Pub Date : 2026-02-24DOI: 10.3103/S0146411625701044
M. O. Kalinin, A. S. Konoplev
The mining algorithm in smart city blockchain systems using the Proof-of-Work consensus mechanism is studied. Well-known studies in the field of selfish mining detection are analyzed. A method for protecting a blockchain from selfish mining attacks is presented, and a selfish mining detection plugin is developed based on this method. This plugin is designed for miner software and enables the analysis of data patterns received from the mining pool. The proposed solution outperforms existing selfish mining detectors by identifying the attacking mining pool and has lower error rates.
{"title":"Protecting Smart City Blockchain Systems from Selfish Mining Attacks","authors":"M. O. Kalinin, A. S. Konoplev","doi":"10.3103/S0146411625701044","DOIUrl":"10.3103/S0146411625701044","url":null,"abstract":"<p>The mining algorithm in smart city blockchain systems using the Proof-of-Work consensus mechanism is studied. Well-known studies in the field of selfish mining detection are analyzed. A method for protecting a blockchain from selfish mining attacks is presented, and a selfish mining detection plugin is developed based on this method. This plugin is designed for miner software and enables the analysis of data patterns received from the mining pool. The proposed solution outperforms existing selfish mining detectors by identifying the attacking mining pool and has lower error rates.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"59 8","pages":"1484 - 1490"},"PeriodicalIF":0.5,"publicationDate":"2026-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147341470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-02-24DOI: 10.3103/S0146411625701111
A. D. Dakhnovich, V. M. Bogina, A. A. Makeeva
This paper presents a study of the application of large language models (LLMs) to predict events based on LLM agents—autonomous systems that use LLMs for reasoning, decision making, and interaction with the environment. Various architectures of LLM agents are analyzed: cooperative systems (ChatDev, MetaGPT), multiagent debates (MAD, ChatEval), agents for web tasks (WebAgent, WebVoyager), and simulation agents (Generative Agents, EconAgent). Particular attention is paid to the features of predictive modeling based on LLMs, where classical approaches (regression, time series) are replaced by agent-based modeling and predictive engineering. This article presents the results of an experiment on predicting the outcome of a selected conflict using an LLM agent (Mistral, DeepSeek) and the retrieval-augmented generation (RAG) approach based on data from analytical agencies, opinion leaders, and news sources. The convergence of forecast estimates of polarized sources is revealed and requirements for forecasting systems are formulated: weighting sources according to expert significance, filtering neutral data, and sample balancing. Requirements are put forward for the selection of data assessed by simulation LLM agents.
{"title":"Application of Large Language Models in the Problem of Event Forecasting","authors":"A. D. Dakhnovich, V. M. Bogina, A. A. Makeeva","doi":"10.3103/S0146411625701111","DOIUrl":"10.3103/S0146411625701111","url":null,"abstract":"<p>This paper presents a study of the application of large language models (LLMs) to predict events based on LLM agents—autonomous systems that use LLMs for reasoning, decision making, and interaction with the environment. Various architectures of LLM agents are analyzed: cooperative systems (ChatDev, MetaGPT), multiagent debates (MAD, ChatEval), agents for web tasks (WebAgent, WebVoyager), and simulation agents (Generative Agents, EconAgent). Particular attention is paid to the features of predictive modeling based on LLMs, where classical approaches (regression, time series) are replaced by agent-based modeling and predictive engineering. This article presents the results of an experiment on predicting the outcome of a selected conflict using an LLM agent (Mistral, DeepSeek) and the retrieval-augmented generation (RAG) approach based on data from analytical agencies, opinion leaders, and news sources. The convergence of forecast estimates of polarized sources is revealed and requirements for forecasting systems are formulated: weighting sources according to expert significance, filtering neutral data, and sample balancing. Requirements are put forward for the selection of data assessed by simulation LLM agents.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"59 8","pages":"1536 - 1543"},"PeriodicalIF":0.5,"publicationDate":"2026-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147341471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-02-24DOI: 10.3103/S0146411625700919
I. A. Sikarev, T. M. Tatarnikova, V. M. Abramov
The problem of optimizing neural networks for large language models (LLMs) such as ChatGPT is discussed. One of the directions being developed for optimizing LLMs is knowledge distillation—the transfer of knowledge from a large teacher model to a smaller student model without significant loss of accuracy of the result. The existing methods of knowledge distillation have certain disadvantages: inaccurate knowledge transfer, long learning process, and error accumulation in long sequences. A combination of methods that contribute to improving the quality of knowledge distillation is considered: selective teacher intervention in the student’s learning process and low-rank adaptation. The proposed combination of knowledge distillation methods can be applied to problems with limited computational resources.
{"title":"Combination of Methods for Selective Teacher Intervention in the Student’s Learning Process and Low-Rank Adaptation in the Knowledge Distillation Models","authors":"I. A. Sikarev, T. M. Tatarnikova, V. M. Abramov","doi":"10.3103/S0146411625700919","DOIUrl":"10.3103/S0146411625700919","url":null,"abstract":"<p>The problem of optimizing neural networks for large language models (LLMs) such as ChatGPT is discussed. One of the directions being developed for optimizing LLMs is knowledge distillation—the transfer of knowledge from a large teacher model to a smaller student model without significant loss of accuracy of the result. The existing methods of knowledge distillation have certain disadvantages: inaccurate knowledge transfer, long learning process, and error accumulation in long sequences. A combination of methods that contribute to improving the quality of knowledge distillation is considered: selective teacher intervention in the student’s learning process and low-rank adaptation. The proposed combination of knowledge distillation methods can be applied to problems with limited computational resources.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"59 8","pages":"1364 - 1370"},"PeriodicalIF":0.5,"publicationDate":"2026-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147341588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-02-24DOI: 10.3103/S0146411625700981
P. E. Yugai
A study of adversarial attacks on classical machine learning (ML) algorithms in the context of network threat detection is presented. An overview of ML models that are used to perform various tasks in computer network security systems is presented. A formal description of the threat model is provided, as well as a classification of adversarial attacks. The network traffic of the WEB-IDS23 dataset was classified using classical machine learning models: k-nearest neighbors (KNN), Random Forest (RF), and Support Vector Machine (SVM). Adversarial attacks such as the fast gradient sign method (FGSM), projected gradient descent, Carlini & Wagner (C & W), and DeepFool are implemented on these ML algorithms. The impact of the adversarial attacks implemented on listed classical machine learning algorithms is analyzed.
{"title":"Study of Adversarial Attacks on Classical Machine Learning Models in the Context of Network Threat Detection","authors":"P. E. Yugai","doi":"10.3103/S0146411625700981","DOIUrl":"10.3103/S0146411625700981","url":null,"abstract":"<p>A study of adversarial attacks on classical machine learning (ML) algorithms in the context of network threat detection is presented. An overview of ML models that are used to perform various tasks in computer network security systems is presented. A formal description of the threat model is provided, as well as a classification of adversarial attacks. The network traffic of the WEB-IDS23 dataset was classified using classical machine learning models: k-nearest neighbors (KNN), Random Forest (RF), and Support Vector Machine (SVM). Adversarial attacks such as the fast gradient sign method (FGSM), projected gradient descent, Carlini & Wagner (C & W), and DeepFool are implemented on these ML algorithms. The impact of the adversarial attacks implemented on listed classical machine learning algorithms is analyzed.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"59 8","pages":"1426 - 1439"},"PeriodicalIF":0.5,"publicationDate":"2026-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147341591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-02-24DOI: 10.3103/S0146411625700804
T. D. Ovasapyan, D. A. Gavrichkov, D. V. Ivanov
The architecture of large language models (LLMs) and the possibility of their application to automate fuzz testing software are studied. As a result of the study, a method is developed that enables fuzz testing applications with a graphical interface in the Windows operating system. A software prototype implementing the proposed method is developed and tested.
{"title":"Fuzz Testing of Closed-Source Software Using Large Language Models","authors":"T. D. Ovasapyan, D. A. Gavrichkov, D. V. Ivanov","doi":"10.3103/S0146411625700804","DOIUrl":"10.3103/S0146411625700804","url":null,"abstract":"<p>The architecture of large language models (LLMs) and the possibility of their application to automate fuzz testing software are studied. As a result of the study, a method is developed that enables fuzz testing applications with a graphical interface in the Windows operating system. A software prototype implementing the proposed method is developed and tested.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"59 8","pages":"1278 - 1284"},"PeriodicalIF":0.5,"publicationDate":"2026-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147341651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-02-24DOI: 10.3103/S0146411625700713
V. O. Erastov, E. A. Zubkov, D. P. Zegzhda
The existing approaches to building active auditing systems for Internet-of-Things (IoT) devices are studied. A robust approach to auditing IoT devices using fault-tolerant distribution is proposed. A comparative analysis of consensus-achieving algorithms in distributed systems and means of implementing active auditing is conducted.
{"title":"Study of the Problems of Information-Security Auditing of Geographically Distributed Internet-of-Things Devices","authors":"V. O. Erastov, E. A. Zubkov, D. P. Zegzhda","doi":"10.3103/S0146411625700713","DOIUrl":"10.3103/S0146411625700713","url":null,"abstract":"<p>The existing approaches to building active auditing systems for Internet-of-Things (IoT) devices are studied. A robust approach to auditing IoT devices using fault-tolerant distribution is proposed. A comparative analysis of consensus-achieving algorithms in distributed systems and means of implementing active auditing is conducted.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"59 8","pages":"1201 - 1208"},"PeriodicalIF":0.5,"publicationDate":"2026-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147341755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-02-24DOI: 10.3103/S0146411625700774
R. A. Ognev, D. P. Zegzhda
A systematic analysis of methods for evaluating the effectiveness of fuzzers is conducted. A minimal but complete set of metrics is identified: branch coverage, number of unique crashes, and time to first crash. A normalized integral indicator is proposed that allows post hoc comparison of the results of different tools without reruns.
{"title":"Generalized Method for Comparative Analysis of Fuzz-Testing Tools","authors":"R. A. Ognev, D. P. Zegzhda","doi":"10.3103/S0146411625700774","DOIUrl":"10.3103/S0146411625700774","url":null,"abstract":"<p>A systematic analysis of methods for evaluating the effectiveness of fuzzers is conducted. A minimal but complete set of metrics is identified: branch coverage, number of unique crashes, and time to first crash. A normalized integral indicator is proposed that allows post hoc comparison of the results of different tools without reruns.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"59 8","pages":"1253 - 1259"},"PeriodicalIF":0.5,"publicationDate":"2026-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147341760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-02-24DOI: 10.3103/S0146411625701020
M. A. Poltavtseva, O. A. Izotova, D. V. Ivanov, D. P. Zegzhda
This paper studies the problem of reducing the attack surface from an internal attacker in heterogeneous systems for processing and storing big data by selecting the optimal data obfuscation method based on anonymization technologies. The study analyzes the terminology and systematizes data-hiding methods to reduce the attack surface in big data processing and storage systems. A formal formulation of the problem of finding the optimal data obfuscation method and an algorithm for solving it across various types of datasets are proposed, taking into account evaluation criteria specific to each class of methods. The implementation of a software prototype for supporting decision-making and selecting the optimal method for solving practical problems is described. Experimental testing and analysis of its results are carried out.
{"title":"Optimization of Data Obfuscation in Big Data Processing and Storage Systems","authors":"M. A. Poltavtseva, O. A. Izotova, D. V. Ivanov, D. P. Zegzhda","doi":"10.3103/S0146411625701020","DOIUrl":"10.3103/S0146411625701020","url":null,"abstract":"<p>This paper studies the problem of reducing the attack surface from an internal attacker in heterogeneous systems for processing and storing big data by selecting the optimal data obfuscation method based on anonymization technologies. The study analyzes the terminology and systematizes data-hiding methods to reduce the attack surface in big data processing and storage systems. A formal formulation of the problem of finding the optimal data obfuscation method and an algorithm for solving it across various types of datasets are proposed, taking into account evaluation criteria specific to each class of methods. The implementation of a software prototype for supporting decision-making and selecting the optimal method for solving practical problems is described. Experimental testing and analysis of its results are carried out.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"59 8","pages":"1464 - 1474"},"PeriodicalIF":0.5,"publicationDate":"2026-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147341526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-02-24DOI: 10.3103/S014641162570107X
S. V. Kornienko, S. E. Adadurov, A. A. Kornienko, E. D. Osipenko
The main biometric characteristics reflecting changes in the psycho-emotional state of a user of an information system are examined. They are ranked using the pairwise comparison method, as a result of which voice and keystroke dynamics are identified as most suitable for further research. Criteria for the preliminary identification of potential internal information security violators based on changes in the considered biometric characteristics are defined. A convolutional neural network model is developed and tested to solve the stated problem.
{"title":"Analysis of the Potential for Using Biometric Characteristics to Identify Insider Threats Based on Psycho-Emotional State","authors":"S. V. Kornienko, S. E. Adadurov, A. A. Kornienko, E. D. Osipenko","doi":"10.3103/S014641162570107X","DOIUrl":"10.3103/S014641162570107X","url":null,"abstract":"<p>The main biometric characteristics reflecting changes in the psycho-emotional state of a user of an information system are examined. They are ranked using the pairwise comparison method, as a result of which voice and keystroke dynamics are identified as most suitable for further research. Criteria for the preliminary identification of potential internal information security violators based on changes in the considered biometric characteristics are defined. A convolutional neural network model is developed and tested to solve the stated problem.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"59 8","pages":"1504 - 1511"},"PeriodicalIF":0.5,"publicationDate":"2026-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147341578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-02-24DOI: 10.3103/S0146411625700889
T. D. Ovasapyan, D. A. Ponomarev, D. V. Ivanov, E. V. Zavadskii
The principles of construction and operation of honeypot systems are studied. Existing detection methods are analyzed, and their advantages and disadvantages are highlighted. A detection method based on the analysis of command execution delays is proposed. A universal detection method based on combining the results of the methods is proposed. A software prototype of the detection system is developed and tested.
{"title":"Detection of Honeypot Systems Based on a Comprehensive Analysis of Node Performance Indicators","authors":"T. D. Ovasapyan, D. A. Ponomarev, D. V. Ivanov, E. V. Zavadskii","doi":"10.3103/S0146411625700889","DOIUrl":"10.3103/S0146411625700889","url":null,"abstract":"<p>The principles of construction and operation of honeypot systems are studied. Existing detection methods are analyzed, and their advantages and disadvantages are highlighted. A detection method based on the analysis of command execution delays is proposed. A universal detection method based on combining the results of the methods is proposed. A software prototype of the detection system is developed and tested.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"59 8","pages":"1338 - 1344"},"PeriodicalIF":0.5,"publicationDate":"2026-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147341581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}