115 results on '"Milov, Oleksandr'
Search Results
2. Cyber Terrorism as an Object of Modeling.
- Author
-
Oleksandr Milov, Yevgen Melenti, Stanislav Milevskyi, Serhii Pohasii, and Serhii Yevseiev
- Published
- 2021
3. Model of the System for Special Purpose of Critical Infrastructure Objects.
- Author
-
Mikolaj P. Karpinski, Bogdan Tomashevsky, Natalia Zahorodna, Serhii Yevseiev, Stanislaw Andrzej Rajba, and Oleksandr Milov
- Published
- 2021
4. Critical Points of Information Influence in Social Networks.
- Author
-
Oleksandr Milov, Serhii Yevseiev, Stanislav Milevskyi, Krzysztof Kajstura, and Ruslana Ziubina
- Published
- 2021
5. Security Analysis Models for Multimedia Information Resources in Social Networks (short paper).
- Author
-
Stanislav Milevskyi, Volodymyr Aleksiyev, Olha Korol, Oleksandr Milov, and Serhii Yevseiev
- Published
- 2021
6. DEVELOPMENT OF A MODEL OF THE INFORMATION AND ANALYTICAL SYSTEM FOR MAKING DECISIONS ON DETECTING FAILURES OF INFORMATION TRANSMISSION CHANNELS.
- Author
-
Shmatko, Olexander, Yevseiev, Serhii, Milov, Oleksandr, Sporyshev, Kostyantyn, Opirskyy, Ivan, Glukhov, Sergey, Rudenko, Yevhen, Nalyvaiko, Andrii, Dakov, Serhii, and Sampir, Oleksandr
- Subjects
INFORMATION storage & retrieval systems ,SOCIAL engineering (Fraud) ,DECISION making ,SOCIAL integration ,SOCIAL engineering (Political science) - Abstract
The object of the research is the channels of information transmission during the control of the information-analytical decision-making system. The development of high technologies and computing capabilities ensures the evolutionary development of smart technologies and socio-cyber-physical systems on the one hand. On the other hand, it forms the integration of targeted (mixed) attacks with the possibility of integration with social engineering methods. In addition, mobile technologies significantly increase the possibilities of data transmission speed. However, this only provides the authentication service, which does not provide a full range of security services. Under such conditions, an urgent task at the decision-making stage is the use of auxiliary systems that ensure the adequacy of decisions and the promptness of their adoption. The proposed mathematical model of the information and analytical system allows to calculate the main technical characteristics of information transmission channels and identify their possible failures. The use of an information and analytical system simplifies the decision-making process, allows to increase the reliability of such decisions due to an increase in the level of automation. Increasing the level of automation in the decision-making process removes subjective factors and the decision depends on the availability of information. Therefore, the reliability of the information transmission channels of the information and analytical system significantly affects the quality of the decisions made. The developed model allows to ensure the required level of reliability of information transmission channels. The obtained results are explained by determining the dependence between the parameters of the information and analytical system and their influence on the quality of information transmission through channels. The results of the study can be used in practice when considering systems with a limited number of states during operation. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. Model Basis for Cybersecurity of Socio-Cyberphysical Systems.
- Author
-
DANIELIENE, Renata, BRONIN, Sergiy, MILOV, Oleksandr, and YEVSEIEV, Serhii
- Subjects
SECURITY systems ,INTERNET security ,INTERNAL security ,INTERNET of things ,INFORMATION measurement - Abstract
Designing systems based on high-computational technologies of the Internet of Things, smart and mobile technologies require integrating security across all stages of the lifecycle. Those systems often evolve cyber-physical, socio-cyber-physical systems, which require consideration of their structure as multi-platform, and requires the formation of multi-circuit security systems. At the same time, in each platform (social, cloud and physical) it is necessary to form both internal and external security contours. This approach ensures not only objectivity, but also timely preventive measures to protect information. The article discusses the main approaches to modelling multi-circuit security systems taking into account the physical infrastructure. The proposed approaches provide not only a taxonomy of cybersecurity system models, but also allow to assess the advantages and disadvantages of each class and to ensure the necessary level of objectivity in modelling the security of social-cyberphysical systems. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. Development of a multi-loop security system of information interactions in socio-cyberphysical systems
- Author
-
Yevseiev, Serhii, primary, Dzheniuk, Nataliia, additional, Tolkachov, Maksym, additional, Milov, Oleksandr, additional, Voitko, Tetiana, additional, Prygara, Mykhailo, additional, Shpak, Oleksandr, additional, Voropay, Natalia, additional, Volkov, Andrii, additional, and Lezik, Oleksandr, additional
- Published
- 2023
- Full Text
- View/download PDF
9. Development of the concept for determining the level of critical business processes security
- Author
-
Serhii Yevseiev, Oleksandr Milov, Nataliia Zviertseva, Oleksandr Lezik, Olena Komisarenko, Andrii Nalyvaiko, Volodymyr Pogorelov, Vitaliy Katsalap, Yurii Pribyliev, and Iryna Husarova
- Subjects
critical business process ,security concept ,Control and Systems Engineering ,Applied Mathematics ,Management of Technology and Innovation ,Mechanical Engineering ,multi-loop protection systems ,Energy Engineering and Power Technology ,Environmental Chemistry ,Electrical and Electronic Engineering ,Industrial and Manufacturing Engineering ,Computer Science Applications ,Food Science - Abstract
The development of technologies and computing resources not only expanded the spectrum of digital services in all areas of human activity, but also defined the spectrum of targeted cyber attacks. The object of the study is the process of ensuring the safety of critical business processes that ensure the continuity of production and/or functioning of the company/organization/enterprise as a whole. Targeted attacks are aimed at destroying not only the business structure, but also its individual components that determine critical business processes. Continuity of such business processes is a critical component of any company, organization or enterprise of any form of government, which critically affects the earning of profits or the organization of production processes. The proposed concept of determining the security level of critical business processes is based on the need to use multi-loop information protection systems. This allows to ensure the continuity of critical business processes through a timely objective assessment of the level of security and the timely formation of preventive measures. This approach is based on the proposed rules for determining the achievement of a given level of security, which are based on assessments of the integrity, availability and confidentiality of information arrays, as well as computer equipment in relation to various points of the organization's business processes. The use of threat integration on the internal and external contours of the protection system allows to ensure the necessary level of security and continuity of the production/technological process of critical business processes. The proposed practical implementation of the system security level assessment system in the declarative programming language Prolog, which allows to form requirements regarding the achievement of a given system security level depending on the state assessments of individual system components
- Published
- 2023
- Full Text
- View/download PDF
10. INFORMATION SECURITY INVESTMENT MODEL: RESOURCE REPRESENTATION AND ORGANIZATIONAL TRAINING
- Author
-
Oleksandr Milov, Maryna Kostyak, Stanislav Milevskyi, and Hazail Nuraddin Ogly Rzaev
- Subjects
information security ,investment ,resource representation ,organizational theory of learning ,integral investment model ,Computer software ,QA76.75-76.765 ,Information theory ,Q350-390 - Abstract
Information technology (IT) protection is a key economic concern for organizations. While research in the field of investment in IT security is growing rapidly, they lack the theoretical basis for combining economic and technological phenomena and research directions. The proposed theoretical model is based on the use of the theory of organizational behavior and resource representation. The combined application of these theories allows, within the framework of one model, to present the organizational effects of training that arise when developing the protection of organizational resources using countermeasures of IT security. Identified approaches to the study of investments in information security, which boil down to the following: microeconomic approaches based on game theory, financial analysis based on return on investment (ROI), net present value (NPV) and internal rate of return (IRR), and management approaches based on decision theory, risk management and organization theory. The combination of various theories and approaches leads to the formation of a multi-theoretical model, which allows you to combine the methods of these research areas within the framework of a comprehensive model based on the resource representation and the theory of organizational learning. The difficulties of developing a theoretical model for investment in information security are indicated, namely: the diversity of the nature of countermeasures, covering strategic and operational issues, taking into account legal, technical and organizational aspects; the intended purpose of investments in information security (risk reduction, not profit); the complementarity of the prospects for the operational and strategic periods. Various points of view on investment problems are presented, namely, resource representation and representation in the framework of the theory of organizational learning. The proposed approach allowed us to build an integrated model of investment in information security. Answers to questions arising from the analysis of the integrated model of investment in information security can not only determine future research, but also have managerial consequences that will help firms make informed investment decisions in the field of information security.
- Published
- 2019
- Full Text
- View/download PDF
11. ADAPTIVE DECISION SUPPORT SYSTEMS FOR CYBER SECURITY
- Author
-
Oleksandr Milov
- Subjects
adaptability ,decision support systems ,cybersecurity ,information security ,learning ,search for solutions ,Computer software ,QA76.75-76.765 ,Information theory ,Q350-390 - Abstract
The subject of the research is the principles and models of adaptive decision support systems in cyber security. The purpose is to develop basic principles and models underlying the operation of adaptive decision support systems in the field of cybersecurity. The methods of research are methods of system analysis, control theory, decision theory, and artificial intelligence. The result of the study. The basic principles and models are proposed, the consideration and use of which in decision support systems will allow the formation of adaptive properties of the described systems. It is shown that the properties of adaptability can be formulated as a learning task. Presents optimization algorithms that underlie learning processes. Conclusion. The combined use of mathematical modeling methods, the theory of adaptation and artificial intelligence methods (training, pattern recognition and problem solving planning) with the corresponding creation of ontologies of cybersecurity systems that ensure the filling of databases, models and knowledge will allow you to implement an effective adaptive decision support system that will be useful a tool for managers at any level at all stages of decision making and implementation. The presented approaches can be used as a basis for building and operating decision support systems, increasing the area of application of such systems due to the formation of their adaptability properties.
- Published
- 2019
- Full Text
- View/download PDF
12. Models of socio-cyber-physical systems security
- Author
-
Serhii Yevseiev, Yuliia Khokhlachova, Serhii Ostapov, Oleksandr Laptiev, Olha Korol, Stanislav Milevskyi, Oleksandr Milov, Serhii Pohasii, Yevgen Melenti, Vitalii Hrebeniuk, Alla Havrylova, Serhii Herasуmov, Roman Korolev, Oleg Barabash, Valentyn Sobchuk, Roman Kyrychok, German Shuklin, Volodymyr Akhramovych, Vitalii Savchenko, Sergii Golovashych, Oleksandr Lezik, Ivan Opirskyy, Oleksandr Voitko, Kseniia Yerhidzei, Serhii Mykus, Yurii Pribyliev, Oleksandr Prokopenko, Andrii Vlasov, Nataliia Dzheniuk, and Maksym Tolkachov
- Subjects
crypto-code constructions ,cybersecurity ,simulation modelling ,radio engineering research ,models of the threat ,automation ,security measures - Abstract
The development of technologies and computing resources has not only expanded the range of digital services in all spheres of human activity, but also determined the range of targeted cyber attacks. Targeted attacks are aimed at destroying not only the business structure, but also its individual components that determine critical business processes. The continuity of such business processes is a critical component of any company, organization or enterprise of any form of ownership, which has a critical impact on making a profit or organizing production processes. The proposed concept of determining the security level of critical business processes is based on the need to use multiloop information security systems. This makes it possible to ensure the continuity of critical business processes through a timely objective assessment of the level of security and the timely formation of preventive measures. This approach is based on the proposed rules for determining the reach of a given security level, based on assessments of the integrity, availability and confidentiality of information arrays, as well as computer equipment for different points of the organization's business processes. The issues of applying situational management methods to ensure the safe functioning of objects of socio-cyberphysical systems, logical and transformational rules that form the foundation for building a situational type cybersecurity management system are considered. One of the main tasks of systems of this type is described– the task of replenishing the description of the situation. The use of pseudophysical logics, various types of pseudophysical logics, the method of their construction and their interconnection are proposed. Particular attention is paid to causal pseudophysical logic, as the least developed for the purposes of ensuring cybersecurity. The formation of smart technologies, as a rule, uses the wireless standards of communication channels IEEE 802.11X, IEEE 802.15.4, IEEE 802.16, which use only authentication protocols and privacy mechanisms that are formed on the basis of symmetric algorithms. In the conditions of the post-quantum period (the appearance of a full-scale quantum computer), the stability of such algorithms is questioned. Such systems, as a rule, are formed on the basis of the synthesis of socio-cyber-physical systems and cloud technologies, which simplifies the implementation of Advanced Persistent Threat attacks, both on the internal loop of control systems and on the external one. The proposed creation of multi-circuit information protection systems allows for an objective assessment of the flow state of the system as a whole and the formation of preventive measures against cyber threats. In the thied chapter, models of probable threats and information protection in public networks are proposed. The most general model of the formal description of the protection system is the model of the security system with full overlap, in which a complete list of protection objects and threats to information is determined, and means of ensuring security are determined from the point of view of their effectiveness and contribution to ensuring the security of the entire telecommunications system. It is also shown that the combination of four models (M1, M2, M3, M4) in various variants provides wide opportunities for modeling various known types of threats and their implementation. However, in connection with the continuity of the process of developing new and improving existing methods and means of implementing threats, it is necessary to use such approaches to ensuring information protection that allow detecting and preventing threats of unknown types and carrying out dynamic correction of protection behavior, adapting it to specific application conditions. The M5 basic model is described, which enables continuous refinement of threat classes and response measures, and continuous training of the adaptive component of the CSI, which, in turn, detects and prevents threats of unknown types. The M6 basic model is introduced with the aim of obtaining higher security due to the presence of a special module of internal diagnostics that diagnoses the entire protection system, decides on the correction of the SHI behavior algorithm, and makes it possible to achieve SHI fault tolerance; a special module that diagnoses the communication channel with subsequent changes in the level of protection, allows to achieve the adaptability of the SHI. The fourth chapter is deal with the development of cryptographic primitives based on cellular automata. The definition of a cellular automaton is given and the elementary rules of intercellular interaction are described. A number of generators of pseudorandom binary sequences have been developed based on a combination of elementary rules of intercellular interaction, as well as cell interaction according to a rule of our own development. In the “cryptographic sponge” architecture, a cryptographic hashing function with a shuffling function based on cellular automata was developed and its statistical characteristics and avalanche effect were investigated. A block cipher in the SP-network architecture is constructed, in which cellular automata are used to deploy the key, and the encryption process is based on elementary procedures of replacement and permutation. Substitution blocks are used from the well-known AES cipher, a description of a stream cipher is given, where a personal computer keyboard and mouse are used as the initial entropy. Random data received from the specified devices is processed by a proprietary hashing function based on a "cryptographic sponge". All developed cryptographic functions and primitives demonstrated good statistical characteristics and avalanche properties. The fifth chapter proposes a methodology for analyzing the quality of the mechanism for validating the identified vulnerabilities of a corporate network, which is based on integral equations that take into account the quantitative characteristics of the vulnerability validation mechanism under study at a certain point in time. This technique allows you to build the laws of distribution of quality indicators of the vulnerability validation process and quantify the quality of the mechanism for validating detected vulnerabilities, which allows you to monitor and control the validation of identified vulnerabilities in real time during active security analysis. A method is proposed for constructing a fuzzy knowledge base for making decisions when validating vulnerabilities of software and hardware platforms with an active analysis of the security of a target corporate network based on the use of fuzzy logic, which makes it possible to provide reliable information about the quality of the mechanism for validating vulnerabilities indirectly. The constructed knowledge base allows you to form decisive decision-making rules for the implementation of a particular attacking action, which allows you to develop expert systems to automate the decision-making process when validating the identified vulnerabilities of target information systems and networks. An improved method of automatic active security analysis is proposed, which, based on the synthesis of the proposed models, techniques and methods, allows, in contrast to the existing ones, to abstract from the conditions of dynamic changes in the environment, i.e. constant development of information technologies, which leads to an increase in the number of vulnerabilities and corresponding attack vectors, as well as an increase in ready-to-use exploits of vulnerabilities and their availability, and take into account only the quality parameters of the vulnerability validation process itself.
- Published
- 2023
13. Development of crypto-code constructs based on LDPC codes
- Author
-
Serhii Pohasii, Serhii Yevseiev, Oleksandr Zhuchenko, Oleksandr Milov, Volodymyr Lysechko, Oleksandr Kovalenko, Maryna Kostiak, Andrii Volkov, Aleksandr Lezik, and Vitalii Susukailo
- Subjects
security concept ,crypto-code constructs ,Control and Systems Engineering ,Applied Mathematics ,Management of Technology and Innovation ,Mechanical Engineering ,Energy Engineering and Power Technology ,Electrical and Electronic Engineering ,low-density parity-check codes ,Industrial and Manufacturing Engineering ,Computer Science Applications - Abstract
The results of developing post-quantum algorithms of McEliece and Niederreiter crypto-code constructs based on LDPC (Low-Density Parity-Check) codes are presented. With the rapid growth of computing capabilities of mobile technologies and the creation of wireless mesh and sensor networks, Internet of Things technologies, and smart technologies on their basis, information security is becoming an urgent problem. At the same time, there is a need to consider security in two circuits, internal (directly within the network infrastructure) and external (cloud technologies). In such conditions, it is necessary to integrate threats to both the internal and external security circuits. This allows you to take into account not only the hybridity and synergy of modern targeted threats, but also the level of significance (degree of secrecy) of information flows and information circulating in both the internal and external security circuits. The concept of building security based on two circuits is proposed. To ensure the security of wireless mobile channels, it is proposed to use McEliece and Niederreiter crypto-code constructs based on LDPC codes, which allows integration into the credibility technology of IEEE 802.15.4, IEEE 802.16 standards. This approach provides the required level of security services (confidentiality, integrity, authenticity) in a full-scale quantum computer. Practical security technologies based on the proposed crypto-code constructs, online IP telephony and the Smart Home system based on the use of an internal server are considered
- Published
- 2022
- Full Text
- View/download PDF
14. DEVELOPMENT OF A MULTILOOP SECURITY SYSTEM OF INFORMATION INTERACTIONS IN SOCIO-CYBERPHYSICAL SYSTEMS.
- Author
-
Yevseiev, Serhii, Milov, Oleksandr, Dzheniuk, Nataliia, Tolkachov, Maksym, Voitko, Tetiana, Prygara, Mykhailo, Voropay, Natalia, Shpak, Oleksandr, Volkov, Andrii, and Lezik, Oleksandr
- Subjects
SOCIAL engineering (Fraud) ,VIRTUAL prototypes ,INFORMATION storage & retrieval systems ,METHODS engineering ,CYBERTERRORISM ,FAULT tolerance (Engineering) - Abstract
The object of the study is a multi-loop security system of information interactions in socio-cyberphysical systems. The dynamic nature of physical environments inherently challenges the ability of socio-cyber-physical systems to perform adequate control actions for physical assets in many contexts. However, adaptation and evolution actions must be evaluated before implementation in the control system to ensure fault tolerance while minimizing risks. Therefore, the design of socio-cyber-physical systems must ensure not only reliable autonomy, but also operational fault tolerance and safety. The proposed approach is based on the integration of targeted (mixed) threats based on the synthesis of technical cyber threats with social engineering methods. This approach allows forming a dynamic security model based on the analysis of the interaction of various agents in socio-cyberphysical systems, which makes it possible to increase the level of counteraction to targeted (mixed) cyber threats. The results of modeling are based on the proposed classification of threats using social engineering methods, which allows cyberattackers to ensure the probability of implementing targeted threats up to 95–98 %. The proposed classification of threats based on social engineering methods will allow forming an additional parameter for the objectivity of target threats, taking into account their integration and synergy. At the same time, the presented model will make it possible to timely provide knowledge about the possibility of implementing a targeted attack and timely take preventive countermeasures. This approach will improve the set of protection measures, as well as promptly create an increase in the level of resistance of the company's personnel (organization, enterprise, etc.) to threats of social engineering [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
15. Development of the concept for determining the level of critical business processes security
- Author
-
Yevseiev, Serhii, primary, Milov, Oleksandr, additional, Zviertseva, Nataliia, additional, Lezik, Oleksandr, additional, Komisarenko, Olena, additional, Nalyvaiko, Andrii, additional, Pogorelov, Volodymyr, additional, Katsalap, Vitaliy, additional, Pribyliev, Yurii, additional, and Husarova, Iryna, additional
- Published
- 2023
- Full Text
- View/download PDF
16. Models of socio-cyber-physical systems security
- Author
-
Yevseiev, Serhii, primary, Khokhlachova, Yuliia, additional, Ostapov, Serhii, additional, Laptiev, Oleksandr, additional, Korol, Olha, additional, Milevskyi, Stanislav, additional, Milov, Oleksandr, additional, Pohasii, Serhii, additional, Melenti, Yevgen, additional, Hrebeniuk, Vitalii, additional, Havrylova, Alla, additional, Herasуmov, Serhii, additional, Korolev, Roman, additional, Barabash, Oleg, additional, Sobchuk, Valentyn, additional, Kyrychok, Roman, additional, Shuklin, German, additional, Akhramovych, Volodymyr, additional, Savchenko, Vitalii, additional, Golovashych, Sergii, additional, Lezik, Oleksandr, additional, Opirskyy, Ivan, additional, Voitko, Oleksandr, additional, Yerhidzei, Kseniia, additional, Mykus, Serhii, additional, Pribyliev, Yurii, additional, Prokopenko, Oleksandr, additional, Vlasov, Andrii, additional, Dzheniuk, Nataliia, additional, and Tolkachov, Maksym, additional
- Published
- 2023
- Full Text
- View/download PDF
17. Development of a method for assessing forecast of social impact in regional communities
- Author
-
Serhii Yevseiev, Yurii Ryabukha, Oleksandr Milov, Stanislav Milevskyi, Serhii Pohasii, Yevgen Melenti, Yevheniia Ivanchenko, Ihor Ivanchenko, Ivan Opirskyy, and Igor Pasko
- Subjects
social networks ,regional society ,Applied Mathematics ,Mechanical Engineering ,Energy Engineering and Power Technology ,rating of political parties ,models of influence ,HD2321-4730.9 ,Industrial and Manufacturing Engineering ,Computer Science Applications ,socio-cyber-physical system ,Control and Systems Engineering ,Management of Technology and Innovation ,T1-995 ,Industry ,Electrical and Electronic Engineering ,Technology (General) - Abstract
The development of the social aspect of the world community is closely related to the expansion of the range of digital services in cyberspace. A special place in which social networks occupy. The world's leading states are conducting information operations in this environment to achieve geopolitical goals. Such processes are reflected in real social and political life. This makes it possible to influence not only the social groups of society, but also to ensure manipulation in political "games" in the conduct of hybrid wars. The simultaneous interaction of social factors, influencing factors, the presence of communities in social networks forms a full-fledged socio-cyber-physical system capable of integrating real and virtual interactions to manage regional communities. The article proposes a method for predicting the assessment of social mutual influence between “formal” and “informal” leaders and regional societies. The proposed models make it possible to form not only a forecast of the influence of agents, but also the interaction of various agents, taking into account their formal and informal influences, the use of administrative resources, political moods of the regional society. This approach allows dynamic modeling based on impact and relationship analysis. The presented results of simulation modeling do not contradict the results of opinion polls and make it possible to form a set of measures that can be aimed at overcoming the negative impact on the regional society of both individual “leaders” and political parties. Analysis of the simulation results allows to increase both the political and social stability of the regional society, helps to prevent conflict moods and contradictions.
- Published
- 2021
- Full Text
- View/download PDF
18. Development of a method for assessing the security of cyber-physical systems based on the Lotka–Volterra model
- Author
-
Serhii Yevseiev, Serhii Pohasii, Stanislav Milevskyi, Oleksandr Milov, Yevgen Melenti, Ivan Grod, Denis Berestov, Ruslan Fedorenko, and Oleg Kurchenko
- Subjects
TheoryofComputation_COMPUTATIONBYABSTRACTDEVICES ,Computer science ,Applied Mathematics ,Mechanical Engineering ,Cyber-physical system ,Energy Engineering and Power Technology ,Volterra equations ,HD2321-4730.9 ,threat classifier ,security system ,lotka–volterra model ,Industrial and Manufacturing Engineering ,Computer Science Applications ,Development (topology) ,critical infrastructure ,Control and Systems Engineering ,Management of Technology and Innovation ,security level ,Systems engineering ,T1-995 ,Industry ,Electrical and Electronic Engineering ,simulation method ,Technology (General) - Abstract
The paper presents the results of the development of a method for assessing the security of cyber-physical systems based on the Lotka–Volterra model. Security models of cyber-physical systems are proposed: “predator–prey” taking into account the computing capabilities and focus of targeted cyberattacks, “predator–prey” taking into account the possible competition of attackers in relation to the “prey”, “predator–prey” taking into account the relationships between “prey species” and “predator species”, “predator–prey” taking into account the relationship between “prey species” and “predator species”. Based on the proposed approach, the coefficients of the Lotka–Volterra model α=0.39, β=0.32, γ=0.29, φ=0.27 were obtained, which take into account the synergy and hybridity of modern threats, funding for the formation and improvement of the protection system, and also allow determining the financial and computing capabilities of the attacker based on the identified threats. The proposed method for assessing the security of cyber-physical systems is based on the developed threat classifier, allows assessing the current security level and provides recommendations regarding the allocation of limited protection resources based on an expert assessment of known threats. This approach allows offline dynamic simulation, which makes it possible to timely determine attackers' capabilities and form preventive protection measures based on threat analysis. In the simulation, actual bases for assessing real threats and incidents in cyber-physical systems can be used, which allows an expert assessment of their impact on both individual security services and security components (cyber security, information security and security of information). The presented simulation results do not contradict the graphical results of the classical Lotka–Volterra model, which indicates the adequacy of the proposed approach for assessing the security of cyber-physical systems
- Published
- 2021
- Full Text
- View/download PDF
19. Development of a hardware cryptosystem based on a random number generator with two types of entropy sources
- Author
-
Serhii Yevseiev, Khazail Rzayev, Oleksandr Laptiev, Ruslan Hasanov, Oleksandr Milov, Bahar Asgarova, Jala Camalova, and Serhii Pohasii
- Subjects
Applied Mathematics ,Mechanical Engineering ,Energy Engineering and Power Technology ,cipher stability ,uncertainty zone ,Industrial and Manufacturing Engineering ,entropy sources ,Computer Science Applications ,crypto-algorithm ,Control and Systems Engineering ,Management of Technology and Innovation ,Environmental Chemistry ,Electrical and Electronic Engineering ,crypto-resistance ,Food Science ,random numbers ,pseudo-random numbers - Abstract
In modern software, crypto-algorithms are widely used for both data encryption tasks, and authentication and integrity checks. There are well-known and proven crypto-algorithms. Their cryptoresistance is either mathematically proven or based on the need to solve a mathematically complex problem (factorization, discrete logarithm, etc.). On the other hand, in the computer world, information constantly appears about errors or «holes» in a particular program (including one that uses crypto-algorithms) or that it was broken (cracked). This creates distrust both in specific programs and in the possibility to protect something in general by cryptographic methods not only from special services, but also from ordinary hackers. A promising direction of research in this field is the implementation of a hybrid random number generator with two types of entropy sources in cryptosystems. The method and means of implementing a hybrid random number generator with two types of entropy sources: external – based on Zener diode noise and internal – based on the uncertainty state of the transistor-transistor logic structure are presented. One of the options for the practical implementation of a random number generator is presented, where two sources are used as a source of entropy: an external source – Zener diode noise and an internal source – the undefined state of the transistor-transistor logic structure. The functional diagram of the proposed random number generator with two types of entropy sources is given. The MATLAB/Simulink model of the proposed random number generator is built, the results of the statistical analysis of the generated random sequences by the NIST SP 800-22 test package are given.
- Published
- 2022
20. Pseudo-Physical Logics in Control of Cyber Security Systems
- Author
-
Oleksandr Milov, Serhii Yevseiev, Nataliia Zviertseva, Herman Zviertsev, and Yevhen Motalyhin
- Published
- 2022
- Full Text
- View/download PDF
21. Development of a hardware cryptosystem based on a random number generator with two types of entropy sources
- Author
-
Yevseiev, Serhii, primary, Rzayev, Khazail, additional, Laptiev, Oleksandr, additional, Hasanov, Ruslan, additional, Milov, Oleksandr, additional, Asgarova, Bahar, additional, Camalova, Jala, additional, and Pohasii, Serhii, additional
- Published
- 2022
- Full Text
- View/download PDF
22. Pseudo-Physical Logics in Control of Cyber Security Systems
- Author
-
Milov, Oleksandr, primary, Yevseiev, Serhii, additional, Zviertseva, Nataliia, additional, Zviertsev, Herman, additional, and Motalyhin, Yevhen, additional
- Published
- 2022
- Full Text
- View/download PDF
23. Development of a concept for cybersecurity metrics classification
- Author
-
Serhii Yevseiev, Oleksandr Milov, Ivan Opirskyy, Olha Dunaievska, Oleksandr Huk, Volodymyr Pogorelov, Kyrylo Bondarenko, Nataliia Zviertseva, Yevgen Melenti, and Bogdan Tomashevsky
- Subjects
Applied Mathematics ,Mechanical Engineering ,Energy Engineering and Power Technology ,threat synergy ,Industrial and Manufacturing Engineering ,Computer Science Applications ,security metrics classifier ,Control and Systems Engineering ,Management of Technology and Innovation ,security metrics ,Environmental Chemistry ,security assessment model ,Electrical and Electronic Engineering ,Food Science - Abstract
The development of the IT industry and computing resources allows the formation of cyberphysical social systems (CPSS), which are the integration of wireless mobile and Internet technologies and the combination of the Internet of things with the technologies of cyberphysical systems. To build protection systems, while minimizing both computing and economic costs, various sets of security profiles are used, ensuring the continuity of critical business processes. To assess/compare the level of CPSS security, various assessment methods based on a set of metrics are generally used. Security metrics are tools for providing up-to-date information about the state of the security level, cost characteristics/parameters from both the defense and attack sides. However, the choice of such sets is not always the same/understandable to the average person. This, firstly, leads to the absence of a generally accepted and unambiguous definition, which means that one system is more secure than another. Secondly, it does not take into account the signs of synergy and hybridity of modern targeted attacks. Without this knowledge, it is impossible to show that the metric measures the security level objectively. Thirdly, there is no universal formal model for all metrics that could be used for rigorous analysis. The paper explores the possibility of defining a basic formal model (classifier) for analyzing security metrics. The proposed security assessment model takes into account not only the level of secrecy of information resources, the level of provision of security services, but also allows, based on the requirements put forward, forming the necessary set of security assessment metrics, taking into account the requirements for the continuity of business processes. The average value of the provision of security services to CPSS information resources is 0.99, with an average value of the security level of information resources of 0.8
- Published
- 2022
24. MODELING OF SECURITY SYSTEMS FOR CRITICAL INFRASTRUCTURE FACILITIES
- Author
-
Serhii Yevseiev, Ruslan Hryshchuk, Kateryna Molodetska, Mariia Nazarkevych, Volodymyr Hrytsyk, Oleksandr Milov, Olha Korol, Stanislav Milevskyi, Roman Korolev, Serhii Pohasii, Andrii Tkachov, Yevgen Melenti, Oleksandr Lavrut, Alla Havrylova, Serhii Herasуmov, Halyna Holotaistrova, Dmytro Avramenko, Roman Vozniak, Oleksandr Voitko, Kseniia Yerhidzei, Serhii Mykus, Yurii Pribyliev, Olena Akhiiezer, Mykhailo Shyshkin, Ivan Opirskyy, Oleh Harasymchuk, Olha Mykhaylova, Yuriy Nakonechnyy, Marta Stakhiv, and Bogdan Tomashevsky
- Subjects
Concept of a multi-loop security system ,socio-cyber-physical systems ,post-quantum security mechanisms - Abstract
The development of Industry 4.0 technologies is based on the rapid growth of the computing capabilities of mobile wireless technologies, which has made it possible to significantly expand the range of digital services and form a conglomeration of socio-cyber-physical systems and smart technologies. The First Section discusses the issues of building security systems based on the proposed Concept of multi-contour security systems, taking into account the hybridity and synergy of modern targeted cyber-attacks, their integration with social engineering methods. This approach not only increases the level of security, but also forms an objective approach to the use of post-quantum security mechanisms based on the proposed Lotka-Volterra models. The Second Section analyzes the features of the functioning of social Internet services and establishes their role in ensuring the information security of the state. An approach is proposed to identify signs of threats in the text content of social Internet services, which will allow to quickly respond to changing situations and effectively counteract such threats. A classifier of information security profiles of users of social Internet services has been developed to assess the level of their danger as potential participants in disinformation campaigns. A method for identifying and evaluating the information and psychological impact on user communities in services is proposed. Models of conflict interaction of user groups in social Internet services are considered on the example of civil movements. To effectively counter threats to information security of the state, it is proposed to use the concept of synergistic user interaction and self-organization processes in a virtual community. Particular attention is paid to countering the manipulation of public opinion in the decision-making process by users of social Internet services. The Third Section proposes a biometric security system that works to authenticate users based on a comparison of their fingerprints and certain templates stored in a biometric database. A method for determining the contour based on the passage of a curve and the filtering function of contour lines has been developed. The stage of skeletal identification is analyzed in detail. The Ateb-Gabor method with wave thinning has been developed. The performance of skeletal algorithms such as the Zhang-Suen thinning algorithm, the Hilditch algorithm, and the Ateb-Gabor method with wave decimation is analyzed. The presented results of experiments with biometric fingerprints based on the NIST Special Database 302 database showed the effectiveness of the proposed method. The software and firmware were developed using the Arduino Nano.
- Published
- 2022
25. Development of a concept for building a critical infrastructure facilities security system
- Author
-
Serhii Yevseiev, Yevgen Melenti, Oleksandr Voitko, Vitalii Hrebeniuk, Anna Korchenko, Serhii Mykus, Oleksandr Milov, Oleksandr Prokopenko, Оleksandr Sievierinov, and Dmytro Chopenko
- Subjects
Computer science ,Reliability (computer networking) ,Stability (learning theory) ,Energy Engineering and Power Technology ,Cryptography ,Industrial and Manufacturing Engineering ,Critical infrastructure ,security system ,Management of Technology and Innovation ,T1-995 ,Industry ,Electrical and Electronic Engineering ,Technology (General) ,business.industry ,Applied Mathematics ,Mechanical Engineering ,modeling method ,HD2321-4730.9 ,threat classifier ,Computer Science Applications ,Variety (cybernetics) ,Transformation (function) ,Risk analysis (engineering) ,critical infrastructure ,Control and Systems Engineering ,Threat model ,State (computer science) ,business ,concept - Abstract
To effectively protect critical infrastructure facilities (CIF), it is important to understand the focus of cybersecurity efforts. The concept of building security systems based on a variety of models describing various CIF functioning aspects is presented. The development of the concept is presented as a sequence of solving the following tasks. The basic concepts related to cyberattacks on CIF were determined, which make it possible to outline the boundaries of the problem and determine the level of formalization of the modeling processes. The proposed threat model takes into account possible synergistic/emergent features of the integration of modern target threats and their hybridity. A unified threat base that does not depend on CIF was formed. The concept of modeling the CIF security system was developed based on models of various classes and levels. A method to determine attacker's capabilities was developed. A concept for assessing the CIF security was developed, which allows forming a unified threat base, assessing the signs of their synergy and hybridity, identifying critical CIF points, determining compliance with regulatory requirements and the state of the security system. The mathematical tool and a variety of basic models of the concept can be used for all CIFs, which makes it possible to unify preventive measures and increase the security level. It is proposed to use post-quantum cryptography algorithms on crypto-code structures to provide security services. The proposed mechanisms provide the required stability (230–235group operations), the rate of cryptographic transformation is comparable to block-symmetric ciphers (BSC) and reliability (Perr10–9–10–12)
- Published
- 2021
26. Development of an optimization method for measuring the Doppler frequency of a packet taking into account the fluctuations of the initial phases of its radio pulses
- Author
-
Serhii Yevseiev, Oleksandr Kuznietsov, Sergey Herasimov, Stanislav Horielyshev, Anton Karlov, Ihor Kovalov, Oleksii Kolomiitsev, Olena Lukashuk, Oleksandr Milov, and Vitaliy Panchenko
- Subjects
Acoustics ,Phase (waves) ,doppler frequency ,Energy Engineering and Power Technology ,Signal ,Industrial and Manufacturing Engineering ,rms error ,law.invention ,Quality (physics) ,law ,Management of Technology and Innovation ,T1-995 ,Industry ,Electrical and Electronic Engineering ,Radar ,Root-mean-square deviation ,Technology (General) ,Physics ,Observational error ,Network packet ,Applied Mathematics ,Mechanical Engineering ,HD2321-4730.9 ,Computer Science Applications ,Control and Systems Engineering ,aerodynamic object ,Reflection (physics) ,coherent packet of radio pulses ,radar - Abstract
The necessity of estimating the decrease in the accuracy of measuring the informative parameters of aradar signal in real conditions of its propagation and reflection has been substantiated. The results of the estimation determine the requirements for optimizing this measurement to achieve the required efficiency. A numerical analysis of the decrease in the accuracy of measuring the Doppler frequency of a coherent packet is presented, depending on the statistical characteristics of fluctuations of the initial phases of itsradio pulses. Expressions are given for calculating the fluctuation component of the measurement error ofradio pulse packet frequency for various coefficients of interpulse correlation of phase fluctuations. An assessment is made of the possibility of increasing the accuracy of Doppler frequency measurement, which can be ensured by statistical optimization of the algorithm fortime-frequency processing of a givenradar signal by taking into account its phase fluctuations. The conditions for the multiplicative influence of phase fluctuations ofradio pulses of the received packet are substantiated, which determine the efficiency of optimization of Doppler frequency measurement. Based on the results of the study, an optimization method for measuring the Doppler frequency of the packet taking into account fluctuations in the initial phases of itsradio pulses is proposed. The accuracy of Doppler frequency measurement under the influence of both the internal noise of theradar receiver and the correlated phase fluctuations of itsradio pulses is estimated. The efficiency of optimization of measuring the Doppler frequency of the packet is estimated taking into account fluctuations of the initial phases of itsradio pulses by means of computer simulation. It is proved that, under the influence of phase fluctuations, the accuracy of Doppler frequency measurement can be increased due to the performed optimization from 1.86 to 6.29times. This opens the way to improving the existing algorithms for measuring the highertime range derivatives to improve the quality of tracking complex maneuvering aerodynamic objects. This explains the importance and usefulness of the work for theradar theory.
- Published
- 2021
27. Development of a concept for cybersecurity metrics classification
- Author
-
Yevseiev, Serhii, primary, Milov, Oleksandr, additional, Opirskyy, Ivan, additional, Dunaievska, Olha, additional, Huk, Oleksandr, additional, Pogorelov, Volodymyr, additional, Bondarenko, Kyrylo, additional, Zviertseva, Nataliia, additional, Melenti, Yevgen, additional, and Tomashevsky, Bogdan, additional
- Published
- 2022
- Full Text
- View/download PDF
28. Development of a method for determining the indicators of manipulation based on morphological synthesis
- Author
-
Serhii Yevseiev, Vitaliy Katsalap, Yurii Mikhieiev, Vladyslava Savchuk, Yurii Pribyliev, Oleksandr Milov, Serhii Pohasii, Ivan Opirskyy, Nataliia Lukova-Chuiko, and Ihor Korol
- Subjects
target audience ,Applied Mathematics ,Mechanical Engineering ,Energy Engineering and Power Technology ,morphological synthesis ,information and psychological impact ,Industrial and Manufacturing Engineering ,Computer Science Applications ,Control and Systems Engineering ,Management of Technology and Innovation ,manipulation ,Environmental Chemistry ,Electrical and Electronic Engineering ,content analysis of text messages ,Food Science - Abstract
Research on the development of methods for identifying signs of hidden manipulation (destructive information and psychological impact) in text messages that are published on Internet sites and distributed among users of social networks is relevant. One of the main problems in the development of these methods is the difficulty of formalizing the process of identifying signs of manipulation in text messages of social network agents. To do this, based on morphological synthesis, it is necessary to determine relevant indicators for analyzing text messages and criteria for making a decision about the presence of signs of manipulation in text messages. Based on morphological synthesis, a method for determining manipulation indicators in text messages was developed, taking into account the achievements of modern technologies of intelligent content analysis of text messages, machine learning methods, fuzzy logic and computational linguistics, which made it possible to reasonably determine a group of indicators for evaluating text messages for signs of manipulation. The stages of the method include evaluating the text message at the level of perception by the indicator of text readability, at the phonetic level by the indicator of emotional impact on the subconscious, at the graphic level by the indicator of text marking intensity, and calculating the integral indicator for making a decision about the presence of manipulation in the text message. Based on the proposed method, specialized software was developed that provided 13% greater accuracy in evaluating messages for manipulative impact compared to the known method of expert evaluations, which reduced the influence of the subjective factor on the evaluation result
- Published
- 2022
29. Situational Control of Cyber Security in Socio-Cyber-Physical Systems
- Author
-
Oleksandr Milov, Vladyslav Khvostenko, Voropay Natalia, Olha Korol, and Nataliia Zviertseva
- Published
- 2022
- Full Text
- View/download PDF
30. Development of a method for determining the indicators of manipulation based on morphological synthesis
- Author
-
Yevseiev, Serhii, primary, Katsalap, Vitaliy, additional, Mikhieiev, Yurii, additional, Savchuk, Vladyslava, additional, Pribyliev, Yurii, additional, Milov, Oleksandr, additional, Pohasii, Serhii, additional, Opirskyy, Ivan, additional, Lukova-Chuiko, Nataliia, additional, and Korol, Ihor, additional
- Published
- 2022
- Full Text
- View/download PDF
31. Situational Control of Cyber Security in Socio-Cyber-Physical Systems
- Author
-
Milov, Oleksandr, primary, Khvostenko, Vladyslav, additional, Natalia, Voropay, additional, Korol, Olha, additional, and Zviertseva, Nataliia, additional
- Published
- 2022
- Full Text
- View/download PDF
32. Development of crypto-code constructs based on LDPC codes
- Author
-
Pohasii, Serhii, primary, Yevseiev, Serhii, additional, Zhuchenko, Oleksandr, additional, Milov, Oleksandr, additional, Lysechko, Volodymyr, additional, Kovalenko, Oleksandr, additional, Kostiak, Maryna, additional, Volkov, Andrii, additional, Lezik, Aleksandr, additional, and Susukailo, Vitalii, additional
- Published
- 2022
- Full Text
- View/download PDF
33. Development of the space-time structure of the methodology for modeling the behavior of antagonistic agents of the security system
- Author
-
Oleksandr Milov, Andrii Hrebeniuk, Andrii Nalyvaiko, Elena Nyemkova, Ivan Opirskyy, Igor Pasko, Khazail Rzayev, Anatolii Salii, Uliia Synytsina, and Olha Soloviova
- Subjects
National security ,cybersecurity ,antagonistic agents ,Business process ,Computer science ,020209 energy ,0211 other engineering and technologies ,Energy Engineering and Power Technology ,02 engineering and technology ,Industrial and Manufacturing Engineering ,multiagent systems ,Management of Technology and Innovation ,Component (UML) ,021105 building & construction ,business process contour ,0202 electrical engineering, electronic engineering, information engineering ,T1-995 ,Industry ,Electrical and Electronic Engineering ,Technology (General) ,Structure (mathematical logic) ,modeling methodology ,business.industry ,Applied Mathematics ,Mechanical Engineering ,Space time ,Multi-agent system ,HD2321-4730.9 ,Investment (macroeconomics) ,reflexive agent ,Computer Science Applications ,Risk analysis (engineering) ,Control and Systems Engineering ,business ,Computer technology - Abstract
The rapid development of computer technology, the emergence of modern cyber threats with signs of hybridity and synergy put forward strict requirements for the economic component of national security and especially the processes of ensuring the economy cybersecurity. The cybersecurity industry is trying to meet today's requirements by introducing new and more advanced security technologies and methods, but it is believed that such a universal approach is not enough. The study is devoted to resolving the objective contradiction between the growing practical requirements for an appropriate level of cybersecurity of business process contours while increasing the number and technological complexity of cybersecurity threats. Also the fact that threats acquire hybrid features on the one hand, and imperfection, and sometimes the lack of methodology for modeling the behavior of interacting agents of security systems should be taken into account. However, this does not allow timely prediction of future actions of attackers, and as a result, determining the required level of investment in security, which will provide the required level of cybersecurity. The paper proposes the Concept of modeling the behavior of interacting agents, the basis of which is a three-level structure of modeling the subjects and business processes of the contours of the organization and security system, based on modeling the behavior of antagonistic agents. The proposed methodology for modeling the behavior of interacting agents, which is based on the Concept of behavior of antagonistic agents, allows assessing and increasing the current level of security by reducing the number of hybrid threats by 1.76 times, which reduces losses by 1.65 times and increases the time for choosing threat counteraction means by reducing the time to identify threats online by 38 %
- Published
- 2020
- Full Text
- View/download PDF
34. Разработка методологических принципов построения корпоративной информационно-образовательной системы инновационно-активного университета в условиях противодействия коррупции
- Author
-
Serhii Yevseiev, Olena Rayevnyeva, Volodymir Ponomarenko, and Oleksandr Milov
- Subjects
Knowledge management ,Higher education ,Process (engineering) ,Corruption ,020209 energy ,media_common.quotation_subject ,0211 other engineering and technologies ,innovative and active university ,corporate information and education system ,model of corruption counteraction ,Energy Engineering and Power Technology ,02 engineering and technology ,Certification ,Industrial and Manufacturing Engineering ,Information protection policy ,Hybridity ,Management of Technology and Innovation ,021105 building & construction ,lcsh:Technology (General) ,0202 electrical engineering, electronic engineering, information engineering ,lcsh:Industry ,Electrical and Electronic Engineering ,Management process ,media_common ,business.industry ,Applied Mathematics ,Mechanical Engineering ,Public key infrastructure ,инновационно-активный университет ,корпоративная информационно-образовательная система ,модель обеспечения противодействия коррупции ,Computer Science Applications ,інноваційно-активні й університет ,корпоративна інформаційно-освітня система ,модель забезпечення протидії корупції ,Control and Systems Engineering ,lcsh:T1-995 ,lcsh:HD2321-4730.9 ,Business ,UDC 621.391 - Abstract
Innovative activity of universities and the formation of entrepreneur universities of the innovative type is one of the forms of integration of the higher education systems of countries into the world educational and scientific space, support of their competitiveness. Based on the separation of interaction between universities and the economy and society, an evolutionary model of the university’s interaction with stakeholders was developed. Understanding the new mission of universities made it possible to separate the dominants of activities of an innovative and active university (IAU), to develop a scheme of the interconnection of management processes and its basic functions. The authors’ interpretation of the IAU and the preconditions for constructing a corporate information and education system (CIES) was formed.Given the synergism and hybridity of modern cyber threats, the rise of corruption in the educational sphere, the Anti-corruption concept, which provides countering the elements of corruption and integrated hybrid threats through the construction of an adaptive information protection system (AIPS). The basis of corruption counteraction is the digital signature (DS) of the Key Certification Center (KCC) based on PKI (Public Key Infrastructure). To ensure the security of information resources (IR) of CIES, we proposed a model that makes it possible not only to take into consideration the synergy and hybridity of modern threats but also to form preventive anti-corruption measures. A model for providing anti-corruption measures that reflects the scenarios of the behavior of the participants of the corruption process and the anti-corruption bodies was developed. This makes it possible to assess the dynamics of the distribution of corruption deals over time and by the types of corruption to ensure the effective distribution of the university resources for anti-corruption activities, Инновационная деятельность вузов и формирования предпринимательских университетов инновационного типа является одной из форм интеграции систем высшего образования стран в мировое образовательно-научное пространство, поддержки их конкурентоспособности. На основе выделения спирали взаимодействия университетов с экономикой и социумом, разработана эволюционная модель взаимодействия университета со стейкхолдерами. Понимание новой миссии университетов позволило выделить доминанты деятельности инновационно-активного университета (ИАУ), разработать схему взаимосвязи процессов управления и его основных функций. Сформирована авторская трактовка ИАУ и предпосылки построения корпоративной информационно-образовательной системы (КИОС).Учитывая синергизм и гибридность современных киберугроз, рост коррупции в образовательной сфере, предложена Концепция противодействия коррупции, которая обеспечивает противодействие элементам коррупции и комплексированным гибридным угрозам на основе построения адаптивной системы защиты информации (АСЗИ). Базисом противодействия коррупции является цифровая подпись (ЦП) Центра сертификации ключей (ЦСК) на основе технологии PKI (Public Key Infrastructure). Для обеспечения безопасности информационных ресурсов (ИР) КИОС предложена модель, что позволяет не только учитывать синергизм и гибридность современных угроз, но и формировать превентивные меры противодействия. Разработана модель обеспечения противодействия коррупции, которая отражает сценарии поведения участников коррупционного процесса и органов противодействия. Это позволяет оценить динамику распределения коррупционных сделок во времени и по типам коррупции для обеспечения эффективного распределения ресурсов университета на мероприятия по противодействию коррупции, Інноваційна діяльність закладів вищої освіти (ЗВО) та формування підприємницьких університетів інноваційного типу є однією з форм інтеграції систем вищої освіти країн у світовий освітньо-науковий простір, підтримки їх конкурентоспроможності. На основі виділення спіралі взаємодії університетів з економікою і соціумом, розроблена еволюційна модель взаємодії університету зі стейкхолдерами. Розуміння нової місії університетів дозволило виділити домінанти діяльності інноваційно-активного університету (ІАУ), розробити схему взаємозв'язку процесів управління і його основних функцій. Сформовано авторське трактування ІАУ та передумови побудови корпоративної інформаційно-освітньої системи (КІОС).З огляду на синергізм і гібридність сучасних кіберзагроз, зростання корупції в освітній сфері, запропонована Концепція протидії корупції, що забезпечує протидію елементам корупції і комплексованим гібридним загрозам на основі адаптивної системи захисту інформації (АСЗІ). Базисом протидії корупції є цифровий підпис (ЦП) Центру сертифікації ключів (ЦСК) на основі технології PKI (Public Key Infrastructure). Для забезпечення безпеки інформаційних ресурсів (ІР) КІОС запропонована модель, що дозволяє не тільки враховувати синергізм та гібридність сучасних загроз, а й формувати превентивні заходи протидії їм. Розроблено модель забезпечення протидії корупції, яка відображає сценарії поведінки учасників корупційного процесу і органів протидії. Це дозволяє оцінити динаміку розподілу корупційних угод у часі і за типами корупції для забезпечення ефективного розподілу ресурсів університету на заходи з протидії корупції
- Published
- 2020
35. Development of a modified UMAC algorithm based on cryptocode constructions
- Author
-
Alla Gavrilova, Ihor Volkov, Yuliia Kozhedub, Roman Korolev, Oleksandr Lezik, Volodymyr Medvediev, Oleksandr Milov, Bogdan Tomashevsky, Andrii Trystan, and Oksana Chekunova
- Subjects
modified elliptic codes ,Computer science ,020209 energy ,Hash function ,0211 other engineering and technologies ,Energy Engineering and Power Technology ,umac algorithm ,02 engineering and technology ,Industrial and Manufacturing Engineering ,Public-key cryptography ,authenticity ,Management of Technology and Innovation ,lcsh:Technology (General) ,021105 building & construction ,UMAC ,0202 electrical engineering, electronic engineering, information engineering ,mv2 algorithm (universal damage mechanism) ,lcsh:Industry ,Message authentication code ,Electrical and Electronic Engineering ,crypto-code constructions ,Post-quantum cryptography ,business.industry ,Universal hashing ,Applied Mathematics ,Mechanical Engineering ,hashing algorithm ,post-quantum cryptography ,Computer Science Applications ,elliptic codes ,damaged codes ,Symmetric-key algorithm ,Control and Systems Engineering ,McEliece cryptosystem ,lcsh:T1-995 ,lcsh:HD2321-4730.9 ,business ,Algorithm - Abstract
The development of computer technology has determined the vector for the expansion of services based on the Internet and “G” technologies. The main requirements for modern services in the banking sector are security and reliability. At the same time, security is considered not only as ensuring the confidentiality and integrity of transactions, but also their authenticity. However, in the post-quantum period, US NIST specialists question the durability of modern means of providing basic security services based on symmetric and asymmetric cryptography algorithms. The increase in computing resources allows attackers to use modern threats in combination. Thus, there is a need to search for new and/or modify known algorithms for generating MAC (message authentication codes). In addition, the growth of services increases the amount of information that needs to be authenticated. Among the well-known hash algorithms, the hash functions of universal hashing are distinguished, which allow initially determining the number of collisions and their uniform distribution over the entire set of hash codes. Possibilities of modifying the cascade hashing algorithm UMAC (message authentication code based on universal hashing, universal MAC) based on the use of McEliece crypto-code construction on algebrogeometric (elliptic codes (EC), modified elliptic codes (MEC) and damaged codes (DC). This approach allows preserving the uniqueness property, in contrast to the classical UMAC scheme based on a block symmetric cipher (AES). The presented algorithms for evaluating the properties of universality and strict universality of hash codes make it possible to evaluate the security of the proposed hashing constructs based on universal hash functions, taking into account the preservation of the universality property
- Published
- 2020
- Full Text
- View/download PDF
36. Development of methodological foundations for designing a classifier of threats to cyberphysical systems
- Author
-
Olexander Shmatko, Svitlana Balakireva, Andrii Vlasov, Nataliya Zagorodna, Olha Korol, Oleksandr Milov, Oleksii Petrov, Serhii Pohasii, Khazail Rzayev, and Vladyslav Khvostenko
- Subjects
cybersecurity ,information security ,Computer science ,020209 energy ,0211 other engineering and technologies ,Energy Engineering and Power Technology ,02 engineering and technology ,Computer security ,computer.software_genre ,Industrial and Manufacturing Engineering ,Public-key cryptography ,classifier of threats of cyberphysical systems ,Management of Technology and Innovation ,Economic cost ,lcsh:Technology (General) ,021105 building & construction ,0202 electrical engineering, electronic engineering, information engineering ,Information system ,lcsh:Industry ,Cybernetics ,Electrical and Electronic Engineering ,business.industry ,Applied Mathematics ,Mechanical Engineering ,Social engineering (security) ,Information security ,Computer Science Applications ,Weighting ,Control and Systems Engineering ,lcsh:T1-995 ,lcsh:HD2321-4730.9 ,synergetic model of threats ,business ,computer ,Classifier (UML) - Abstract
The emergence of a full-scale quantum computer questions the stability of almost all symmetric and asymmetric cryptography algorithms. At the same time, the rapid growth of computing resources of IT and “G” technologies contributes to an increase in attacks on information and communication (ICS) and cyberphysical systems (CPS). These systems are the core of modern critical cybernetic information systems (CCIS). In such conditions, the primary task of maintaining the required level of security is the classification of modern threats that are integrated with social engineering methods and acquire signs of synergy and hybridity. The paper proposes a synergistic model of threats to ICS/CPS, which takes into account the focus of threats on synergy and hybridity, and the combined impact of security components: information security (IS), cybersecurity (CS), security of information (SI). This approach allows developing methodological foundations for building a unified classifier of threats to cyberphysical systems, forming sets of critical threats, critical points in the ICS/CPS infrastructure elements, based on minimal computing, human and economic costs. The developed methodology for determining the category of an attacker allows systematizing an attacker and, based on the analysis of weighting factors, forming a matrix of correspondence between the capabilities of attackers of various categories and technical means of information security (TMIS). These actions significantly reduce the risk of an attack by certain categories of attackers and allow for planning in the formation of both the IS policy and the corresponding protection profiles
- Published
- 2020
- Full Text
- View/download PDF
37. Assessment of the uneven use of information resources in the business process circuit
- Author
-
Stanislav Milevskyi, Oleksandr Milov, and Hryhorii Kots
- Subjects
Process management ,Index (economics) ,Business process ,business.industry ,020209 energy ,021105 building & construction ,0211 other engineering and technologies ,0202 electrical engineering, electronic engineering, information engineering ,02 engineering and technology ,Business ,Publication - Abstract
An approach is proposed for assessing the uneven use of information resources in the organization’s business processes. Formal representations of the organization’s business processes and security systems are presented, reflecting both business operations carried out in a certain sequence and information resources that ensure the implementation of the relevant business operations, the place of information resources in the general outline of business processes is indicated. The circuits of the security system business processes of and the business processes of the main object of modeling are considered, including both business processes for managing security and business processes for ensuring security management. The assessment of the non-uniform use of information resources in a business process scheme is based on the consistent construction of an information resource incidence matrix for individual business operations, a frequency relationship matrix reflecting the sharing of information resources, and a matrix of derivatives in a discrete formulation. The proposed approach is demonstrated on a conditional example containing both the notional costs of information resources and weighting factors of the importance of business operations that reflect their criticality in the general contour of business processes. Estimates obtained as a result of applying the approach make it possible to group information resources, focusing on the frequency of their joint use in the business processes, which ultimately makes it possible to justify the choice of information resources for protection against threats from cyber intruders.
- Published
- 2020
- Full Text
- View/download PDF
38. Development and analysis of game-theoretical models of security systems agents interaction
- Author
-
Serhii Yevseiev, Oleksandr Milov, Stanislav Milevskyi, Oleksandr Voitko, Maksym Kasianenko, Yevgen Melenti, Serhii Pohasii, Hrygorii Stepanov, Oleksandr Turinskyi, and Serhii Faraon
- Subjects
game theory ,game equilibrium ,cybersecurity ,Computer science ,020209 energy ,0211 other engineering and technologies ,Energy Engineering and Power Technology ,02 engineering and technology ,Industrial and Manufacturing Engineering ,Field (computer science) ,stackelberg games ,Management of Technology and Innovation ,021105 building & construction ,lcsh:Technology (General) ,0202 electrical engineering, electronic engineering, information engineering ,lcsh:Industry ,Electrical and Electronic Engineering ,Representation (mathematics) ,Scope (project management) ,Applied Mathematics ,Mechanical Engineering ,Scale (chemistry) ,nash games ,Adversary ,Computer Science Applications ,System administrator ,Risk analysis (engineering) ,Control and Systems Engineering ,lcsh:T1-995 ,lcsh:HD2321-4730.9 ,Heuristics ,strategy ,Game theory - Abstract
A game-theoretic approach is presented, which claims to be a universal method for solving most problems in the field of cybersecurity. As arguments to confirm the superiority of game theory, mathematical validity and provability of the optimality of decisions made, unlike the widely used heuristics, the possibility of developing reliable protection based on analytical results, ensuring a timely response to cyberattacks in conditions of limited resources, as well as distributed nature of decision making are highlighted. The definitions of the basic concepts used in security tasks based on game-theoretic models are introduced. The features of the application of game theory methods in the field of cybersecurity are listed and the limitations of research in this area are formulated, namely: a restriction on game strategies, simultaneous moves of players in the behavior patterns of security system agents, uncertainty in the time the players take the move, uncertainty in the final goal of the enemy, unpredictability of further player moves, lack of players’ assessment of enemy resources. as well as its ultimate goals, the inability to timely assess the current state of the game. The game-theoretic models are aligned with the listed security problems, and the main solutions obtained as a result of using the corresponding models are also determined. Many methods of game theory have been formed, for each of which a relationship is determined between the game model, its scope, simulation result and security services that the method under consideration supports. The limitations of the classical representation of game theory models are determined, the need to overcome which follows from the requirements for providing basic security services. Such limitations include: the ability of the defender to detect attacks, the certainty of the probabilities of a change of state before the start of the game, the synchronism of the players’ moves, the inability to scale the model due to the size and complexity of the system under consideration. Models of the main tasks of the interaction of antagonistic agents of security systems have been developed. The resulting models made it possible to obtain solutions to two of the most common tasks in the field of cybersecurity, namely, the interaction of the system administrator and the attacker in organizing the protection of information resources. The tasks are solved for various conditions – the game matrix contains cost estimates of resources and the matrix reflects the probability of threat realization. Pure and mixed strategies are defined for various initial conditions, which allows to exclude from the consideration strategies that are not included in the solution. A synergistic approach to the use of game-theoretic modeling was formed taking into account the behavior of agents of security systems, based on an analysis of the diversity and characteristics of game-theoretic models, their inherent limitations and scope
- Published
- 2020
39. Development of a modification of the method for constructing energy-efficient sensor networks using static and dynamic sensors
- Author
-
Volodymyr Petrivskyi, Viktor Shevchenko, Serhii Yevseiev, Oleksandr Milov, Oleksandr Laptiev, Oleksii Bychkov, Vitalii Fedoriienko, Maksim Tkachenko, Oleg Kurchenko, and Ivan Opirskyy
- Subjects
territory coverage ,Control and Systems Engineering ,Applied Mathematics ,Management of Technology and Innovation ,Mechanical Engineering ,Energy Engineering and Power Technology ,energy efficiency of sensor networks ,Electrical and Electronic Engineering ,optimum flight trajectory ,Industrial and Manufacturing Engineering ,sensor network ,Computer Science Applications - Abstract
Due to the widespread use of sensors and sensor networks in the tasks of territory coverage, the relevant criteria are maximizing coverage and minimizing energy consumption. At the same time, the compliance of the network with these criteria is an urgent problem in the modern technological world. A modification of the method for constructing energy-efficient sensor networks is proposed by introducing an additional criterion for minimizing the number of sensors and limiting the number of sensors used, which allows reducing the energy consumption of sensor networks by 19 %. In the resulting optimization problem, the optimality criteria are the functions of minimizing the area of uncovered territory, the value of energy consumption, and the number of sensors. The optimum solution is formed by pairs of values of the coverage radius and the level of intersection of the coverage areas, which provide maximum coverage while minimizing energy consumption and the number of sensors used. To solve the problem, the parameter convolution method and the genetic algorithm were used. In the case of dynamic sensors, the problem is to find such a trajectory of the sensor that provides the maximum flyby of the territory with a minimum length. A grid algorithm is proposed to find the necessary trajectory. The presented algorithm consists in dividing the territory into nodes and estimating the value of the covered territory by the sensor in this node. After the formation of estimates, the search for a Hamiltonian path was used. The case of a multiply connected territory with the possibility of turning it into a simply connected one is considered. A scheme for finding the parameters of energy-efficient coverage of the territory using static and dynamic sensors is proposed.
- Published
- 2022
40. Development of a modification of the method for constructing energy-efficient sensor networks using static and dynamic sensors
- Author
-
Petrivskyi, Volodymyr, primary, Shevchenko, Viktor, additional, Yevseiev, Serhii, additional, Milov, Oleksandr, additional, Laptiev, Oleksandr, additional, Bychkov, Oleksii, additional, Fedoriienko, Vitalii, additional, Tkachenko, Maksim, additional, Kurchenko, Oleg, additional, and Opirskyy, Ivan, additional
- Published
- 2022
- Full Text
- View/download PDF
41. Modeling of security systems for critical infrastructure facilities
- Author
-
Yevseiev, Serhii, primary, Hryshchuk, Ruslan, additional, Molodetska, Kateryna, additional, Nazarkevych, Mariia, additional, Hrytsyk, Volodymyr, additional, Milov, Oleksandr, additional, Korol, Olha, additional, Milevskyi, Stanislav, additional, Korolev, Roman, additional, Pohasii, Serhii, additional, Tkachov, Andrii, additional, Melenti, Yevgen, additional, Lavrut, Oleksandr, additional, Havrylova, Alla, additional, Herasуmov, Serhii, additional, Holotaistrova, Halyna, additional, Avramenko, Dmytro, additional, Vozniak, Roman, additional, Voitko, Oleksandr, additional, Yerhidzei, Kseniia, additional, Mykus, Serhii, additional, Pribyliev, Yurii, additional, Akhiiezer, Olena, additional, Shyshkin, Mykhailo, additional, Opirskyy, Ivan, additional, Harasymchuk, Oleh, additional, Mykhaylova, Olha, additional, Nakonechnyy, Yuriy, additional, Stakhiv, Marta, additional, and Tomashevsky, Bogdan, additional
- Published
- 2022
- Full Text
- View/download PDF
42. Development of a method for assessing forecast of social impact in regional communities
- Author
-
Yevseiev, Serhii, primary, Ryabukha, Yurii, additional, Milov, Oleksandr, additional, Milevskyi, Stanislav, additional, Pohasii, Serhii, additional, Melenti, Yevgen, additional, Ivanchenko, Yevheniia, additional, Ivanchenko, Ihor, additional, Opirskyy, Ivan, additional, and Pasko, Igor, additional
- Published
- 2021
- Full Text
- View/download PDF
43. Development of a method for assessing the security of cyber-physical systems based on the Lotka–Volterra model
- Author
-
Yevseiev, Serhii, primary, Pohasii, Serhii, additional, Milevskyi, Stanislav, additional, Milov, Oleksandr, additional, Melenti, Yevgen, additional, Grod, Ivan, additional, Berestov, Denis, additional, Fedorenko, Ruslan, additional, and Kurchenko, Oleg, additional
- Published
- 2021
- Full Text
- View/download PDF
44. Development of the interacting agents behavior scenario in the cyber security system
- Author
-
Oleksandr Milov, Serhii Yevseiev, Volodymyr Aleksiyev, Polina Berdnik, Oleksandr Voitko, Valentyn Dyptan, Yevheniia Ivanchenko, Maxim Pavlenko, Anatolii Salii, and Serhiy Yarovyy
- Subjects
Value (ethics) ,Computer science ,Business process ,020209 energy ,agent behavior ,0211 other engineering and technologies ,Energy Engineering and Power Technology ,02 engineering and technology ,Computer security ,computer.software_genre ,Industrial and Manufacturing Engineering ,Development (topology) ,scenario modeling ,Management of Technology and Innovation ,lcsh:Technology (General) ,021105 building & construction ,0202 electrical engineering, electronic engineering, information engineering ,lcsh:Industry ,Scenario analysis ,cybersecurity system ,Electrical and Electronic Engineering ,Information exchange ,Agent behavior ,Applied Mathematics ,Mechanical Engineering ,scenario analysis ,Protection system ,Computer Science Applications ,Control and Systems Engineering ,lcsh:T1-995 ,security systems ,lcsh:HD2321-4730.9 ,computer - Abstract
The results of modeling and analysis of scenarios of the behavior of interacting agents in conditions of cyber conflict are presented. General approaches to the development of a scenario of the behavior of antagonistic agents are presented. The definition of the scenario is given and the factors determining the scenario of behavior are highlighted. The given scenarios are determined by such factors as the ratio of the capabilities of the attacking and the defending sides, the presence or absence of information exchange between security agents, and the time of switching to a new attack vector. The value of the time of switching to a new attack vector is found, at which the interaction is more stable. This indicates that the reaction of the defense side should not be purely reactive, and the “wait and see” strategy is not always the best. Modeling and analysis of the results were carried out in the conditions of information exchange between agents of the protection system and in the absence of such an exchange. The advantages and disadvantages of this behavior are noted. It is shown that when changing the time of switching to a new attack vector, not only the financial indicators of the activity of the participants in cyber conflict change, but also the nature of the interaction. The value of the time of switching to a new attack vector was found, in which the interaction is more stable, which suggests that the reaction of the defense side should not be purely reactive, and the “wait and see” strategy is not always the best. It is shown how the proposed approach can be used to justify the choice of a strategy for agent behavior in security systems, as well as for economic assessments of countermeasures and their deterrent effect on attackers. The proposed scenarios can be considered as a useful tool for assessing investments in the security of the business process circuit by decision makers
- Published
- 2019
- Full Text
- View/download PDF
45. Development of the model of the antagonistic agents behavior under a cyber conflict
- Author
-
Oleksandr Milov, Serhii Yevseiev, Yevheniia Ivanchenko, Stanislav Milevskyi, Oleksandr Nesterov, Oleksandr Puchkov, Anatolii Salii, Oleksandr Timochko, Vitalii Tiurin, and Аleksandr Yarovyi
- Subjects
Business process ,Computer science ,antagonistic agents ,020209 energy ,0211 other engineering and technologies ,Attack tree ,behavior models ,Energy Engineering and Power Technology ,02 engineering and technology ,Industrial and Manufacturing Engineering ,business process loop ,Development (topology) ,Management of Technology and Innovation ,021105 building & construction ,lcsh:Technology (General) ,0202 electrical engineering, electronic engineering, information engineering ,lcsh:Industry ,Model development ,Electrical and Electronic Engineering ,Vulnerability (computing) ,attack tree ,Applied Mathematics ,Mechanical Engineering ,Simulation modeling ,Information security ,Investment (macroeconomics) ,Computer Science Applications ,Risk analysis (engineering) ,Control and Systems Engineering ,lcsh:T1-995 ,lcsh:HD2321-4730.9 - Abstract
The results of the development of the model of the antagonistic agents behavior in a cyber conflict are presented. It is shown that the resulting model can be used to analyze investment processes in security systems, taking into account the assumption that investment processes are significantly influenced by the behavior of parties involved in a cyber conflict. General approaches to model development are presented. First of all, the system of concepts, assumptions and limitations is formed, within the framework of which a mathematical model of behavior must be developed. Taking this into account, the mathematical model of the conflicting agents behavior, presented in the form of algebraic and differential equations, is developed. The developed model presents both the technical characteristics of the security system and the psychological characteristics of the participants in the cyber conflict, which affect the financial characteristics of the investment processes in cybersecurity systems. A distinctive feature of the proposed model is the simultaneous consideration of the behavior of the parties to a cyber conflict not as independent parties, but as agents mutually interacting with each other. The model also makes it possible to simulate the destabilizing effect of the confrontation environment disturbances on the behavior of the conflicting parties, changing the degree of vulnerability of the cybersecurity system along various attack vectors and the level of their success. Using the developed model, simulation modeling of the interacting agents behavior in a cyber conflict is performed. The simulation results showed that even the simplest behavior strategies of the attacking side (“the weakest link”) and the defense side (“wait and see”) make it possible to ensure information security of the business process loop. The developed model of interaction between the attacker and the defender can be considered as a tool for modeling the processes of the conflicting parties behavior when implementing various investment scenarios. The simulation results enable decision-makers to receive support regarding the direction of investment in the security of the business process loop.
- Published
- 2019
46. Development of a methodology for building an information security system in the corporate research and education system in the context of university autonomy
- Author
-
Serhii Yevseiev, Volodymyr Aleksiyev, Svitlana Balakireva, Yevhen Pelesho, Oleksandr Milov, Oleksii Petrov, Olena Rayevnyeva, Bogdan Tomashevsky, Ivan Tyshyk, and Olexander Shmatko
- Subjects
Service (systems architecture) ,Process management ,corporate research and education system ,Higher education ,Computer science ,020209 energy ,0211 other engineering and technologies ,Energy Engineering and Power Technology ,Context (language use) ,02 engineering and technology ,Industrial and Manufacturing Engineering ,Management of Technology and Innovation ,lcsh:Technology (General) ,021105 building & construction ,0202 electrical engineering, electronic engineering, information engineering ,Information system ,lcsh:Industry ,Cybernetics ,Security management ,Electrical and Electronic Engineering ,information security system ,business.industry ,Applied Mathematics ,Mechanical Engineering ,Quality of service ,Information security ,security threat classifier ,Computer Science Applications ,Control and Systems Engineering ,lcsh:T1-995 ,lcsh:HD2321-4730.9 ,business - Abstract
The development of computing tools and technologies of corporate networks has expanded the range of educational and information services in corporate research and education networks (CRES). CRES belong to critical cybernetic information systems (CCIS) built on the basis of open network models. In the early 80s of the 20th century, this approach did not consider the need to build a security system, which does not allow it to provide the required level of protection against modern hybrid threats. The transition to autonomy in decision-making, education and university management all over the world places requirements to ensuring the required quality of service (QoS) of CRES clients. CRES users include university administration, faculty, students and support personnel of educational services in higher education institutions. One of the main criteria for QoS is information security. However, there is no general approach to building integrated information security in CRES, which would provide the required level of security. The methodology is based on the concept of synthesizing a synergistic model of threats to CCIS, improved models of CRES infrastructure, an intruder, assessing the current state of information security (IS) and improved method of investment in the CRES IS. It is shown that the basis of the synergistic model is a three-level model of strategic security management, which provides a synergistic effect in the context of simultaneous threats to information security, cybersecurity and security of information. In contrast to the known, such an approach provides for the determination of qualitatively new and previously unknown emergent properties of the information security system, taking into account the means used to create it. The application of the methodology in practice through the development and implementation of new solutions to provide security services allows for the required level of information security in CRES. The proposed information security service mechanisms are built on hybrid cryptosystems based on crypto-code structures with flawed codes.
- Published
- 2019
- Full Text
- View/download PDF
47. Development of methodology for modeling the interaction of antagonistic agents in cybersecurity systems
- Author
-
Ihor Ivanchenko, Ivan Opirskyy, Oleg Domaskin, Oleksandr Milov, Yevheniia Ivanchenko, Hryhorii Kots, Alexander Voitko, Oleksii Fraze-Frazenko, Iryna Husarova, and Olha Korol
- Subjects
Cognitive model ,Source data ,cybersecurity ,Computer science ,antagonistic agents ,020209 energy ,0211 other engineering and technologies ,Energy Engineering and Power Technology ,02 engineering and technology ,reflective agent ,Computer security ,computer.software_genre ,Industrial and Manufacturing Engineering ,Management of Technology and Innovation ,021105 building & construction ,lcsh:Technology (General) ,0202 electrical engineering, electronic engineering, information engineering ,lcsh:Industry ,multi-agent systems ,Electrical and Electronic Engineering ,Structure (mathematical logic) ,Class (computer programming) ,modeling methodology ,Applied Mathematics ,Mechanical Engineering ,Multi-agent system ,Level of detail (writing) ,cognitive modeling ,Computer Science Applications ,System dynamics ,Control and Systems Engineering ,system dynamics ,lcsh:T1-995 ,lcsh:HD2321-4730.9 ,Game theory ,computer - Abstract
The basic concepts that form the basis of integrated modeling of the behavior of antagonistic agents in cybersecurity systems are identified. It is shown that the emphasis is largely on modeling the behavior of one of the cyber conflict parties only. In the case when the interaction of all parties to the conflict is considered, the approaches used are focused on solving particular problems, or they model a simplified situation. A methodology for modeling the interaction of antagonistic agents in cybersecurity systems, focused on the use of a multi-model complex with elements of cognitive modeling, is proposed. For this objective, the main components of cyber conflict are highlighted, the models of which must be developed. Modeling the interaction of antagonistic agents is proposed to be implemented as a simulation of situations. The concept of a situation is formulated and its components are presented. In the proposed methodology, traditional methods and modeling tools are not opposed, but are considered together, thus forming a unified methodological basis for modeling the antagonistic agents’ behavior. In the proposed multi-model complexes, the individual elements and functions of the entities under study are described using various classes of models at a certain level of detail. Coordinated use of various models allows improving the quality of modeling by compensating for the shortcomings of some models by the advantages of others, in particular, reflecting the dynamics of interaction in system-dynamic and agent-based models, which is difficult in classical models of game theory. Multi-model complexes allow stating the concept of «virtual modeling». This concept allows simulation using models of various classes. The choice of a class of models should correspond to the goals and objectives of modeling, the nature and structure of the source data. As a result of research, a methodology is proposed for modeling the interaction of antagonistic agents in cybersecurity systems using methods based on the proposed models of the reflective behavior of antagonistic agents under modern hybrid threats conditions
- Published
- 2019
48. SYNERGY OF BUILDING CYBERSECURITY SYSTEMS
- Author
-
Serhii Yevseiev, Volodymir Ponomarenko, Oleksandr Laptiev, Oleksandr Milov, Olha Korol, Stanislav Milevskyi, Serhii Pohasii, Andrii Tkachov, Olexander Shmatko, Yevgen Melenti, Оleksandr Sievierinov, Sergey Ostapov, Alla Gavrilova, Oleksii Tsyhanenko, Sergey Herasimov, Elena Nyemkova, Bogdan Tomashevsky, Ivan Hrod, Ivan Opirskyy, Volodymyr Zvieriev, Oleksandr Prokopenko, Vitalii Savchenko, Oleg Barabash, Valentyn Sobchuk, German Shuklin, Vladyslav Khvostenko, Oleksandr Tymochko, Maksim Pavlenko, Andrii Trystan, and Serhii Florov
- Subjects
crypto-code constructions ,Cybersecurity ,modeling of conflict-cooperative interaction ,algebraic geometric codes ,classifiers of cyber threats - Abstract
The development of the modern world community is closely related to advances in computing resources and cyberspace. The formation and expansion of the range of services is based on the achievements of mankind in the field of high technologies. However, the rapid growth of computing resources, the emergence of a full-scale quantum computer tightens the requirements for security systems not only for information and communication systems, but also for cyber-physical systems and technologies. The methodological foundations of building security systems for critical infrastructure facilities based on modeling the processes of behavior of antagonistic agents in security systems are discussed in the first chapter. The concept of information security in social networks, based on mathematical models of data protection, taking into account the influence of specific parameters of the social network, the effects on the network are proposed in second chapter. The nonlinear relationships of the parameters of the defense system, attacks, social networks, as well as the influence of individual characteristics of users and the nature of the relationships between them, takes into account. In the third section, practical aspects of the methodology for constructing post-quantum algorithms for asymmetric McEliece and Niederreiter cryptosystems on algebraic codes (elliptic and modified elliptic codes), their mathematical models and practical algorithms are considered. Hybrid crypto-code constructions of McEliece and Niederreiter on defective codes are proposed. They can significantly reduce the energy costs for implementation, while ensuring the required level of cryptographic strength of the system as a whole. The concept of security of corporate information and educational systems based on the construction of an adaptive information security system is proposed.
- Published
- 2021
49. Development of a concept for building a critical infrastructure facilities security system
- Author
-
Yevseiev, Serhii, primary, Melenti, Yevgen, additional, Voitko, Oleksandr, additional, Hrebeniuk, Vitalii, additional, Korchenko, Anna, additional, Mykus, Serhii, additional, Milov, Oleksandr, additional, Prokopenko, Oleksandr, additional, Sievierinov, Оleksandr, additional, and Chopenko, Dmytro, additional
- Published
- 2021
- Full Text
- View/download PDF
50. Tokenization of educational assets based on blockchain technologies
- Author
-
Shmatko, Olexander, primary, Borova, Tetyana, additional, Yevseiev, Serhii, additional, and Milov, Oleksandr, additional
- Published
- 2021
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.