首页 > 最新文献

Theoretical and applied cybersecurity最新文献

英文 中文
Mathematical Model of the Process of Raising Integers to an Arbitrary Power of a Natural Number in the System of Residual Classes 残馀类系统中整数取自然数任意幂过程的数学模型
Pub Date : 2023-11-06 DOI: 10.20535/tacs.2664-29132023.2.278891
Alina Yanko, Dmytro Kovalchuk
It is known that the use of a non-positional number system in residual classes (SRC) in computer systems (CS) can significantly increase the speed of the implementation of integer arithmetic operations. The use of such properties of a non-positional number system in the SRC as independence, equality and low-bitness (low-digit capacity) of the residues that define the non-positional code data structure of the SRC provides high user performance for the implementation in the CS of computational algorithms consisting of a set of arithmetic (modular) operations. The greatest efficiency from the use of the SRC is achieved when the implemented algorithms consist of a set of arithmetic operations such as addition, multiplication and subtraction. There is a large class of algorithms and tasks (tasks of implementing cryptoalgorithms, optimization tasks, computational tasks of large dimension, etc.), where, in addition to performing integer arithmetic operations of addition, subtraction, multiplication, raising integers modulo and others in a positive numerical range, there is a need to implement the listed above arithmetic and other operations, in the negative numerical range. The need to perform these operations in a negative numerical range significantly reduces the overall efficiency of using the SRC as a number system of the CS. In this aspect, the lack of a mathematical model for the process of raising integers in the SRC in the negative numerical region makes it difficult to develop methods and procedures for raising integers to an arbitrary power of a natural number in the SRC, both in positive and negative numerical ranges. The purpose of the article is the synthesis of a mathematical model of the process of raising integers to an arbitrary power of a natural number in the SRC, both in positive and negative numerical ranges.
在计算机系统(CS)的残差类(SRC)中使用非位置数系统可以显著提高整数算术运算的实现速度。在SRC中使用非位置数系统的这些属性,如定义SRC的非位置代码数据结构的残数的独立性、相等性和低位(低位数容量),为在CS中实现由一组算术(模块化)操作组成的计算算法提供了高的用户性能。当实现的算法由一组算术运算(如加法、乘法和减法)组成时,使用SRC的效率最高。有一大类算法和任务(实现密码算法的任务、优化任务、大维计算任务等),其中除了在正数值范围内执行加、减、乘、取整数模等整数算术运算外,还需要在负数值范围内实现上述算法和其他运算。在负值范围内执行这些操作的需要大大降低了使用SRC作为CS的数字系统的整体效率。在这方面,由于在SRC中整数在负数区域的取整过程缺乏数学模型,因此很难开发出在SRC中整数在正负数值范围内取自然数任意幂的方法和程序。本文的目的是在SRC中将整数提高到自然数的任意幂的过程的数学模型的综合,包括正数和负数范围。
{"title":"Mathematical Model of the Process of Raising Integers to an Arbitrary Power of a Natural Number in the System of Residual Classes","authors":"Alina Yanko, Dmytro Kovalchuk","doi":"10.20535/tacs.2664-29132023.2.278891","DOIUrl":"https://doi.org/10.20535/tacs.2664-29132023.2.278891","url":null,"abstract":"It is known that the use of a non-positional number system in residual classes (SRC) in computer systems (CS) can significantly increase the speed of the implementation of integer arithmetic operations. The use of such properties of a non-positional number system in the SRC as independence, equality and low-bitness (low-digit capacity) of the residues that define the non-positional code data structure of the SRC provides high user performance for the implementation in the CS of computational algorithms consisting of a set of arithmetic (modular) operations. The greatest efficiency from the use of the SRC is achieved when the implemented algorithms consist of a set of arithmetic operations such as addition, multiplication and subtraction. There is a large class of algorithms and tasks (tasks of implementing cryptoalgorithms, optimization tasks, computational tasks of large dimension, etc.), where, in addition to performing integer arithmetic operations of addition, subtraction, multiplication, raising integers modulo and others in a positive numerical range, there is a need to implement the listed above arithmetic and other operations, in the negative numerical range. The need to perform these operations in a negative numerical range significantly reduces the overall efficiency of using the SRC as a number system of the CS. In this aspect, the lack of a mathematical model for the process of raising integers in the SRC in the negative numerical region makes it difficult to develop methods and procedures for raising integers to an arbitrary power of a natural number in the SRC, both in positive and negative numerical ranges. The purpose of the article is the synthesis of a mathematical model of the process of raising integers to an arbitrary power of a natural number in the SRC, both in positive and negative numerical ranges.","PeriodicalId":471817,"journal":{"name":"Theoretical and applied cybersecurity","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135724226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Method of Security Improvement for MST3 Cryptosystem Based on Automorphism Group of Ree Function Field 基于自由函数域自同构群的MST3密码系统安全性改进方法
Pub Date : 2023-11-06 DOI: 10.20535/tacs.2664-29132023.2.290414
Yevgen Kotukh, Gennady Khalimov, Maxim Korobchinskiy
This article is a part of a research endeavor focused on creating a quantum-resistant cryptosystem for secure encryption and decryption. Our approach employs a challenging word problem while emphasizing cost-effective implementation. Previous research has involved the development of encryption schemes based on high-order groups, offering potential security enhancements. The choice of the non-abelian group is a critical factor in shaping the encryption algorithms, feasibility of implementation, and system parameters. Our central objective is to design a cryptosystem that effectively thwarts quantum cryptanalysis. To achieve this, we employ a logarithmic signature along with a random cover across an entire finite non-abelian group. Our unique contribution lies in optimizing finite group selection, parameters, and circuit solutions for the logarithmic signature to meet specific security and implementation criteria. Within this paper, we introduce an encryption scheme utilizing automorphisms of the Ree functional field and propose a method for enhancing resistance to cryptanalysis through the binding of session keys.
& # x0D;& # x0D;& # x0D;本文是一项研究工作的一部分,重点是创建用于安全加密和解密的抗量子密码系统。我们的方法采用了一个具有挑战性的问题,同时强调成本效益的实施。先前的研究涉及基于高阶组的加密方案的开发,提供潜在的安全性增强。非阿贝尔群的选择是形成加密算法、实现可行性和系统参数的关键因素。我们的中心目标是设计一个有效地阻止量子密码分析的密码系统。为了实现这一点,我们在整个有限非阿贝尔群上使用对数签名和随机覆盖。我们的独特贡献在于优化对数签名的有限群选择,参数和电路解决方案,以满足特定的安全和实现标准。在本文中,我们引入了一种利用Ree函数域自同构的加密方案,并提出了一种通过会话密钥绑定来增强抗密码分析能力的方法。 & # x0D;& # x0D;
{"title":"Method of Security Improvement for MST3 Cryptosystem Based on Automorphism Group of Ree Function Field","authors":"Yevgen Kotukh, Gennady Khalimov, Maxim Korobchinskiy","doi":"10.20535/tacs.2664-29132023.2.290414","DOIUrl":"https://doi.org/10.20535/tacs.2664-29132023.2.290414","url":null,"abstract":"
 
 
 This article is a part of a research endeavor focused on creating a quantum-resistant cryptosystem for secure encryption and decryption. Our approach employs a challenging word problem while emphasizing cost-effective implementation. Previous research has involved the development of encryption schemes based on high-order groups, offering potential security enhancements. The choice of the non-abelian group is a critical factor in shaping the encryption algorithms, feasibility of implementation, and system parameters. Our central objective is to design a cryptosystem that effectively thwarts quantum cryptanalysis. To achieve this, we employ a logarithmic signature along with a random cover across an entire finite non-abelian group. Our unique contribution lies in optimizing finite group selection, parameters, and circuit solutions for the logarithmic signature to meet specific security and implementation criteria. Within this paper, we introduce an encryption scheme utilizing automorphisms of the Ree functional field and propose a method for enhancing resistance to cryptanalysis through the binding of session keys.
 
 
","PeriodicalId":471817,"journal":{"name":"Theoretical and applied cybersecurity","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135724227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptanalysis of the «Vershyna» digital signature algorithm “Vershyna”数字签名算法的密码分析
Pub Date : 2023-11-06 DOI: 10.20535/tacs.2664-29132023.2.288499
Andrii Fesenko, Yuliia Lytvynenko
The CRYSTALS-Dilithium digital signature algorithm, which was selected as the prototype of the new «Vershyna» digital signature algorithm, is analyzed in this paper. The characteristics of the National Digital Signature Standard Project and the construction of the «Vershyna» algorithm are also presented. During the analysis of the project, the predicted number of iterations that the algorithm must perform to create the correct signature was calculated. In addition, basic theoretical information about the structure of Fiat-Shamir with aborts and its security in quantum and classical models oracle models is also provided. We obtain our own results on the resistance of the «Vershyna» algorithm to the attack without the use of a message in classical and quantum oracle models. The resistance of the «Vershyna» algorithm to a key recovery attack is based on the assumption of the hardness of the MLWE~problem, and the resistance to existential signature forgery is based on the assumption of the hardness of the MSIS~problem. In this work, the expected level of hardness of SIS~and LWE~problems is calculated, to which there are reductions from MSIS~and MLWE~problems.
本文分析了作为新型“Vershyna”数字签名算法原型的CRYSTALS-Dilithium数字签名算法。介绍了国家数字签名标准项目的特点和“Vershyna”算法的构造。在项目分析期间,计算了算法为创建正确签名必须执行的预测迭代次数。此外,还提供了在量子模型和经典模型中具有中止的Fiat-Shamir结构及其安全性的基本理论信息。我们在经典和量子预言模型中不使用消息的情况下获得了«Vershyna»算法对攻击的抵抗力的结果。«Vershyna»算法对密钥恢复攻击的抵抗力是基于对MLWE~问题硬度的假设,而对存在签名伪造的抵抗力是基于对MSIS~问题硬度的假设。在这项工作中,计算了SIS~和LWE~问题的期望硬度水平,其中有MSIS~和MLWE~问题的降低。
{"title":"Cryptanalysis of the «Vershyna» digital signature algorithm","authors":"Andrii Fesenko, Yuliia Lytvynenko","doi":"10.20535/tacs.2664-29132023.2.288499","DOIUrl":"https://doi.org/10.20535/tacs.2664-29132023.2.288499","url":null,"abstract":"The CRYSTALS-Dilithium digital signature algorithm, which was selected as the prototype of the new «Vershyna» digital signature algorithm, is analyzed in this paper. The characteristics of the National Digital Signature Standard Project and the construction of the «Vershyna» algorithm are also presented. During the analysis of the project, the predicted number of iterations that the algorithm must perform to create the correct signature was calculated. In addition, basic theoretical information about the structure of Fiat-Shamir with aborts and its security in quantum and classical models oracle models is also provided. We obtain our own results on the resistance of the «Vershyna» algorithm to the attack without the use of a message in classical and quantum oracle models. The resistance of the «Vershyna» algorithm to a key recovery attack is based on the assumption of the hardness of the MLWE~problem, and the resistance to existential signature forgery is based on the assumption of the hardness of the MSIS~problem. In this work, the expected level of hardness of SIS~and LWE~problems is calculated, to which there are reductions from MSIS~and MLWE~problems.","PeriodicalId":471817,"journal":{"name":"Theoretical and applied cybersecurity","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135724218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity in AI-Driven Casual Network Formation 人工智能驱动的休闲网络形成中的网络安全
Pub Date : 2023-11-06 DOI: 10.20535/tacs.2664-29132023.2.287139
Dmytro Lande, Anatolii Feher, Leonard Strashnoy
The paper describes a methodology for forming thematic causal networks using artificial intelligence and automating the processes of their visualization. The presented methodology is considered on the example of ChatGPT, as an artificial intelligence for analyzing the space of texts and building concepts of causal relationships, and their further visualization is demonstrated on the example of Gephi and CSV2Graph programs. The effectiveness of the disaggregated method in relation to traditional methods for solving such problems is shown by integrating the means of intelligent text analytics and graphical network analysis on the example of the problem of data leakage in information systems and a selection of news clippings on the selected topic.
本文描述了一种利用人工智能形成主题因果网络并使其可视化过程自动化的方法。本文提出的方法以ChatGPT为例,作为分析文本空间和构建因果关系概念的人工智能,并以Gephi和CSV2Graph程序为例进行了进一步的可视化演示。通过集成智能文本分析和图形网络分析的手段,以信息系统中的数据泄漏问题为例,并选择有关选定主题的新闻剪报,显示了与解决此类问题的传统方法相比,分类方法的有效性。
{"title":"Cybersecurity in AI-Driven Casual Network Formation","authors":"Dmytro Lande, Anatolii Feher, Leonard Strashnoy","doi":"10.20535/tacs.2664-29132023.2.287139","DOIUrl":"https://doi.org/10.20535/tacs.2664-29132023.2.287139","url":null,"abstract":"The paper describes a methodology for forming thematic causal networks using artificial intelligence and automating the processes of their visualization. The presented methodology is considered on the example of ChatGPT, as an artificial intelligence for analyzing the space of texts and building concepts of causal relationships, and their further visualization is demonstrated on the example of Gephi and CSV2Graph programs. The effectiveness of the disaggregated method in relation to traditional methods for solving such problems is shown by integrating the means of intelligent text analytics and graphical network analysis on the example of the problem of data leakage in information systems and a selection of news clippings on the selected topic.","PeriodicalId":471817,"journal":{"name":"Theoretical and applied cybersecurity","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135724224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vulnerability classification using Q-analysis 使用q分析进行漏洞分类
Pub Date : 2023-11-06 DOI: 10.20535/tacs.2664-29132023.2.285431
Viktoriia Igorivna Polutsyhanova
Today, vulnerability analysis is of great importance in assessing system security. This approach is especially important in cyber systems. The complex relationship between vulnerabilities is dictated by the threats that potentially arise from their presence. The work provides a methodology and an example of building, analyzing and classifying vulnerabilities depending on the threats that they generate. This approach will allow a better understanding of the connections between vulnerabilities, as well as the degree of impact of each of them.
目前,漏洞分析在系统安全评估中占有重要地位。这种方法在网络系统中尤为重要。漏洞之间的复杂关系取决于它们的存在可能产生的威胁。这项工作提供了一种方法和一个例子,根据它们产生的威胁来构建、分析和分类漏洞。这种方法可以更好地理解漏洞之间的联系,以及每个漏洞的影响程度。
{"title":"Vulnerability classification using Q-analysis","authors":"Viktoriia Igorivna Polutsyhanova","doi":"10.20535/tacs.2664-29132023.2.285431","DOIUrl":"https://doi.org/10.20535/tacs.2664-29132023.2.285431","url":null,"abstract":"Today, vulnerability analysis is of great importance in assessing system security. This approach is especially important in cyber systems. The complex relationship between vulnerabilities is dictated by the threats that potentially arise from their presence. The work provides a methodology and an example of building, analyzing and classifying vulnerabilities depending on the threats that they generate. This approach will allow a better understanding of the connections between vulnerabilities, as well as the degree of impact of each of them.","PeriodicalId":471817,"journal":{"name":"Theoretical and applied cybersecurity","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135724221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Unauthorized Actions in Networks Using Wavelet Analysis 基于小波分析的网络非法行为检测
Pub Date : 2023-11-06 DOI: 10.20535/tacs.2664-29132023.2.277621
Pavlo Hrynchenko
Signal processing techniques are used to analyze and detect network anomalies because of their ability to detect new and unknown intrusions. The paper proposes a method of modeling network signals for the detection of network anomalies, which combines wavelet approximation and the theory of system identification. To characterize the behavior of network traffic, fifteen functions are provided, which are used as input signals within the system. At the same time, it is assumed that security violations within the network can be detected by checking abnormal patterns of system functioning according to audit data. Despite the fact that machine learning methods have achieved significant results in detecting network anomalies, they still face the difficulty of using the implemented algorithms, in the presence of differences in the behavior of the training data and test data, which in turn leads to inefficient performance of the algorithms. This effect is exacerbated by the limitation of algorithms to detect previously unknown types of attacks due to the large number of false positives. The paper develops a new method of modeling network signals for detecting anomalies in networks using wavelet analysis. In particular, the general architecture of the approach consists of three components: feature analysis, modeling of normal network traffic based on wavelet approximation and prediction using ARX model, intrusion or non-intrusion decision making The result is evaluated using the DARPA intrusion detection dataset, which performs a comprehensive analysis of the intrusions in the dataset. Evaluation results show that this approach provides a high level of detection of both instances and types of attacks.
信号处理技术被用于分析和检测网络异常,因为它们能够检测到新的和未知的入侵。将小波逼近与系统辨识理论相结合,提出了一种用于网络异常检测的网络信号建模方法。为了表征网络流量的行为,提供了15个功能,这些功能用作系统内的输入信号。同时,假设根据审计数据,通过检查系统运行的异常模式,可以检测到网络内的安全违规行为。 尽管机器学习方法在检测网络异常方面取得了显著的成果,但由于训练数据和测试数据的行为存在差异,它们仍然面临着使用实现算法的困难,这反过来又导致算法的低效性能。由于大量误报,算法检测以前未知类型的攻击的局限性加剧了这种影响。 本文提出了一种利用小波分析对网络信号进行建模的新方法,用于网络异常检测。具体而言,该方法的总体架构由三个部分组成:特征分析、基于小波近似的正常网络流量建模和使用ARX模型的预测、入侵或非入侵决策 使用DARPA入侵检测数据集对结果进行评估,该数据集对数据集中的入侵进行了全面分析。评估结果表明,该方法对实例和攻击类型都提供了高水平的检测。
{"title":"Detection of Unauthorized Actions in Networks Using Wavelet Analysis","authors":"Pavlo Hrynchenko","doi":"10.20535/tacs.2664-29132023.2.277621","DOIUrl":"https://doi.org/10.20535/tacs.2664-29132023.2.277621","url":null,"abstract":"Signal processing techniques are used to analyze and detect network anomalies because of their ability to detect new and unknown intrusions. The paper proposes a method of modeling network signals for the detection of network anomalies, which combines wavelet approximation and the theory of system identification. To characterize the behavior of network traffic, fifteen functions are provided, which are used as input signals within the system. At the same time, it is assumed that security violations within the network can be detected by checking abnormal patterns of system functioning according to audit data.
 Despite the fact that machine learning methods have achieved significant results in detecting network anomalies, they still face the difficulty of using the implemented algorithms, in the presence of differences in the behavior of the training data and test data, which in turn leads to inefficient performance of the algorithms. This effect is exacerbated by the limitation of algorithms to detect previously unknown types of attacks due to the large number of false positives.
 The paper develops a new method of modeling network signals for detecting anomalies in networks using wavelet analysis. In particular, the general architecture of the approach consists of three components: feature analysis, modeling of normal network traffic based on wavelet approximation and prediction using ARX model, intrusion or non-intrusion decision making
 The result is evaluated using the DARPA intrusion detection dataset, which performs a comprehensive analysis of the intrusions in the dataset. Evaluation results show that this approach provides a high level of detection of both instances and types of attacks.","PeriodicalId":471817,"journal":{"name":"Theoretical and applied cybersecurity","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135724304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Development of the Solution Search Method Based on the Improved Bee Colony Algorithm 基于改进蜂群算法的解搜索方法的发展
Pub Date : 2023-11-06 DOI: 10.20535/tacs.2664-29132023.2.278199
Andrii Shyshatskyi, Tetiana Stasiuk, Oleh Kuzmenko
Active digitization of people's daily life leads to the use of the decision making support systems (DMSS). DMSS is actively used in data processing, forecasting the course of various processes, providing informational support for the decision making process by decision makers. However, a number of problems arise while evaluating monitoring objects, namely: a large number of destabilizing factors affecting the efficiency of the processes of information collection, processing and transmission; high dynamism of changes in the state and composition of heterogeneous monitoring objects during the conduct of hostilities (operations); high dynamism of conducting hostilities (operations); the uncertainty of the initial situation and the noise of the initial data. In this article, a method of finding solutions based on an improved bee colony algorithm was developed. The efficiency of information processing is achieved by learning the architecture of artificial neural networks; taking into account the type of uncertainty of the information to be evaluated; the use of an improved algorithm of the bee colony, the use of an unordered linguistic scale of measurements with adjustment coefficients for the degree of awareness and the degree of noise of the initial data. An approbation of the use of the proposed method was carried out on the example of assessing the state of the operational grouping of troops (forces). The method is proposed to be used in the development of software for automated systems of control of troops and weapons, namely, in the modernization of existing and development of new automated systems of control of troops and weapons. The evaluation of the effectiveness of the proposed method showed an increase in the efficiency of the evaluation at the level of 21–28% in terms of the efficiency of information processing.
人们日常生活的积极数字化导致了决策支持系统(DMSS)的使用。DMSS积极应用于数据处理,预测各个过程的进程,为决策者的决策过程提供信息支持。然而,在对监测对象进行评估的过程中出现了一些问题,即:大量的不稳定因素影响了信息采集、处理和传输过程的效率;敌对行动(行动)期间异构监测对象的状态和组成的高度动态变化;开展敌对行动(行动)的积极性很高;初始情况的不确定性和初始数据的噪声。本文提出了一种基于改进蜂群算法的求解方法。通过学习人工神经网络的结构来提高信息处理的效率;考虑到待评价信息的不确定性类型;采用一种改进的蜂群算法,采用一种无序语言尺度的测量方法,对初始数据的感知程度和噪声程度进行调整系数。以评估部队(部队)作战分组状态为例,对所提出方法的使用进行了认可。提出的方法是用于部队和武器自动化控制系统软件的开发,即用于现有部队和武器自动化控制系统的现代化和开发。对所提出方法的有效性评价表明,在信息处理效率方面,评价效率提高了21-28%。
{"title":"The Development of the Solution Search Method Based on the Improved Bee Colony Algorithm","authors":"Andrii Shyshatskyi, Tetiana Stasiuk, Oleh Kuzmenko","doi":"10.20535/tacs.2664-29132023.2.278199","DOIUrl":"https://doi.org/10.20535/tacs.2664-29132023.2.278199","url":null,"abstract":"Active digitization of people's daily life leads to the use of the decision making support systems (DMSS). DMSS is actively used in data processing, forecasting the course of various processes, providing informational support for the decision making process by decision makers. However, a number of problems arise while evaluating monitoring objects, namely: a large number of destabilizing factors affecting the efficiency of the processes of information collection, processing and transmission; high dynamism of changes in the state and composition of heterogeneous monitoring objects during the conduct of hostilities (operations); high dynamism of conducting hostilities (operations); the uncertainty of the initial situation and the noise of the initial data. In this article, a method of finding solutions based on an improved bee colony algorithm was developed. The efficiency of information processing is achieved by learning the architecture of artificial neural networks; taking into account the type of uncertainty of the information to be evaluated; the use of an improved algorithm of the bee colony, the use of an unordered linguistic scale of measurements with adjustment coefficients for the degree of awareness and the degree of noise of the initial data. An approbation of the use of the proposed method was carried out on the example of assessing the state of the operational grouping of troops (forces). The method is proposed to be used in the development of software for automated systems of control of troops and weapons, namely, in the modernization of existing and development of new automated systems of control of troops and weapons. The evaluation of the effectiveness of the proposed method showed an increase in the efficiency of the evaluation at the level of 21–28% in terms of the efficiency of information processing.","PeriodicalId":471817,"journal":{"name":"Theoretical and applied cybersecurity","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135724219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Best Scenario of Cyber Attack Selecting on the Information and Communication System Based on the Logical and Probabilistic Method 基于逻辑和概率方法的信息通信系统网络攻击最佳场景选择
Pub Date : 2023-11-06 DOI: 10.20535/tacs.2664-29132023.2.288973
Lesia Alekseichuk, Oleksii Novikov, Andrii Rodionov, Dmytro Yakobchuk
Abstract The task of analyzing and selecting the best scenario of a cyberattack on information and communication system is considered as a component of the task of analyzing systems security. A method and corresponding algorithm for finding the best scenario of an attack on information and communication system using a logical and probabilistic model is proposed. The model describes the development of adverse events that arise in the information and communication system from the implementation of possible attacks on the security system from cyberspace. Analysis of cyber attack scenarios allows predicting the development of possible adverse cyber security events from the implementation of multiple threats to the system. The developed method and corresponding algorithm for analyzing attack scenarios can be used to analyze the security of information and communication systems, as well as in automation systems for designing information security systems or designing attacks on such systems.
摘要# x0D;分析和选择针对信息通信系统的网络攻击的最佳场景的任务被认为是分析系统安全任务的一个组成部分。提出了一种利用逻辑和概率模型寻找信息通信系统攻击最佳方案的方法和相应算法。该模型描述了由于网络空间对安全系统实施可能的攻击而在信息和通信系统中产生的不利事件的发展。通过对网络攻击场景的分析,可以预测多种威胁对系统的实施可能导致的不利网络安全事件的发展。所开发的攻击场景分析方法和相应算法可用于信息通信系统的安全性分析,也可用于自动化系统中信息安全系统的设计或对信息安全系统的攻击设计。
{"title":"The Best Scenario of Cyber Attack Selecting on the Information and Communication System Based on the Logical and Probabilistic Method","authors":"Lesia Alekseichuk, Oleksii Novikov, Andrii Rodionov, Dmytro Yakobchuk","doi":"10.20535/tacs.2664-29132023.2.288973","DOIUrl":"https://doi.org/10.20535/tacs.2664-29132023.2.288973","url":null,"abstract":"Abstract
 The task of analyzing and selecting the best scenario of a cyberattack on information and communication system is considered as a component of the task of analyzing systems security. A method and corresponding algorithm for finding the best scenario of an attack on information and communication system using a logical and probabilistic model is proposed. The model describes the development of adverse events that arise in the information and communication system from the implementation of possible attacks on the security system from cyberspace. Analysis of cyber attack scenarios allows predicting the development of possible adverse cyber security events from the implementation of multiple threats to the system. The developed method and corresponding algorithm for analyzing attack scenarios can be used to analyze the security of information and communication systems, as well as in automation systems for designing information security systems or designing attacks on such systems.","PeriodicalId":471817,"journal":{"name":"Theoretical and applied cybersecurity","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135724223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Inverse Protocols of Post Quantum Cryptography Based on Pairs of Noncommutative Multivariate Platforms Used in Tandem 基于非交换多元平台对串联的后量子密码逆协议研究
Pub Date : 2023-11-06 DOI: 10.20535/tacs.2664-29132023.2.290413
Vasyl Ustymenko
Non-commutative cryptography studies cryptographic primitives and systems which are based on algebraic structures like groups, semigroups and noncommutative rings. We continue to investigate inverse protocols of Non-commutative cryptography defined in terms of subsemigroups of Affine Cremona Semigroups over finite fields or arithmetic rings Zm and homomorphic images of these semigroups as possible instruments of Post Quantum Cryptography. This approach allows to construct cryptosystem which are not public keys, when protocol finish correspondents have mutually inverse transformations on affine space Kn or variety (K*)n where K is the field or arithmetic ring. The security of such inverse protocol rests on the complexity of word problem to decompose element of Affine Cremona Semigroup given in its standard form into composition of given generators. We discuss the idea of usage combinations of two cryptosystems with cipherspaces(K*)n and Kn to form a new cryptosystem with the plainspace(K*)n, ciphertextKn and nonbijective highly nonlinear encryption map.
& # x0D;& # x0D;& # x0D;非交换密码学研究基于群、半群、非交换环等代数结构的密码原语和密码系统。我们继续研究由有限域或算术环Zm上仿射Cremona半群的子半群定义的非交换密码的逆协议,以及这些半群的同态象作为后量子密码的可能工具。该方法允许构造非公钥的密码系统,当协议完成对应在仿射空间Kn或变种(K*)n上具有互逆变换时,其中K为域或算术环。该逆协议的安全性取决于将给定标准形式的仿射Cremona半群的元素分解为给定生成元组成的字问题的复杂性。我们讨论了两个密码系统(K*)n和Kn的使用组合的思想,以形成一个具有平面空间(K*)n、ciphertextKn和非双射高度非线性加密映射的新密码系统。 & # x0D;& # x0D;
{"title":"On Inverse Protocols of Post Quantum Cryptography Based on Pairs of Noncommutative Multivariate Platforms Used in Tandem","authors":"Vasyl Ustymenko","doi":"10.20535/tacs.2664-29132023.2.290413","DOIUrl":"https://doi.org/10.20535/tacs.2664-29132023.2.290413","url":null,"abstract":"
 
 
 Non-commutative cryptography studies cryptographic primitives and systems which are based on algebraic structures like groups, semigroups and noncommutative rings. We continue to investigate inverse protocols of Non-commutative cryptography defined in terms of subsemigroups of Affine Cremona Semigroups over finite fields or arithmetic rings Zm and homomorphic images of these semigroups as possible instruments of Post Quantum Cryptography. This approach allows to construct cryptosystem which are not public keys, when protocol finish correspondents have mutually inverse transformations on affine space Kn or variety (K*)n where K is the field or arithmetic ring.
 The security of such inverse protocol rests on the complexity of word problem to decompose element of Affine Cremona Semigroup given in its standard form into composition of given generators. We discuss the idea of usage combinations of two cryptosystems with cipherspaces(K*)n and Kn to form a new cryptosystem with the plainspace(K*)n, ciphertextKn and nonbijective highly nonlinear encryption map.
 
 
","PeriodicalId":471817,"journal":{"name":"Theoretical and applied cybersecurity","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135724225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Models of Denial of Service Attacks on Cyber-Physical Systems 网络物理系统的拒绝服务攻击模型
Pub Date : 2023-11-06 DOI: 10.20535/tacs.2664-29132023.2.289459
Mykola Ovcharuk
Mathematical models of denial-of-service attacks are investigated in the paper. Threats of kinetic impact on systems in cyberspace are considered. Targeted computer systems and systems with low and high-security levels were studied. The simulation results demonstrate a successful resolution of the task.
本文研究了拒绝服务攻击的数学模型。对网络空间系统的动力学影响的威胁进行了考虑。研究了目标计算机系统以及低安全级别和高安全级别的系统。仿真结果证明了该任务的成功解决。
{"title":"Models of Denial of Service Attacks on Cyber-Physical Systems","authors":"Mykola Ovcharuk","doi":"10.20535/tacs.2664-29132023.2.289459","DOIUrl":"https://doi.org/10.20535/tacs.2664-29132023.2.289459","url":null,"abstract":"Mathematical models of denial-of-service attacks are investigated in the paper. Threats of kinetic impact on systems in cyberspace are considered. Targeted computer systems and systems with low and high-security levels were studied. The simulation results demonstrate a successful resolution of the task.","PeriodicalId":471817,"journal":{"name":"Theoretical and applied cybersecurity","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135724311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Theoretical and applied cybersecurity
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1