This system solves the problems of automatic calculation of the construction and recognition of the optimal route between the specified points of its beginning and the end, tracking of movement on a given route and, in the case of congested roads, redirection of logistics flows.\u0000Based on the researches and experiments on the formation of a cognitive map in the human mind and the perception of the route description, an algorithm for storing and displaying route data is considered. This algorithm takes into account the personal psychology of perception of cartographic information. Developing an algorithm for describing the routing of trading enterprise traffic flows is creating a model of automatically found path between the predetermined points of its beginning and end. This mapping information is personalized, easy to read, fast to remember, and insensitive to user errors.\u0000The proposed algorithm is universal and can be used to solve a wide range of problems of logistic flows optimization.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126467582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}