首页 > 最新文献

Theoretical and applied cybersecurity最新文献

英文 中文
risk management of critical information infrastructure: threats-vulnerabilities-consequences 关键信息基础设施的风险管理:威胁-漏洞-后果
Pub Date : 2023-11-06 DOI: 10.20535/tacs.2664-29132023.2.280377
Vladyslav Kuz
Today, interaction between people and objects, including industrial ones, has become an integral part of our everyday life. Access to communications, finance, and all forms of information management and permission to use them can be obtained from almost anywhere using compact devices. For example, operators can remotely control individual sectors and control operations in several areas at the same time, surgeons can operate on patients thousands of miles away, and car manufacturers can detect when one of their vehicles has been in an accident within a few seconds after the accident. As a result of the spread of the Internet and wireless data networks, the interconnection of so much data, technology and network equipment and devices has quickly become the basis of modern society. At present, we have become a knowledge-based society that often relies on technology to execute or support almost all tasks and functions of human life. Undoubtedly, this has greatly expanded the range of tasks to be solved, but at the same time, the society became much more vulnerable to threats in information and communication systems. The vulnerability is explained by the fact that at some point most of the production of different directions and industries is supported by the introduction, storage and search of data/information in a interconnected network of hard disks and data servers, locally or remotely located. And at each of these stages there is an opportunity to steal data, bypass protection, manipulate or replace information. But the risks associated with unintentional accidents caused by human errors, system failures, incompatibility or other unexpected problems, as well as “natural disasters,” must also be taken into account. Therefore, the security of computer or cyber systems is a matter of national security. Actually, cyber-threats are so great that more and more security experts are pointing out that protection of cyber systems and data is more of a problem than terrorism. Given the scale of the threat (in terms of cyberattacks) and the actual damage it can be argued, certain systems and structures are at risk [1, 2]. It is proved that hackers can break into government and business websites, steal personal data, change the traffic light scheme, accelerate and slow down travel, and much more. As an example, the implementation of a specially created malware program - Stuxnet. The effects of its use were the self-destruction in 2010 of dozens of centrifuges, which supported Iranʼs nuclear program [3, 4]. Some experts think that Stuxnet was created not by independent attackers and possibly with the support of the government. Thus, as a conclusion, it can be confirmed that hackers operate from anywhere in the world, and the links and boundaries between cyberspace and physical systems are sufficiently leveled. Thus, as a conclusion, it can be confirmed that intruders operate from anywhere in the world, and the links and borders bet
今天,人与物(包括工业物)之间的互动已经成为我们日常生活中不可或缺的一部分。使用小型设备,几乎可以在任何地方获得通信、金融和各种形式的信息管理和使用许可。
例如,操作员可以远程控制单个部门并同时控制多个区域的操作,外科医生可以在数千英里外为患者进行手术,汽车制造商可以在事故发生后几秒钟内检测到他们的一辆汽车何时发生事故。由于互联网和无线数据网络的普及,如此多的数据、技术和网络设备设备的互联已经迅速成为现代社会的基础。目前,我们已经成为一个以知识为基础的社会,经常依靠技术来执行或支持人类生活中几乎所有的任务和功能。毫无疑问,这大大扩大了需要解决的任务范围,但与此同时,社会变得更加容易受到信息和通信系统的威胁。
这一漏洞的原因是,在某种程度上,不同方向和行业的大多数生产都是通过在本地或远程位置的硬盘和数据服务器的互联网络中引入、存储和搜索数据/信息来支持的。在每一个阶段都有机会窃取数据,绕过保护,操纵或替换信息。但是,由人为错误、系统故障、不兼容或其他意外问题以及“自然灾害”引起的意外事故所带来的风险也必须考虑在内。
因此,计算机或网络系统的安全是国家安全问题。事实上,网络威胁是如此之大,以至于越来越多的安全专家指出,保护网络系统和数据比恐怖主义更是个问题。考虑到威胁的规模(就网络攻击而言)和实际损害,可以认为某些系统和结构处于危险之中[1,2]。事实证明,黑客可以侵入政府和商业网站,窃取个人数据,改变交通灯方案,加速和减慢旅行,以及更多。
作为一个例子,实现了一个专门创建的恶意软件程序-震网。其使用的后果是2010年数十台支持伊朗核计划的离心机自毁[3,4]。一些专家认为,震网病毒不是由独立的攻击者创造的,可能得到了政府的支持。因此,作为一个结论,可以确认黑客在世界任何地方进行操作,并且网络空间与物理系统之间的联系和边界是足够平整的。因此,作为一个结论,可以确认入侵者从世界任何地方进行操作,并且网络空间和物理系统之间的链接和边界已经足够平整。
社会越来越多地面临这样一个事实:一群人甚至一个人携带复杂的计算机病毒或了解软件或硬件的脆弱性,可能对人们的生命或物理破坏造成大量的物理损害,造成重大的社会或经济损失,等等。例如,英国《金融时报》2012年5月8日公布的事实(http://on.ft.com/1wviXHW)显示,一个不知名的组织多年来一直试图渗透到美国天然气管道网络的管理系统中。2014年底,美国国家海洋和大气管理局宣布,来自中国的黑客成功破解并摧毁了美国卫星网络,导致美国在几天内失去了与各种自然灾害预测、空中飞行走廊、导航等行业相关的服务(http://wapo.st/1u7N9dJ).
通常,关键基础设施包括电力和运输主网、石油和天然气管道、海港、高速和政府通信通道、超大城市的生命保障系统(水和热供应)、废物管理、应急服务和应急响应服务、高科技企业和军工综合体企业以及中央机关。
政府关键信息基础设施只是构成现代社会的众多重要系统和网络之一。因此,国家和社会完全依赖于关键信息基础设施的不同对象和主体的功能,其中任何一个的完整性丧失都可能导致各种故障(终止生产和转移电力、暂时和长期中断、无法获得医疗保健等等)。 每个国家都是一个独立的关键信息基础设施,但国家之间的合作是在全球关键信息基础设施的框架内进行的。与此同时,对关键信息基础设施各个部门的大量投资导致了经济发展速度的提高和生活质量的改善。
{"title":"risk management of critical information infrastructure: threats-vulnerabilities-consequences","authors":"Vladyslav Kuz","doi":"10.20535/tacs.2664-29132023.2.280377","DOIUrl":"https://doi.org/10.20535/tacs.2664-29132023.2.280377","url":null,"abstract":"Today, interaction between people and objects, including industrial ones, has become an integral part of our everyday life. Access to communications, finance, and all forms of information management and permission to use them can be obtained from almost anywhere using compact devices.
 For example, operators can remotely control individual sectors and control operations in several areas at the same time, surgeons can operate on patients thousands of miles away, and car manufacturers can detect when one of their vehicles has been in an accident within a few seconds after the accident.
 As a result of the spread of the Internet and wireless data networks, the interconnection of so much data, technology and network equipment and devices has quickly become the basis of modern society. At present, we have become a knowledge-based society that often relies on technology to execute or support almost all tasks and functions of human life. Undoubtedly, this has greatly expanded the range of tasks to be solved, but at the same time, the society became much more vulnerable to threats in information and communication systems.
 The vulnerability is explained by the fact that at some point most of the production of different directions and industries is supported by the introduction, storage and search of data/information in a interconnected network of hard disks and data servers, locally or remotely located. And at each of these stages there is an opportunity to steal data, bypass protection, manipulate or replace information. But the risks associated with unintentional accidents caused by human errors, system failures, incompatibility or other unexpected problems, as well as “natural disasters,” must also be taken into account.
 Therefore, the security of computer or cyber systems is a matter of national security. Actually, cyber-threats are so great that more and more security experts are pointing out that protection of cyber systems and data is more of a problem than terrorism. Given the scale of the threat (in terms of cyberattacks) and the actual damage it can be argued, certain systems and structures are at risk [1, 2]. It is proved that hackers can break into government and business websites, steal personal data, change the traffic light scheme, accelerate and slow down travel, and much more.
 As an example, the implementation of a specially created malware program - Stuxnet. The effects of its use were the self-destruction in 2010 of dozens of centrifuges, which supported Iranʼs nuclear program [3, 4]. Some experts think that Stuxnet was created not by independent attackers and possibly with the support of the government. Thus, as a conclusion, it can be confirmed that hackers operate from anywhere in the world, and the links and boundaries between cyberspace and physical systems are sufficiently leveled. Thus, as a conclusion, it can be confirmed that intruders operate from anywhere in the world, and the links and borders bet","PeriodicalId":471817,"journal":{"name":"Theoretical and applied cybersecurity","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135724222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Complexity of The Systems of Linear Restrictions over a Finite Field 有限域上线性限制系统的复杂性
Pub Date : 2023-11-06 DOI: 10.20535/tacs.2664-29132023.2.280676
Oleh Kurinnyi
This paper continues the results obtained in [1]. In the previous paper, we formulated the problem of the unknown vector recovering from linear dependencies with this vector, which act as constraints on it. The next step, after finding out some algebraic and combinatorial properties, is to give basic estimates of complexity for the main problem as well as for related problems. Such related problems can be obtained by fixing some parameters of the main problem or applying constraints on the number of restrictions in the system. Such an analysis makes possible to arrange the problem of recovering an unknown vector based on partial information into the general computational complexity framework in order to approach existing theoretical results to its solution. The obtained theoretical results can be used in algebraic cryptanalysis of stream ciphers and cryptosystems based on linear codes.
本文延续了文献[1]的结果。在上一篇文章中,我们提出了未知向量从与该向量的线性依赖中恢复的问题,该向量作为对其的约束。在找出一些代数和组合性质之后,下一步是对主要问题以及相关问题的复杂性进行基本估计。这种相关问题可以通过固定主要问题的某些参数或在系统中施加约束的数量来获得。这样的分析可以将基于部分信息的未知向量恢复问题安排到一般的计算复杂度框架中,从而使现有的理论结果接近于其解。所得理论结果可用于流密码和基于线性码的密码系统的代数密码分析。
{"title":"Complexity of The Systems of Linear Restrictions over a Finite Field","authors":"Oleh Kurinnyi","doi":"10.20535/tacs.2664-29132023.2.280676","DOIUrl":"https://doi.org/10.20535/tacs.2664-29132023.2.280676","url":null,"abstract":"This paper continues the results obtained in [1]. In the previous paper, we formulated the problem of the unknown vector recovering from linear dependencies with this vector, which act as constraints on it. The next step, after finding out some algebraic and combinatorial properties, is to give basic estimates of complexity for the main problem as well as for related problems. Such related problems can be obtained by fixing some parameters of the main problem or applying constraints on the number of restrictions in the system. Such an analysis makes possible to arrange the problem of recovering an unknown vector based on partial information into the general computational complexity framework in order to approach existing theoretical results to its solution. The obtained theoretical results can be used in algebraic cryptanalysis of stream ciphers and cryptosystems based on linear codes.","PeriodicalId":471817,"journal":{"name":"Theoretical and applied cybersecurity","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135724220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malware detection system based on static and dynamic analysis and using machine learning 恶意软件检测系统基于静态和动态分析,并利用机器学习
Pub Date : 2023-11-06 DOI: 10.20535/tacs.2664-29132023.2.277959
Alan Nafiiev, Andrii Rodionov
Cyber wars and cyber attacks are an urgent problem in the global digital environment. Based on existing popular detection methods, malware authors are creating ever more advanced and sophisticated malware. Therefore, this study aims to create a malware analysis system that uses both dynamic and static analysis. Our system is based on a machine learning method - support vector machine. The set of data used was collected from various Internet sources. It consists of 257 executable files in .exe format, 178 of which are malicious and 79 are benign. We use 5 different types of data representation: binary information, trace instructions, control flow graph, information obtained from the dynamic operation of the file, and file metadata. Then, using multiple kernel learning, we combine all data views and create one summative machine learning model.
& # x0D;网络战争和网络攻击是全球数字环境中亟待解决的问题。基于现有流行的检测方法,恶意软件作者正在创建更先进和复杂的恶意软件。因此,本研究旨在创建一个同时使用动态和静态分析的恶意软件分析系统。我们的系统是基于一种机器学习方法——支持向量机。所使用的数据集是从各种互联网来源收集的。它由257个。exe格式的可执行文件组成,其中178个是恶意文件,79个是良性文件。我们使用5种不同类型的数据表示:二进制信息、跟踪指令、控制流图、从文件动态操作中获得的信息和文件元数据。然后,使用多核学习,我们将所有数据视图组合起来,创建一个总结性机器学习模型。
{"title":"Malware detection system based on static and dynamic analysis and using machine learning","authors":"Alan Nafiiev, Andrii Rodionov","doi":"10.20535/tacs.2664-29132023.2.277959","DOIUrl":"https://doi.org/10.20535/tacs.2664-29132023.2.277959","url":null,"abstract":"
 Cyber wars and cyber attacks are an urgent problem in the global digital environment. Based on existing popular detection methods, malware authors are creating ever more advanced and sophisticated malware. Therefore, this study aims to create a malware analysis system that uses both dynamic and static analysis. Our system is based on a machine learning method - support vector machine. The set of data used was collected from various Internet sources. It consists of 257 executable files in .exe format, 178 of which are malicious and 79 are benign. We use 5 different types of data representation: binary information, trace instructions, control flow graph, information obtained from the dynamic operation of the file, and file metadata. Then, using multiple kernel learning, we combine all data views and create one summative machine learning model.
","PeriodicalId":471817,"journal":{"name":"Theoretical and applied cybersecurity","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135724217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extremal graph theory and generation of quadratic multivariate transformations of Algebraic Post-Quantum Cryptography 代数后量子密码学的极值图论和二次多元变换的生成
Pub Date : 2023-09-19 DOI: 10.20535/tacs.2664-29132023.1.287748
Aneta Wróblewska, Vasyl Ustymenko, Oleksandr Pustovit
We introduce large groups of quadratic transformations of a vector space over the finite fields defined via symbolic computations with the usage of algebraic constructions of Extremal Graph Theory. They can serve as platforms for the protocols of Noncommutative Cryptography. The modifications of these symbolic computations in the case of large fields of characteristic two allow us to define quadratic bijective multivariate public keys such that the inverses of public maps has a large polynomial degree. We suggest the usage of constructed protocols for the private delivery of quadratic encryption maps instead of the public usage of these transformations.
利用极值图论的代数构造,在符号计算定义的有限域上,引入向量空间的大群二次变换。它们可以作为非交换密码学协议的平台。在特征为2的大域的情况下,这些符号计算的修改允许我们定义二次双射多变量公钥,使得公共映射的逆具有较大的多项式度。我们建议使用构造好的协议来私有地传递二次加密映射,而不是公开地使用这些转换。
{"title":"Extremal graph theory and generation of quadratic multivariate transformations of Algebraic Post-Quantum Cryptography","authors":"Aneta Wróblewska, Vasyl Ustymenko, Oleksandr Pustovit","doi":"10.20535/tacs.2664-29132023.1.287748","DOIUrl":"https://doi.org/10.20535/tacs.2664-29132023.1.287748","url":null,"abstract":"We introduce large groups of quadratic transformations of a vector space over the finite fields defined via symbolic computations with the usage of algebraic constructions of Extremal Graph Theory. They can serve as platforms for the protocols of Noncommutative Cryptography. The modifications of these symbolic computations in the case of large fields of characteristic two allow us to define quadratic bijective multivariate public keys such that the inverses of public maps has a large polynomial degree. We suggest the usage of constructed protocols for the private delivery of quadratic encryption maps instead of the public usage of these transformations.","PeriodicalId":471817,"journal":{"name":"Theoretical and applied cybersecurity","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135108164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning Models Stacking in the Malicious Links Detecting 恶意链接检测中的机器学习模型叠加
Pub Date : 2023-09-19 DOI: 10.20535/tacs.2664-29132023.1.287752
Yevhenii Khukalenko, Iryna Stopochkina, Mykola Ilin
An analysis of the performance of various classifiers on address and network groups of features was performed. A new classification model is proposed, which is a stacking of 3 models: kNN, XGBoost and Transformer. The best model for stacking was experimentally determined: Logistic Regression, which made it possible to improve the result of the best available model by 3%. The hypothesis that stacking a larger number of worse models has an advantage over stacking a smaller number of more productive models on the used data set was confirmed: regardless of the choice of stacking meta-algorithm, stacking of three models showed better results than stacking two.
& # x0D;& # x0D;& # x0D;分析了各种分类器在地址组和网络组特征上的性能。提出了一种新的分类模型,该模型是kNN、XGBoost和Transformer 3个模型的叠加。通过实验确定了最佳的堆叠模型:Logistic回归,使最佳可用模型的结果提高了3%。证实了在使用的数据集上,将数量较多的较差模型叠加比将数量较少的较有效模型叠加更有优势的假设:无论选择哪种叠加元算法,三个模型叠加的效果都比两个模型叠加的效果好。 & # x0D;& # x0D;
{"title":"Machine Learning Models Stacking in the Malicious Links Detecting","authors":"Yevhenii Khukalenko, Iryna Stopochkina, Mykola Ilin","doi":"10.20535/tacs.2664-29132023.1.287752","DOIUrl":"https://doi.org/10.20535/tacs.2664-29132023.1.287752","url":null,"abstract":"
 
 
 An analysis of the performance of various classifiers on address and network groups of features was performed. A new classification model is proposed, which is a stacking of 3 models: kNN, XGBoost and Transformer. The best model for stacking was experimentally determined: Logistic Regression, which made it possible to improve the result of the best available model by 3%. The hypothesis that stacking a larger number of worse models has an advantage over stacking a smaller number of more productive models on the used data set was confirmed: regardless of the choice of stacking meta-algorithm, stacking of three models showed better results than stacking two.
 
 
","PeriodicalId":471817,"journal":{"name":"Theoretical and applied cybersecurity","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135108153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of the core research for vendor email compromise filtering model using machine learning 基于机器学习的厂商邮件泄露过滤模型的核心研究分析
Pub Date : 2023-09-19 DOI: 10.20535/tacs.2664-29132023.1.284121
Oleh Kozlenko, Dmytro Zibarov
Vendor email compromise became one of most sophisticated types of social engineering attacks. Strengths of this malicious activity rely on basis of impersonating vendor that company working with. Thus, it is easy for attacker to exploit this trust for doing different type of data exfiltration or ransom. To mitigate risks, that come with these challenges, information security specialist should consider using different types of approaches, including machine learning, to identify anomalies in email, so further damages can be prevented. The purpose of this work lies in the identification of optimal approach for VEC-style attacks detection and optimizing these approaches with least amount of false-positive (FP) parameters. The object of this research is different methods of text processing algorithms, including machine learning methods for detecting VEC emails. The subject of research in this paper mainly considers impact of mentioned text processing algorithms and its relation with efficiency of VEC email classification, identifying most effective approach and, also, how to improve results of such detections. Results of this paper consists of details for VEC-email attacks detection, challenges that comes with different approaches and proposed solution, that lies in using text processing techniques and agent-related approach with main sphere of implication – machine-learning systems, that are used for identifying social-engineering attacks through email.
供应商电子邮件攻击成为最复杂的社会工程攻击类型之一。这种恶意活动的优势依赖于与该公司合作的冒充供应商。因此,攻击者很容易利用这种信任来进行不同类型的数据泄露或勒索。为了降低这些挑战带来的风险,信息安全专家应该考虑使用不同类型的方法,包括机器学习,来识别电子邮件中的异常情况,从而防止进一步的损害。这项工作的目的在于识别vecc式攻击检测的最佳方法,并以最少的假阳性(FP)参数优化这些方法。本研究的对象是文本处理算法的不同方法,包括检测VEC邮件的机器学习方法。本文的研究主题主要考虑上述文本处理算法的影响及其与VEC电子邮件分类效率的关系,找出最有效的方法,以及如何改进这些检测结果。本文的结果包括电子邮件攻击检测的细节,不同方法带来的挑战和提出的解决方案,即使用文本处理技术和代理相关方法,其主要含义是机器学习系统,用于识别通过电子邮件进行的社会工程攻击。
{"title":"Analysis of the core research for vendor email compromise filtering model using machine learning","authors":"Oleh Kozlenko, Dmytro Zibarov","doi":"10.20535/tacs.2664-29132023.1.284121","DOIUrl":"https://doi.org/10.20535/tacs.2664-29132023.1.284121","url":null,"abstract":"Vendor email compromise became one of most sophisticated types of social engineering attacks. Strengths of this malicious activity rely on basis of impersonating vendor that company working with. Thus, it is easy for attacker to exploit this trust for doing different type of data exfiltration or ransom. To mitigate risks, that come with these challenges, information security specialist should consider using different types of approaches, including machine learning, to identify anomalies in email, so further damages can be prevented. The purpose of this work lies in the identification of optimal approach for VEC-style attacks detection and optimizing these approaches with least amount of false-positive (FP) parameters. The object of this research is different methods of text processing algorithms, including machine learning methods for detecting VEC emails. The subject of research in this paper mainly considers impact of mentioned text processing algorithms and its relation with efficiency of VEC email classification, identifying most effective approach and, also, how to improve results of such detections. Results of this paper consists of details for VEC-email attacks detection, challenges that comes with different approaches and proposed solution, that lies in using text processing techniques and agent-related approach with main sphere of implication – machine-learning systems, that are used for identifying social-engineering attacks through email.","PeriodicalId":471817,"journal":{"name":"Theoretical and applied cybersecurity","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135108161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
OSINT Time Series Forecasting Methods Analysis OSINT时间序列预测方法分析
Pub Date : 2023-09-19 DOI: 10.20535/tacs.2664-29132023.1.287750
Dmytro Lande, Anatolii Feher
Time series forecasting is an important niche in the modern decision-making and tactics selection process, and in the context of OSINT technology, this approach can help predict events and allow for an effective response to them. For this purpose, LSTM, ARIMA, LPPL (JLS), N-gram were selected as time series forecasting methods, and their simple forms were implemented based on the time series of quantitative mentions of nato, himars, starlink and cyber threats statings obtained and generated using OSINT technology. Based on this, their overall effectiveness and the possibility of using them in combination with OSINT technology to form a forecast of the future were investigated.
时间序列预测在现代决策和战术选择过程中是一个重要的领域,在OSINT技术的背景下,这种方法可以帮助预测事件并允许对事件进行有效的响应。为此,选择LSTM、ARIMA、LPPL (JLS)、N-gram作为时间序列预测方法,并基于利用OSINT技术获得并生成的北约、himars、starlink和网络威胁预警的定量提及时间序列实现其简单形式。在此基础上,研究了它们的整体有效性以及与OSINT技术结合使用形成未来预测的可能性。
{"title":"OSINT Time Series Forecasting Methods Analysis","authors":"Dmytro Lande, Anatolii Feher","doi":"10.20535/tacs.2664-29132023.1.287750","DOIUrl":"https://doi.org/10.20535/tacs.2664-29132023.1.287750","url":null,"abstract":"Time series forecasting is an important niche in the modern decision-making and tactics selection process, and in the context of OSINT technology, this approach can help predict events and allow for an effective response to them. For this purpose, LSTM, ARIMA, LPPL (JLS), N-gram were selected as time series forecasting methods, and their simple forms were implemented based on the time series of quantitative mentions of nato, himars, starlink and cyber threats statings obtained and generated using OSINT technology. Based on this, their overall effectiveness and the possibility of using them in combination with OSINT technology to form a forecast of the future were investigated.","PeriodicalId":471817,"journal":{"name":"Theoretical and applied cybersecurity","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135108866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber Security Logical and Probabilistic Model of a Critical Infrastructure Facility in the Electric Energy Industry 电力能源行业关键基础设施网络安全逻辑与概率模型
Pub Date : 2023-09-19 DOI: 10.20535/tacs.2664-29132023.1.287365
Lesia Alekseichuk, Oleksii Novikov, Dmytro Yakobchuk, Andrii Rodionov
In the work, a cyber security logical and probabilistic model of a critical infrastructure facility in the energy sector was developed and investigated. The cyber security logical and probabilistic model describes the development of adverse events that arise in the Industrial Control System of the electrical network from the realization of possible threats from cyberspace, such as attacks on the protection system through the corporate network, connection through a modem and wireless connection. The resulting model is based on sequentially developed structural, logical and probabilistic models. The field of use of the developed model is automation systems for designing information protection systems or designing trajectories of attacks on these systems. The model was also applied to study the sensitivity of the probability of the development of adverse events to variations in the probability of realization of possible threats to the system.
在这项工作中,开发并研究了能源部门关键基础设施的网络安全逻辑和概率模型。网络安全逻辑和概率模型描述了从可能的网络空间威胁的实现,如通过企业网络对保护系统的攻击,通过调制解调器连接和无线连接,在电气网络的工业控制系统中产生的不良事件的发展。所得到的模型是基于顺序发展的结构、逻辑和概率模型。 所开发模型的使用领域是用于设计信息保护系统或设计攻击这些系统的轨迹的自动化系统。该模型还应用于研究不良事件发生概率对系统可能威胁实现概率变化的敏感性。
{"title":"Cyber Security Logical and Probabilistic Model of a Critical Infrastructure Facility in the Electric Energy Industry","authors":"Lesia Alekseichuk, Oleksii Novikov, Dmytro Yakobchuk, Andrii Rodionov","doi":"10.20535/tacs.2664-29132023.1.287365","DOIUrl":"https://doi.org/10.20535/tacs.2664-29132023.1.287365","url":null,"abstract":"In the work, a cyber security logical and probabilistic model of a critical infrastructure facility in the energy sector was developed and investigated. The cyber security logical and probabilistic model describes the development of adverse events that arise in the Industrial Control System of the electrical network from the realization of possible threats from cyberspace, such as attacks on the protection system through the corporate network, connection through a modem and wireless connection. The resulting model is based on sequentially developed structural, logical and probabilistic models.
 The field of use of the developed model is automation systems for designing information protection systems or designing trajectories of attacks on these systems. The model was also applied to study the sensitivity of the probability of the development of adverse events to variations in the probability of realization of possible threats to the system.","PeriodicalId":471817,"journal":{"name":"Theoretical and applied cybersecurity","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135108159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Defining of Goals in the Development of Cyber Resilient Systems According to NIST 根据NIST定义网络弹性系统发展的目标
Pub Date : 2023-09-19 DOI: 10.20535/tacs.2664-29132023.1.287751
Oleksandr Bakalynskyi, Fedir Korobeynikov
This paper introduces an approach to defining goals in the development of cyber-resilient systems, following the guidelines established in the standards of the National Institute of Standards and Technology (NIST) in the United States. This work aims to provide a roadmap for researchers and practitioners of cyber resilience in creating information systems capable of withstanding and adapting to adverse conditions, malfunctions, and attacks while ensuring the guaranteed execution of all primary cyber-system functions.
& # x0D;& # x0D;& # x0D;本文介绍了一种定义网络弹性系统开发目标的方法,该方法遵循美国国家标准与技术研究所(NIST)标准中建立的指导方针。这项工作旨在为网络弹性的研究人员和实践者提供路线图,以创建能够承受和适应不利条件、故障和攻击的信息系统,同时确保所有主要网络系统功能的有保障执行。 & # x0D;& # x0D;
{"title":"Defining of Goals in the Development of Cyber Resilient Systems According to NIST","authors":"Oleksandr Bakalynskyi, Fedir Korobeynikov","doi":"10.20535/tacs.2664-29132023.1.287751","DOIUrl":"https://doi.org/10.20535/tacs.2664-29132023.1.287751","url":null,"abstract":"
 
 
 This paper introduces an approach to defining goals in the development of cyber-resilient systems, following the guidelines established in the standards of the National Institute of Standards and Technology (NIST) in the United States. This work aims to provide a roadmap for researchers and practitioners of cyber resilience in creating information systems capable of withstanding and adapting to adverse conditions, malfunctions, and attacks while ensuring the guaranteed execution of all primary cyber-system functions.
 
 
","PeriodicalId":471817,"journal":{"name":"Theoretical and applied cybersecurity","volume":"209 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135108155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
System construction of cybersecurity vulnerabilities with Q-analysis 基于q -分析法的网络安全漏洞体系构建
Pub Date : 2023-09-19 DOI: 10.20535/tacs.2664-29132023.1.285430
Viktoriia Igorivna Polutsyhanova
Today, in order to assess potential cyber threats, it is necessary to conduct a comprehensive assessment of the vulnerabilities of the investigated system. To do this, it is necessary to describe the identified vulnerabilities and consider potential vulnerabilities. In addition, the relationship between system vulnerabilities must be properly assessed. The most common assumption is that all vulnerabilities are independent and are implemented either by random events or by malicious intent. The paper proposes a method that allows modeling the vulnerabilities of complex systems as a whole, taking into account their hidden connections. Q-analysis [2] was used to study the structure of the system of interconnected vulnerabilities that arise in the process of project implementation. An example of the application of Q-analysis methods is presented and an explanation of the nature and impact of some potential threats and their combinations is offered.
今天,为了评估潜在的网络威胁,有必要对被调查系统的漏洞进行全面评估。为此,有必要描述已识别的漏洞并考虑潜在的漏洞。此外,必须正确评估系统漏洞之间的关系。最常见的假设是,所有漏洞都是独立的,由随机事件或恶意意图实现。本文提出了一种方法,可以将复杂系统的漏洞作为一个整体进行建模,并考虑到它们之间的隐藏联系。采用q -分析法[2]研究了项目实施过程中产生的互联漏洞系统的结构。给出了q分析方法的一个应用实例,并解释了一些潜在威胁及其组合的性质和影响。
{"title":"System construction of cybersecurity vulnerabilities with Q-analysis","authors":"Viktoriia Igorivna Polutsyhanova","doi":"10.20535/tacs.2664-29132023.1.285430","DOIUrl":"https://doi.org/10.20535/tacs.2664-29132023.1.285430","url":null,"abstract":"Today, in order to assess potential cyber threats, it is necessary to conduct a comprehensive assessment of the vulnerabilities of the investigated system. To do this, it is necessary to describe the identified vulnerabilities and consider potential vulnerabilities. In addition, the relationship between system vulnerabilities must be properly assessed. The most common assumption is that all vulnerabilities are independent and are implemented either by random events or by malicious intent. The paper proposes a method that allows modeling the vulnerabilities of complex systems as a whole, taking into account their hidden connections. Q-analysis [2] was used to study the structure of the system of interconnected vulnerabilities that arise in the process of project implementation. An example of the application of Q-analysis methods is presented and an explanation of the nature and impact of some potential threats and their combinations is offered.","PeriodicalId":471817,"journal":{"name":"Theoretical and applied cybersecurity","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135108152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Theoretical and applied cybersecurity
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1