{"title":"ASSESSMENT OF THE EFFICIENCY OF PROTECTION OF THE INFORMATION SYSTEM OF ENTERPRISES","authors":"V. Savchenko","doi":"10.31673/2412-4338.2022.026375","DOIUrl":"https://doi.org/10.31673/2412-4338.2022.026375","url":null,"abstract":"The paper evaluates the effectiveness of the use of functionally stable generalized information system of the enterprise. Diagnosis of the system in general. The following definitionassumption was used in the diagnosis: the amount of diagnostic information is the number of test results accumulated by the module before the execution of the algorithm, recorded during the mathematical modeling of the diagnostic procedure. It is illustrated that the reliability of the diagnosis does not change due to the expansion of the system. This is due to the property of adaptive self-diagnosis - the ability to diagnose with a given reliability. Values of reliability significantly depend on the number of failures. As the number of failures increases, the reliability of diagnosis decreases, due to the peculiarities of the algorithm of analysis of test results, in which the whole set of modules is divided into two subsets - possible good and possible bad modules. It is the power of many possible faulty modules that influences decisionmaking, i.e. the reliability of diagnosis. Dependence of reliability on a priori probability of working condition of modules shows insignificant increase of reliability with increase of value of probability of working capacity that is also caused by features of algorithm of analysis of diagnostic information in which the decision on failures of modules is made directly taking into account value of probability of working capacity. The amount of diagnostic information is the number of test results accumulated by the module before executing the algorithm. The property of adaptive self-diagnosis, in contrast to the existing ones, is considered in the work due to the increase in the time of diagnosis and the acceptable decrease in the reliability of the diagnosis. At the same time, the time of diagnosis is predictable and is within acceptable limits, which allows to detect failures in time, roll back the computational process and ensure the insensitivity of the computational process to failures of system modules.","PeriodicalId":494506,"journal":{"name":"Telekomunìkacìjnì ta ìnformacìjnì tehnologìï","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135610810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"THE PLACE OF OSINT IN THE CYBER KILL CHAIN","authors":"M. M. Zaporozhchenko","doi":"10.31673/2412-4338.2023.015360","DOIUrl":"https://doi.org/10.31673/2412-4338.2023.015360","url":null,"abstract":"In recent years, there has been a trend towards an increase in the number of cyber attacks on organizations and individual users. In many cases, a key factor in the implementation of an information security incident is the attacker's effective preparation for a cyber attack: target selection, reconnaissance, i.e. obtaining any information that may be needed when planning an attack, weaponization based on discovered defense mechanisms, software and hardware, etc. and delivery, i.e. choosing how the malware will reach the victim and what steps will be required to activate it further. Having a significant amount of important and critical information for the organization from the point of view of ensuring security provides the attacker with the opportunity to choose the optimal attack scenario and significantly increases the chances of its success. The problem is that today's OSINT methods and tools allow you to find almost any information that is not protected in a real way, which significantly increases the risks, especially for organizations that find it difficult to control all the information that their employees post on social networks, disclose in interviews or accidentally enters the Internet. However, most intelligence tools are not only available to attackers, so ethical hackers and penetration testers can also use OSINT tools to examine an organization's vulnerabilities and improve its defenses before attackers exploit those vulnerabilities. The article examines the main methods of intelligence based on open sources, considers the most common and most often used OSINT tools, describes the life cycle of a cyber attack and defines the stages that require the use of OSINT tools when conducting an audit of the organization's information security and penetration tests.","PeriodicalId":494506,"journal":{"name":"Telekomunìkacìjnì ta ìnformacìjnì tehnologìï","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135701132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MECHANISMS FOR IMPROVING THE QUALITY AND DENOISING OF IMAGES BASED ON THE CONVOLUTION AND RECURRENT NEURAL NETWORKS","authors":"A. O. Lynovskyy","doi":"10.31673/2412-4338.2023.018289","DOIUrl":"https://doi.org/10.31673/2412-4338.2023.018289","url":null,"abstract":"This article provides an overview of methods for image enhancement and denoising based on convolutional and recurrent neural networks with the addition of a non-local operations block. These methods are widely used in various domains. In medicine, these methods improve MRI images, assisting doctors in making accurate diagnoses. In security applications, these approaches enhance images and enable better visualization of details. The article covers the main existing approaches to image enhancement. The article presents an analysis of the key characteristics of the investigated neural networks, as well as the scenarios in which they are most effective. It also includes a table of results from several image enhancement methods and introduces a research method for comparing its effectiveness in image enhancement. The strengths of each approach are highlighted, and their efficiency in different scenarios is discussed. Considering specific characteristics of denoising tasks such as noise patterns, image types, and processing constraints can help in selecting the most suitable architecture to achieve the desired outcome. The article also highlights the use of the non-local operations block to improve image quality. This block is used to capture global dependencies among pixels, allowing better modeling of relationships between different parts of the image. The non-local operations block enables efficient detection of long-range dependencies and contextual information, leading to improved denoising and image restoration. Overall, this article is useful for researchers in the field of image processing and machine learning who are interested in understanding the key differences between convolutional neural networks (CNNs) and recurrent neural networks (RNNs) and exploring existing approaches to image enhancement and denoising. It provides a comprehensive overview of methods for image enhancement and denoising using convolutional and recurrent neural networks with the addition of a non-local operations block, along with information about existing approaches. The information and recommendations presented in this article can assist in selecting appropriate methods for addressing image processing tasks.","PeriodicalId":494506,"journal":{"name":"Telekomunìkacìjnì ta ìnformacìjnì tehnologìï","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135701133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DATA CONSISTENCY MODELS IN APPLICATIONS WITH MICROSERVICE ARCHITECTURE","authors":"Ya. I. Kornaga","doi":"10.31673/2412-4338.2023.012941","DOIUrl":"https://doi.org/10.31673/2412-4338.2023.012941","url":null,"abstract":"Individual database transactions can easily meet ACID requirements and ensure strong consistency, but distributed transactions have a number of limitations to address. Hard transactions are are found to be fully ACID compliant, while using flexible transactions isolation is not fully guaranteed. In practice, the isolation requirement is waived to some extent to ensure high throughput and system performance. Flexible transactions generally adhere to the Basic Availability, Flexible State, Eventually Consistency (BASE) theory. The BASE theorem is an extension of the CAP theorem. This is the balance between consistency and availability in CAP. According to the BASE theory, we cannot achieve strong consistency, however, each program can achieve ultimate consistency by using an appropriate method according to its own characteristics. CAP shows that a distributed system cannot achieve consistency, availability, and distribution resilience at the same time. It is worth to pay attention at the stage of system design. It was found that hard transactions are strive for persistent consistency, and so they sacrifice high availability. Flexible transactions sacrifice consistency in exchange for high system availability.","PeriodicalId":494506,"journal":{"name":"Telekomunìkacìjnì ta ìnformacìjnì tehnologìï","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135701161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"INVARIANCE OF THE MANAGEMENT SYSTEM OF A SPECIAL PURPOSE INFORMATION COMMUNICATION NETWORK UNDER THE CONDITIONS OF INCOMPLETE PRIOR INFORMATION","authors":"A. H. Zakharzhevsky","doi":"10.31673/2412-4338.2023.030411","DOIUrl":"https://doi.org/10.31673/2412-4338.2023.030411","url":null,"abstract":"The emergence of new, scientifically based advanced approaches to the construction and operation of a special-purpose information communication network, the development of modern secure communication technologies based on them made it possible to create a sufficiently effective and, at the same time, sufficiently extensive structure of the constituent elements of such a network. At the same time, special purpose information communication networks are emerging, individual elements of which can be built on the basis of various advanced technologies. In such conditions, a new scientific problem arises to ensure the invariance of the system of protected ICMSP in conditions of incomplete a priori information. The article presents the functional dependence of the invariance of the special purpose information communication network control system under the condition of incomplete a priori information. A disturbance management algorithm has been developed and proposed, and the reasonable feasibility of its use when introducing intentional disturbances has been substantiated. It is shown that this method can be considered as a way of controlling the system when summing the functions according to the control influence. The conditions for ensuring the invariance of control systems are given and the necessary mathematical expressions are given. Provision of an invariant control system under the influence of incomplete a priori information in the article is reduced to the well-known problem of signal reproduction in the presence of interference. Which is proposed to be solved by the criterion of the minimum of the error function. It is shown that in the case of random external influences, with the help of the introduction of previous distorting functions, it is possible to correct the signal by a value that coincides with the mathematical expectation of the error. Obtaining an invariant system in the \"emergency\" mode is reduced to the well-known problem of signal reproduction in the presence of disturbances, which is solved according to the minimum error function criterion. It should be noted that in this case, with the help of preliminary distortion, under random influences, it is possible to correct the signal by a value that coincides with the mathematical expectation of the error.","PeriodicalId":494506,"journal":{"name":"Telekomunìkacìjnì ta ìnformacìjnì tehnologìï","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135561805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DEVELOPMENT OF SOFTWARE TOOL FOR EVOLUTIONARY DECODING OF BLOCK CODES","authors":"O. M. Komar","doi":"10.31673/2412-4338.2023.017481","DOIUrl":"https://doi.org/10.31673/2412-4338.2023.017481","url":null,"abstract":"The approach to the development of a software tool for evolutionary decoding of block codes is presented. The key stages of the design process of this software tool are considered. The application of the Python programming language in the software implementation of the evolutionary decoding of block codes is substantiated. It was determined that this programming language provides a sufficiently simple and functional implementation of calculations in finite fields and evolutionary optimization procedures with built-in components and libraries. The generalized stages of evolutionary decoding of some block code are given. It is shown that hard decoding is first performed, and then an evolutionary search of the codeword based on the most reliable basis of the generator matrix of the block code is performed. A functional diagram based on processing the main stages of decoding of block codes using evolutionary optimization procedures is proposed. This diagram illustrates the proposed method of software implementation of the necessary functions by the components of the evolutionary decoder. The architecture of the software tool for the evolutionary decoding of block codes has been developed. The proposed architecture involves the use of existing libraries of block codes, computations in finite fields, evolutionary optimization and developed decoder functionality. The purpose of individual blocks and software modules of this software tool is considered. The results of the work should be used to increase the reliability of information transmission in existing and prospective radio communication systems. Also, the obtained results can be used in conducting experimental studies of the characteristics of various types of block codes that are used in modern electronic communications.","PeriodicalId":494506,"journal":{"name":"Telekomunìkacìjnì ta ìnformacìjnì tehnologìï","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135701129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"THE SHADOW DOM CONCEPT AS A TOOL FOR ENCAPSULATION AND MODULARITY IN MODERN WEB DEVELOPMENT","authors":"V. V. Zalyva","doi":"10.31673/2412-4338.2023.038895","DOIUrl":"https://doi.org/10.31673/2412-4338.2023.038895","url":null,"abstract":"The Shadow Document Object Model, commonly referred to as the Shadow DOM, has emerged as a pivotal tool in contemporary web development, facilitating the encapsulation of structure, styles, and behaviors within a detached DOM tree. This technology addresses the global nature of CSS by isolating styles and code from the main document, thereby preventing style conflicts and ensuring more predictable component behaviors. The Shadow DOM resolves critical challenges developers face when integrating third-party components or libraries. It empowers the creation of components that are self-contained, isolated, and seamlessly integrated without the fear of disrupting the styles or scripts of the primary site. In the future, with the rising popularity of web components, the capabilities of the Shadow DOM may expand, allowing developers to craft even more powerful and flexible components. This could encompass enhancements in integration with other technologies, performance optimization, and deeper integration with browsers and other platforms. The Shadow DOM is anticipated to become foundational for web application development, enabling developers to produce more modular, scalable, and reliable web applications. As web applications grow in complexity and the need for flexibility, the encapsulation and isolation provided by the Shadow DOM will be imperative for ensuring the stability and reliability of modern web applications. This article delves into the concept of the Shadow DOM as a tool for encapsulation and modularity in modern web development. The primary purpose of the Shadow DOM is to isolate the internal structure and behavior of web components, ensuring their independence from the main code. This allows developers to create standalone components that can be reused effortlessly without concerns over potential style or script conflicts. The Shadow DOM addresses key web development challenges, such as style and script clashes, by providing developers with a tool to craft more stable and reliable web applications. The style isolation within the Shadow DOM, for instance, ensures that the styles of one component do not impact other parts of a web page. Such encapsulation and modularity make the Shadow DOM a vital element of the contemporary web development ecosystem.","PeriodicalId":494506,"journal":{"name":"Telekomunìkacìjnì ta ìnformacìjnì tehnologìï","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135561796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"THREAT MODEL OF DECISION SUPPORT SYSTEMS OPERATING ON THE BASIS OF ELEMENTS OF ARTIFICIAL INTELLIGENCE","authors":"A. O. Boiko","doi":"10.31673/2412-4338.2023.033140","DOIUrl":"https://doi.org/10.31673/2412-4338.2023.033140","url":null,"abstract":"The modern development of artificial intelligence (AI) affects many aspects of society's life and activities, including decision support systems. AI is already successfully implemented in various fields such as business, medicine, automated data processing and many others. However, this development also brings with it various threats and challenges that require careful study and security measures. This article is devoted to the development and analysis of a threat model for decision support systems that function on the basis of elements of artificial intelligence (AI). The relevance of the research lies in the rapid development of AI technologies and their increasingly widespread use in various fields, including management, medicine, finance and many others. The article describes the structure and main component models of threats that may arise in AI-based decision support systems. An overview of existing attacks on artificial intelligence (AI) is given, which cover the stages of training, the use of machine learning algorithms, as well as the information infrastructure of the system. Classification of attack data was carried out, based on the analysis of the AI functioning process, and attack categories most relevant and dangerous for AI systems were identified. A threat model for a decision support system based on artificial intelligence technologies is proposed, the feature of which is the consideration of threats to the confidentiality of data of AI systems, threats to the functioning of AI systems, and threats to information systems. This model is of practical importance for developers of AI systems and for specialists in the field of cyber security, as it contributes to increasing the level of security and reliability of decision support systems based on artificial intelligence elements in the modern digital environment.","PeriodicalId":494506,"journal":{"name":"Telekomunìkacìjnì ta ìnformacìjnì tehnologìï","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135562294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DIRECTIONS OF OPTIMIZATION OF CORPORATE MULTISERVICE COMMUNICATION NETWORK PROTECTION COMPLEXES","authors":"M. P. Gnidenko","doi":"10.31673/2412-4338.2022.020412","DOIUrl":"https://doi.org/10.31673/2412-4338.2022.020412","url":null,"abstract":"The article considers a comprehensive approach to the protection of information of a corporate multi-service communication network, which consists in the use of technical, hardware- program, and organizational-legal measures of protection. It was determined that the protection of information from unauthorized access and its leakage through technical channels is more effectively achieved by the use of technical means. In order to determine the direction of optimization of the corporate multi-service network protection complexes and general approaches to its implementation, a model of the communication network built according to the hierarchical principle is considered. The place of the corporate network in the communication network is determined. It is noted that a more rational approach to ensuring information protection should be considered the design stage, when it is possible to predict and implement a given level of protection. A general algorithm for designing a corporate network is proposed, which consists of the stages listed in the article. At the first stage, the selection and justification of the general topology of the protected corporate network adapted to the requirements of its users was carried out. The directions of the communication traffic between the sender and the recipient of information through the network are determined. Evaluation and calculation of information flows taking into account the scaling of the network, increasing the intensity and volume of traffic, the systematization of protection functions with the possibility of both generalization and localization of them are the subject of further research. When choosing the types of physical equipment for the provision and implementation of the specified classes and functions, protection is considered for three levels of the network: the hardware part of servers and workstations; communication equipment and communication channels; gateways, bridges and tunnels of the entire diameter of the network, including segments and domains. Identified directions for improving information protection at the hardware, channel, and network support levels. Based on the results of the research, it was concluded that the complexity of solutions to increase information protection is achieved in addition to the technical direction by hardware- software and organizational-legal ones.","PeriodicalId":494506,"journal":{"name":"Telekomunìkacìjnì ta ìnformacìjnì tehnologìï","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135610802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"USING SLURM WORKLOAD MANAGER FOR MANAGING SUPERCOMPUTERS AND LINUX CLUSTERS","authors":"V. O. Dryha","doi":"10.31673/2412-4338.2022.024652","DOIUrl":"https://doi.org/10.31673/2412-4338.2022.024652","url":null,"abstract":"The article is dedicated to the use of the Slurm Workload Manager for managing supercomputers and Linux clusters and highlighting the importance and advantages of using the Slurm Workload Manager in resource management on multi-user systems. Within the research, existing workload management systems and their limitations were analyzed. Based on this analysis, it was found that Slurm is one of the most widely used and efficient solutions in the field of resource management on multi-user systems. The article provides a detailed examination of the functionality of Slurm, including its core functions such as resource scheduling, task distribution, and system monitoring. Slurm allows users to efficiently utilize computational resources, distribute tasks among cluster nodes, ensure optimal CPU time usage, and control the system load. These features enable high productivity and efficiency in resource utilization. The advantages of Slurm compared to other resource management systems are presented in the article. Slurm is noted for its flexibility and the ability to configure various types of resources, as well as support for different scheduling algorithms. Limitations and challenges associated with using Slurm are also mentioned, providing readers with a comprehensive understanding of its capabilities and potential considerations for implementation. This article will provide readers with a detailed overview of the Slurm Workload Manager, its core functions, advantages, and limitations. With the comprehensive analysis and description of Slurm's core functions, the article will serve as an invaluable source of information for professionals working with large-scale computing clusters and supercomputers. It will also be beneficial for those interested in exploring best practices in resource management on multi-user systems and learning effective strategies for utilizing the Slurm Workload Manager.","PeriodicalId":494506,"journal":{"name":"Telekomunìkacìjnì ta ìnformacìjnì tehnologìï","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135610807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}