{"title":"ADVANCED METHOD OF PROTECTION OF CONFIDENTIAL INFORMATION FROM INTERCEPTION BY HIGH-FREQUENCY IMPOSITION METHODS","authors":"L. Kriuchkova, Ivan Tsmokanych, Maksym Vovk","doi":"10.31891/csit-2021-5-2","DOIUrl":"https://doi.org/10.31891/csit-2021-5-2","url":null,"abstract":"The processes of formation of technical channels of leakage of confidential information on objects of information activity by methods of high-frequency imposition, physical essence of process of formation of dangerous signals by modulation of probing high-frequency signal by acoustic signals, conditions of formation of basic and auxiliary technical means and systems of dangerous signals are considered. As a basis for improvement, a method of blocking information interception channels by high-frequency imposition is used, in which target active noise protection signals are introduced into the medium used to supply probing oscillations, aimed at destroying informative parameters of dangerous signal with different types of carrier modulation. It is proposed to form a set of protective signals for the destruction of informative parameters of dangerous signals both on the fundamental frequency and on the combinational harmonics of the probing signal, which provides more effective protection of confidential information from interception. The parameters of effective noise protection signals, capable of destroying the informative parameters of dangerous signals of high-frequency imposition on the fundamental frequency and combinational harmonics of the probing signal, have been determined by mathematical and simulation modelling. Basic recommendations for the formation of protective signals are formulated.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129073235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"THE METHODS OF ENSURING FAULT TOLERANCE, SURVIVABILITY AND PROTECTION OF INFORMATION OF SPECIALIZED INFORMATION TECHNOLOGIES UNDER THE INFLUENCE OF MALICIOUS SOFTWARE","authors":"M. Stetsiuk, A. Kashtalian","doi":"10.31891/csit-2022-1-5","DOIUrl":"https://doi.org/10.31891/csit-2022-1-5","url":null,"abstract":"The paper examines the provision of fault tolerance, survivability and protection of IT information on the impact of malicious software and computer attacks. Each method is presented separately by its steps. The states of hardware and software on which the implemented methods are impelled in the corresponding systems are investigated. The common states are singled out and on the basis of them and together with the steps of the methods the synthesis of the method of ensuring fault tolerance, survivability and protection of IT information is carried out. It combines three developed methods. This method is represented by four generalized steps. All representations of the models are made by graphs with weight vertices, which specify either the states or steps of the methods. This representation made it possible to connect common vertices.Some methods of ensuring resilience, survivability and protection of IT information under the influence of malicious software were compared with one integrated method. Experimental studies confirm the effectiveness of both the proposed solution to ensure fault tolerance, survivability and protection of IT information and the effectiveness of the method, which combines the provision of fault tolerance, survivability and protection of IT information.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115898945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CODING DATA FLOWS METHOD FOR VIRTUAL PROFILED EQUIPMENT IN INTERDISCIPLINARY ENVIRONMENT OF LABORATORY RESEARCHING","authors":"T. Neroda","doi":"10.31891/csit-2021-5-13","DOIUrl":"https://doi.org/10.31891/csit-2021-5-13","url":null,"abstract":"In the present research an improved the technique of coding the specification from widespread software complexes for modeling and designing the subject area is proposed, which is optimized with regard to the specialization of data flows of the built scheme of learning experiment with operational access to information resources and computerized means for appraise demonstrated competencies. Stipulated hierarchy of target categories for simulation model of production stages distinguishes of structured rubrics sets, meaningful records of which represent properties and events in visualization the regular objects, guaranteeing stability of experimental scheme due to unified procedures of subject area processing and absence the arhythmization in algorithm of file format serialization. Thus, related instances of complementary objects of ramified technological map or commenting on graphic pattern the generalized simulation model of experimental scheme provide the completion accompanying hypertags of projected specification, which assure the integration of created media platform into academic information space. The adequacy of modeled data structure is confirmed by saving of user settings by API and the correctness of subject area file processing in file system according to accepted signature.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125337971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"INTELLIGENT INFORMATION TECHNOLOGY FOR OBTAINING TRUST DECISIONS BASED ON THE ONTOLOGY OF TRUST IN A HUMAN-CENTERED APPROACH","authors":"E. Manziuk","doi":"10.31891/csit-2022-1-11","DOIUrl":"https://doi.org/10.31891/csit-2022-1-11","url":null,"abstract":"The paper presents the results of research on the development of intelligent information technology for obtaining trust decisions to determine the constituent elements and the interaction between them, which together provide for obtaining trust decisions. Ethical principles based on human-centered approach have been identified, which formed the basis for the development of a set of methods for the practical implementation of certain principles. \u0000The set of developed methods to ensure certain ethical principles of trust in decisions obtained using intelligent information systems has allowed developing intelligent information technology for obtaining trust decisions. Confidence in decisions is formed by ensuring the practical implementation of ethical principles in the methods of processing input information. Information technology determines the interaction of the developed methods, which together form the trust in the decisions of the information system. The structure of formation of intelligent information technologies for obtaining trust decisions is presented, as well as the structure of interaction of components of intelligent information technologies for obtaining trust decisions. A description of ethical principles with the definition of their implementation in the structure of a set of methods is given. The set of functions which realization allows reaching application of the offered intellectual information technology is defined. \u0000The components of the concept of trust were considered within the concept of intelligent information technology. The practical application of intelligent information technology is generally seen as a complex system of interconnected structural components to solve practical problems with building ecosystems for intelligent information technology, ensuring trust at all stages of the life cycle of intelligent information technology with a chain of trust and continuity.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124216602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RESEARCH OF MACHINE LEARNING BASED METHODS FOR CYBERATTACKS DETECTION IN THE INTERNET OF THINGS INFRASTRUCTURE","authors":"K. Bobrovnikova, M. Kapustian, Dmytro Denysiuk","doi":"10.31891/csit-2021-5-15","DOIUrl":"https://doi.org/10.31891/csit-2021-5-15","url":null,"abstract":"The growing demand for IoT devices is accelerating the pace of their production. In an effort to accelerate the launch of a new device and reduce its cost, manufacturers often neglect to comply with cybersecurity requirements for these devices. The lack of security updates and transparency regarding the security status of IoT devices, as well as unsafe deployment on the Internet, makes IoT devices the target of cybercrime attacks. Quarterly reports from cybersecurity companies show a low level of security of the Internet of Things infrastructure. Considering the widespread use of IoT devices not only in the private sector but also in objects for various purposes, including critical infrastructure objects, the security of these devices and the IoT infrastructure becomes more important. \u0000 Nowadays, there are many different methods of detecting cyberattacks on the Internet of Things infrastructure. Advantages of applying the machine-based methods in comparison with signature analysis are the higher detection accuracy and fewer false positive, the possibility of detecting both anomalies and new features of attacks. However, these methods also have certain disadvantages. Among them there is the need for additional hardware resources and lower data processing speeds. The paper presents an overview of modern methods aimed at detecting cyberattacks and anomalies in the Internet of Things using machine learning methods. The main disadvantages of the known methods are the inability to detect and adaptively respond to zero-day attacks and multi-vector attacks. The latter shortcoming is the most critical, as evidenced by the constantly increasing number of cyber attacks on the Internet of Things infrastructure. A common limitation for most known approaches is the need for significant computing resources and the significant response time of cyberattack detection systems.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130821326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TECHNOLOGY OF VIRTUAL PRODUCT PROMOTION","authors":"Seshii Orekhov","doi":"10.31891/csit-2021-5-7","DOIUrl":"https://doi.org/10.31891/csit-2021-5-7","url":null,"abstract":"The results of our research over the past ten years in the field of search engine optimization on the Internet indicate the creation of a new information technology - virtual promotion. The main goal of virtual promotion is to increase the level of sales of goods or services due to technologies that exist in cyberspace. His main idea is to form a so-called market map. This is a new online sales scheme based on the customer's travel map in cyberspace. This scheme is based on the principle that you earn when you attract a new customer. Then the costs are paid by attracting new customers. That is, the more customers your web content attracts, the more you earn. Therefore, to generate income you need to use WEB services to attract potential customers. Existing product promotion techniques are constantly being improved or new ones are emerging. Therefore, the purpose of the new technology is the formation of new designs from WEB services that ensure maximum efficiency of the process of attracting new customers and retaining existing ones. At the same time it is necessary to consider classical structures of formation of marketing sales channels. We will assume that virtual promotion is an information environment where there are two channels. The first channel has the function of distributing knowledge about the product. The second is product marketing. The first channel forms the technology of information transfer (knowledge) about the product in cyberspace. It concentrates actions on transportation, storage and retrieval of information about a product or service depending on the needs of a potential buyer. Another channel is a network of websites, channel telegrams, marketplaces and video blogs. In other words, the marketing channel is formed by real firms that buy and sell information or knowledge about goods or services in cyberspace. Thus, the task is to form a map of virtual promotion, which describes the structure of the marketing channel of the product through the virtual space.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134640258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EXTENDED SOFTWARE AGING AND REJUVENATION MODEL FOR ANDROID OPERATING SYSTEM CONSIDERING DIFFERENT AGING LEVELS AND REJUVENATION PROCEDURE TYPES","authors":"V. Yakovyna, B. Uhrynovskyi","doi":"10.31891/csit-2021-5-16","DOIUrl":"https://doi.org/10.31891/csit-2021-5-16","url":null,"abstract":"A complex model based on Continuous-Time Markov Chains is proposed, which combines an extended aging and rejuvenation model taking into account different aging levels and a model of mobile device usage activity. A graph of states and transitions is constructed, which describes the proposed model without taking into account mobile device usage activity, and taking it into account. A system of Kolmogorov – Chapman differential equations is written on the basis of the states graph. A set of test simulations for conducting experimental calculations of the model and analysis of results is described. A system of differential equations for each simulation is calculated using the 4th order Runge-Kutta method. The analysis of simulations with recovery after aging-related failure and without recovery allowed to formulate the main objectives of the rejuvenation procedure in the proposed model to improve the user experience. Analysis of different rejuvenation planning strategies indicates that the most effective approach is to perform rejuvenation in the “Aging” state, when the device is already aging, but it is not yet a state with a high probability of aging-related failure. Analysis of simulations with warm and cold rejuvenation shows that this factor affects the results of the model calculation, and the application of one or another approach depends on the aging conditions and the mobile device usage activity. The developed model based on the Markov chain can be used to predict the optimal time of the rejuvenation procedure. In addition, the model considers both cold and warm rejuvenation. Further studies which take into account the real data and aging conditions are needed for proposed aging and rejuvenation model.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122537453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tatjana Selivorstova, Sergey Klishch, S. Kyrychenko, A. Guda, K. Ostrovskaya
{"title":"ANALYSIS OF MONOLITHIC AND MICROSERVICE ARCHITECTURES FEATURES AND METRICS","authors":"Tatjana Selivorstova, Sergey Klishch, S. Kyrychenko, A. Guda, K. Ostrovskaya","doi":"10.31891/csit-2021-5-8","DOIUrl":"https://doi.org/10.31891/csit-2021-5-8","url":null,"abstract":"In this paper the information technologies stack is presented. Thesetechnologies are used during network architecture deployment. The analysis of technological advantages and drawbacks under investigation for monolithic and network architectures will be useful during of cyber security analysis in telecom networks. The analysis of the main numeric characteristics was carried out with the aid of Kubectl. The results of a series of numerical experiments on the evaluation of the response speed to requests and the fault tolerance are presented. The characteristics of the of monolithic and microservice-based architectures scalability are under investigation. For the time series sets, which characterize the network server load, the value of the Hurst exponent was calculated. \u0000The research main goal is the monolithic and microservice architecture main characteristics analysis, time series data from the network server accruing, and their statistical analysis. \u0000The methodology of Kubernetes clusters deploying using Minikube, Kubectl, Docker has been used. Application deploy on AWS ECS virtual machine with monolithic architecture and on the Kubernetes cluster (AWS EKS) were conducted. \u0000The investigation results gives us the confirmation, that the microservices architecture would be more fault tolerance and flexible in comparison with the monolithic architecture. Time series fractal analysis on the server equipment load showed the presence of long-term dependency, so that we can treat the traffic implementation as a self-similar process. \u0000The scientific novelty of the article lies in the application of fractal analysis to real time series: use of the kernel in user space, kernel latency, RAM usage, caching of RAM collected over 6 months with a step of 10 seconds, establishing a long-term dependence of time series data. \u0000The practical significance of the research is methodology creation of the monolithic and microservice architectures deployment and exploitation, as well as the use of time series fractal analysis for the network equipment load exploration.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131994070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. Berezsky, O. Pitsun, T. Datsko, Bohdan Derysh, Grygory Melnyk
{"title":"BREAST CANCER IMMUNOHISTOLOGICAL IMAGING DATABASE","authors":"O. Berezsky, O. Pitsun, T. Datsko, Bohdan Derysh, Grygory Melnyk","doi":"10.31891/csit-2022-1-10","DOIUrl":"https://doi.org/10.31891/csit-2022-1-10","url":null,"abstract":"Breast cancer is the most common pathology among women. The death rate from breast cancer among women remainshigh. Early diagnosis and individual therapy are effective ways to extend people's lives. The main diagnostic methods arecytological, histological, and immunohistochemical. The cytological method allows assessing the qualitative and quantitativechanges in cells, as well as identifying extra- and intracellular inclusions and microorganisms. The histological method allows you toexplore changes in the location of groups of cells in a particular tissue. The immunohistochemical method is based on the use ofbiomarkers. Immunohistochemical images are the result of an immunohistochemical investigation. The aim of the work is todevelop a database of immunohistological images of breast cancer. With the developed database, a database design methodologywas used, including infological, datalogical and physical design. The scientific novelty lies in the use of an object-oriented approachfor designing a database of immunohistochemical images. The practical value of the work lies in the development of all stages ofdatabase design. As a result, an infological model, a data model, and a UML database diagram have been developed. For thepractical implementation of the server part of the database, operating systems such as Windows / Linux / macOS can be used, thedatabase server is MySQL. The developed breast cancer database contains more than 500 images for four diagnoses. The imageresolution is 4096 x 3286 pixels. For each image, two features are given: relative area and brightness level. The developedHI&IHCIDB database has medium volume, high resolution, and quantitative characteristics in the description ofimmunohistochemical images","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116773536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Vorontsova, A. Dashkevych, H. Fedchenko, Vladislav Tiahlo
{"title":"3D OBJECTS CREATION APPROACH FOR AR PROJECTS","authors":"D. Vorontsova, A. Dashkevych, H. Fedchenko, Vladislav Tiahlo","doi":"10.31891/csit-2021-4-6","DOIUrl":"https://doi.org/10.31891/csit-2021-4-6","url":null,"abstract":"In this paper are discussed the application of 3D technologies, which are reflected in various areas of life, such as education, science, engineering and entertainment industry. The use of 3D technology in the educational process can significantly increase its efficiency by bringing the virtual computer environment closer to the real three-dimensional world. But for now the use of augmented reality in teaching is only gaining momentum. Many applications are still quite primitive, but developers are actively working on their refinement, increasing the amount of educational content, improving quality. The task of fast and high-quality algorithm for creating 3D content for further import in AR training projects has been urgent. The aim of this work is to increase the level of use of 3D technologies in the educational process for an effective and external interactive way of providing information. In the course of the work the methods of creating 3D content for different areas of application such as game industry, 3D visualization, 3D printing, AR projects, holographic fans, preliminary assessment of technical properties of the product and etc were considered. Data analysis has been shown that for each area of application 3d content has its own requirements and features. This information was identified and presented in the form of a comparative table. Based on the analysis of modern methods of developing 3D content for various applications, a general method of creating 3D objects for further import into AR projects was proposed. Based on the proposed approach, a 3D model of the character for the children audio-encyclopedic stories educational application was designed. The obtained models were also integrated in the augmented reality environment. The use of this approach has increased the download speed of the model in an augmented reality application.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125087124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}