V. Lakhno, Borys Husiev, A. Blozva, D. Kasatkin, T.Yu. Osypova
{"title":"CLUSTERING NETWORK ATTACK FEATURES IN INFORMATION SECURITY ANALYSIS TASKS","authors":"V. Lakhno, Borys Husiev, A. Blozva, D. Kasatkin, T.Yu. Osypova","doi":"10.28925/2663-4023.2020.9.4558","DOIUrl":"https://doi.org/10.28925/2663-4023.2020.9.4558","url":null,"abstract":"The paper proposes an algorithm with self-learning elements for intrusion detection systems, as well as an improved clustering technique which is recorded by the data system concerning information security events. The proposed approaches differ from those known using an entropy approach allowing data to be presented as homogeneous groups, moreover, each such group (or cluster) may correspond to predetermined parameters. The proposed solutions relate to the possibilities of assessing dynamic dependencies between clusters characterizing the analysed classes of invasions. The studies have found that in case of manifestation of new signs of information security events, the corresponding scale changes and describes the distances between clusters. A computational experiment was conducted to verify the operability and adequacy of the proposed solutions. During the computational experiment, it has been found that step-by-step calculation of parameters of informative characteristics of network attacks allows to form sufficiently informative cluster structures of data having characteristic attributes. These attributes further become the basis for the knowledge base of intelligent network attack detection systems. Dynamic dependencies between clusters are calculated allowing for a sufficiently accurate definition of the many information security events that can become the source data for further automatic assessment of current threats extent detected by attack detection systems. The methodology and algorithm presented in the paper for clustering the signs of network attacks, in our opinion it is simpler for software implementation than existing analogues.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128230088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ANALYSIS OF METHODS, METHODS, MECHANISMS, TOOLS THEORIES OF DECISION-MAKING FOR MODELING INFORMATION PROTECTION SYSTEM","authors":"Oleksandr Avtushenko, Vira Hyrda, Yuliia Kozhedub, Andrii Maksymets","doi":"10.28925/2663-4023.2022.16.159171","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.16.159171","url":null,"abstract":"The article presents a detailed analysis of methods, methods, mechanisms, tools of decision theory for modeling information security systems. The basic terminological concepts are given, and their detailed definition is given. The combination of elements of decision theory with information security systems is shown. The connecting link for this is probability theory. The issue of decision-making procedure as a process is studied. Emphasis is placed on the qualitative parameters of the decision-making procedure that may be suitable for information protection purposes. Analogies have been made that indicate the applicability of decision theory methods to create a model of information security system. Implementation mechanisms are shown in decision-making algorithms. With the help of decision-making theory tools, it has been established that the modeling process can be formalized since both mathematical icons and verbalization. In general, the step-by-step process of designing an information security system is described. It is concluded that formalization as a type of symbolic modeling simultaneously with the application of decision theory is the best option for the descriptive part of the information security system. Modeling has been found to be the best scientific tool for combining theoretical calculations and the practical application of a wide range of research issues, including information security. To support the decision-making of the decision-maker, in other words the offender, in the field of information protection, it is important that the security officer or system administrator has experience and skills in regulated actions. Such actions are both well-known developments in this field of activity and a synthesis of already known algorithms to achieve the state of information security in general. Automation in decision-making is possible through the introduction of a decision support system that is widely used in automated systems: computer systems and networks, especially where there is a need to analyze significant data flows.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130322286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GENERATION OF GABOR FILTERS BASED ON ATEB FUNCTIONS","authors":"M. Nazarkevich, Yaroslav Vozny","doi":"10.28925/2663-4023.2019.6.142153","DOIUrl":"https://doi.org/10.28925/2663-4023.2019.6.142153","url":null,"abstract":"","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115304432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SMARTCITY WIRELESS FENCE AND INTERACTIVE INFRASTRUCTURE MODEL","authors":"Nikita Moshenchenko, Bohdan Zhurakovskyi","doi":"10.28925/2663-4023.2021.13.6380","DOIUrl":"https://doi.org/10.28925/2663-4023.2021.13.6380","url":null,"abstract":"This article considers the problem of the process of using robots and their control in catering establishments with the help of wireless networks, shows the main features of existing solutions in the field of robotics and networks, their advantages and disadvantages. Wireless networks for their application in robot control have been studied.\u0000\u0000The main task of wireless networks is to provide high-speed local access to services and data in a certain area, the exchange of information between users within the territory.\u0000\u0000Building wireless Wi-Fi (IEEE 802.11) networks is now in high demand due to a host of benefits. Among the main advantages of this technology are the most attractive: low cost of equipment; flexibility of equipment use; high data rate.\u0000\u0000This technology provides the ability to run a number of custom applications. The infrastructure of wireless networks is the basis on which the further implementation of custom applications is built and the support of key services for the company is provided. Such services include network management, information security and service quality assurance (QoS) mechanisms.\u0000\u0000A virtual environment with the appropriate software was configured, a network simulation was performed, and its results were recorded. This solution can be used in catering establishments. It allows to introduce new technologies into the sphere of human life and increase the profits of food business owners.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115922734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Olga Borkivska, Bohdan Zhurakovskyi, Artem Platonenko
{"title":"SMART CITY INFORMATION SYSTEM BASED ON LORA TECHNOLOGYANNOTATION","authors":"Olga Borkivska, Bohdan Zhurakovskyi, Artem Platonenko","doi":"10.28925/2663-4023.2022.16.113128","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.16.113128","url":null,"abstract":"This article discusses issues related to the concept of the Internet of Things and its application to the development of the Smart City. Smart City or \"Smart City\" is a new concept for the introduction of technologies (information and communication) to manage the life of the modern city. Existing technologies for long-distance data transmission in the Internet of Things are analyzed. Based on the calculations, the justification of the efficiency of LORA technology is substantiated, the energy potential of the communication line for LORA technology is given, the capacity of the LoRa network is determined. The network architecture has the best relationship between increasing the battery life of IoT devices and providing communication range. The protocol operates in a non-licensed range, and this is its uniqueness in cost and speed of implementation. Based on the study of the experience of implementing the protocol in the city of Lviv, the advantages and problems of implementation were identified. The possibility of using the technology in large cities was assessed. Software has been developed that allows the user to check that everything in his house is in order and that there are no gas leaks, water leaks and no movement in the house. The practical use of IoT in the \"Smart City\", the use of LoRaWAN technology, the principle of the network are shown. The experience of using the LoRaWAN protocol in Ukraine has been studied and analyzed. The experience of cities on the introduction of Internet of Things technologies in the housing system is considered.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122751024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TESTING THE ORGANIZATION'S CORPORATE NETWORK FOR UNAUTHORIZED ACCESS","authors":"Ivan Tyshyk","doi":"10.28925/2663-4023.2022.18.3948","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.18.3948","url":null,"abstract":"In today's world, the number of cyber attacks is increasing every year. These attacks lead to massive loss of confidential data, disruption of critical infrastructure. The number of cyberattacks has only increased since the beginning of the pandemic and carries with it significant financial and reputational risks for any company. The work considers possible methods of testing the security of the organization's corporate network against unauthorized penetration. Simulation of testing for unauthorized access to selected information resources was carried out and possible attacks after obtaining such access were characterized.\u0000\u0000The most typical methods of exploitation of possible vulnerabilities in corporate networks are given. The Kali Linux distribution was chosen because it contains many tools for penetration testing, which allows for periodic testing of networks and nodes, as well as corporate network security audits in order to identify existing vulnerabilities, configuration flaws and close them before they can be used by attackers. During the study, it was found that each system is unique in its own way due to the use of different types of signatures and applications. Such a representation requires in-depth knowledge of attacks and system-specific documentation from the developer to configure the system itself to monitor specific applications. Conducted simulations of the process of detecting network attacks based on the Kali Linux OS utilities showed that this tool is a practical choice for a security administrator and allows him to detect threats to the information system in a timely manner and conduct effective monitoring of the operating environment in real time. Thanks to the utilities of the proposed system, on the basis of which a network attack on the object of protection is implemented, it is possible to eliminate a certain type of vulnerability of the information system or its constituent parts, which will make it impossible to implement many types of attacks. The directions of further research can be aimed at the development of network utilities to implement the protection of various types of operating systems against unauthorized interventions and their subsequent integration into the system of utilities for the appropriate operating environment, as well as to increase the effectiveness of monitoring the information system as a whole for the purpose of detecting various types of vulnerabilities on its assets , which will improve its protection against many types of network attacks.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128613589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"STRATEGY OF DETERMINATION OF THE HYPOTHETIC DIRECTION OF INCREASING THE RISK OF INFLAMMATION OF THE INFRASTRUCTURE SAFETY","authors":"Yanina Roy, N. Mazur, Olena Riabchun","doi":"10.28925/10.28925/2663-4023.2019.3.97103","DOIUrl":"https://doi.org/10.28925/10.28925/2663-4023.2019.3.97103","url":null,"abstract":"In this article, a mathematical apparatus for comparative analysis of the set of threats of state information resources (DIR) is proposed for consideration, which combines methods and approaches to assess their qualitative and quantitative indicators. The main feature of the study is that the proposed approach to solving the problem of choice does not require a complete restoration of the principle of optimality, but allows to limit only information that will be sufficient to select the \"reference sample\". The essence of the ranking procedure lies in the fact that the expert poses the threat of an IP in the order that, in his opinion, is the most rational. For each of them the expert assigns specific numbers from a natural series - ranks. In this case, the highest rank receives the threat that has the highest priority. The order scale to be obtained as a result of ranking should satisfy the condition of equality of the number of ranks of the number of ranked threats. In this case, the less complex value of the numerical value will correspond to the least dangerous threat. The essence of the method lies in the fact that the expert must put each threat considered in a certain place in accordance with the degree of availability of one or another property, or in accordance with the proposed by the same expert, the coefficient of significance. In this case, the larger value of a complex assessment corresponds to the least dangerous threat. The basic mathematical method for assessing the threat of threats from the \"general population\" of the IB classes of threats is the method of formation and research of generalized indicators (criteria), the results of complex combination of which determine the trends of qualitative growth of their significance. Methods of expert assessments are used to increase the reliability of the results of assessing the levels of potential hazards of each threat from the \"general population\" of IB threat classes. The application of the proposed method will reduce the time to assess the state of the security of information resources and will allow, firstly, to identify the most significant threats that could inflict the greatest damage to information security and, secondly, to direct them the necessary means and safeguards.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124484977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ALGORITHM FOR DETERMINING THE MEASURE OF EXISTENCE OF UNRELIABLE INFORMATION IN THE CONDITIONS OF INFORMATION CONFLICT","authors":"Tetiana Laptievа","doi":"10.28925/2663-4023.2021.14.1525","DOIUrl":"https://doi.org/10.28925/2663-4023.2021.14.1525","url":null,"abstract":"Social interaction of subjects in the modern world, in addition to positive forms, also has negative ones. One of such forms is information confrontation, the conceptual basis of which is to spread in the information space of the enemy unreliable information to influence the assessments, intentions, and orientation of the population and decision-makers. In this case, information becomes a more important resource than material or energy resources.\u0000\u0000The analysis of laws and properties of existence and distribution of information in the conditions of information confrontation is carried out. Based on the analysis of the above laws and studying the properties of information, the main features of the perception of information by the subjects are formulated. These are selectivity, attitude to certain information, authority (reputation), imaginary secrecy of receiving information. It is shown that on the basis of the formulated features of perception of information of subjects it is possible to create visibility of reliability of the information, and then no force will convince that it is specially made for the purpose of incorrect estimation, the negative orientation of the population and decision-makers.\u0000\u0000The main advantage of the proposed algorithm is that the parameters of information evaluation are used as a measure of the probability of propagation of inaccurate information. The degree of probability of dissemination of unreliable information is determined for each law of existence of information separately. The general estimation of the probability of distribution of unreliable information consists of the production of values of measures of each law in the person. Depending on the preference of a particular law for a particular type of information, the value of the measure will vary. That is, the proposed algorithm, in contrast to existing methods of evaluating information, additionally takes into account the type and class of information.\u0000\u0000The direction of further research: development of a scale of measures to assess the probability of spreading inaccurate information. Using as coefficients of the model the parameters of the developed scale of measures to assess the probability of propagation of inaccurate information. Creation of a mathematical model of distribution of unreliable information in the conditions of information confrontation.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117287958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"HOW TO CONSTRUCT CSIDH ON QUADRATIC AND TWISTED EDWARDS CURVES","authors":"A. Bessalov","doi":"10.28925/2663-4023.2022.15.148163","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.15.148163","url":null,"abstract":"In one of the famous works, an incorrect formulation and an incorrect solution of the implementation problem of the CSIDH algorithm on Edwards curves is discovered. A detailed critique of this work with a proof of the fallacy of its concept is given. Specific properties of three non-isomorphic classes of supersingular curves in the generalized Edwards form is considered: complete, quadratic, and twisted Edwards curves. Conditions for the existence of curves of all classes with the order p+1 of curves over a prime field are determined. The implementation of the CSIDH algorithm on isogenies of odd prime degrees based on the use of quadratic twist pairs of elliptic curves. To this end, the CSIDH algorithm can be construct both on complete Edwards curves with quadratic twist within this class, and on quadratic and twisted Edwards curves forming pairs of quadratic twist. In contrast to this, the authors of a well-known work are trying to prove theorems with statement about existing a solution within one class of curves with a parameter that is a square. The critical analysis of theorems, lemmas, and erroneous statements in this work is given. Theorem 2 on quadratic twist in classes of Edwards curves is proved. A modification of the CSIDH algorithm based on isogenies of quadratic and twisted Edwards curves is presented. To illustrate the correct solution of the problem, an example of Alice and Bob calculations in the secret sharing scheme according to the CSIDH algorithm is considered.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127676714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"THEORETIC NUMBER BASIC METHODS OF INFORMATION TECHNOLOGIES FOR DIAGNOSTATION OF TECHNOLOGICAL OBJECTS OF THE OIL & GAS INDUSTRY","authors":"V. Pikh, M. Bestylnyy, V. Sheketa","doi":"10.28925/2663-4023.2019.3.122133","DOIUrl":"https://doi.org/10.28925/2663-4023.2019.3.122133","url":null,"abstract":". The existing methods of formation and coding of technological data at the grass-roots levels of distributed computerized systems for diagnosing technological objects in the oil and gas industry are analyzed. Methods of processing signals are analyzed. The mathematical model of multibase spectral cosine signal transformation, with the possibility of using different theorems of numerical bases, is considered. Correlation analysis of signals can be performed on the basis of different automobile and inter-correlation functions, but the highest speed and the smallest hardware complexity are characterized by functions in the theory of the Haar numerical basis. Where it is evident that in practice the widest use has been found in the form of information converters based on an analog digital converter of various types. The research of analog digital converters has been carried out on hardware complexity as well as on time complexity. The research was carried out on single-channel analogue digital converters with source codes, the theorem of the numerical basis of Haar, Krestinson, Rademacher and unitary basis. The paper deals with the development of digital correlators and transducers where among many structures of analog digital converters the most commonly used with source codes in different theorems of numerical bases and methods of formation of source codes are identified. The structure of the analog digital converter is proposed for the use of comparators with paraphase outputs and the implementation of a logical element that excludes OR on logical elements of I-NE with paraphase inputs and are connected by inverted outputs. Thus, the proposed improvement of the structure allows to increase its speed and reduce the time complexity of transformations by 2.5 -3 times. This reduces hardware complexity by about 30%. The method and structures of the transformation of the input analog signal by the multi-base ADA of Haar-Krestenson using the comparators with paraphase outputs in discrete digital samples for diagnostics of technological objects in the oil and gas industry and further calculation in computer technology are developed.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127747093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}