首页 > 最新文献

Sistemnì tehnologìï最新文献

英文 中文
Phishing like the first step to gaining access 网络钓鱼是获得访问权限的第一步
Pub Date : 2023-11-13 DOI: 10.34185/1562-9945-4-147-2023-13
Guda Anton, Klishch Sergey
Phishing as a term that means the technique of sending phishing messages will be re-searched based on findings in public access and using the listed links. The process of a phish-ing attack will be analyzed, and then we will pay attention to the technical vectors of how us-ers become victims of the attack. Finally, existing research on phishing attacks and related prevention approaches will be reviewed. Mitigating phishing attacks is an important research topic worth exploring. Although a lot of research has been done, this threat still exists in the real world, and its prevalence is constantly increasing. According to research results, detecting phishing attacks is a difficult problem. There are two main strategies used to mitigate phishing attacks; or improving the performance of phishing detection technology or improving people's awareness of these at-tacks. Developing human expertise is a key way to defeat phishing attacks, as phishing attacks exploit human weaknesses rather than network weaknesses. Also, humans are always the weakest link in social engineering attacks. Compared to phishing website detection, phishing email detection may require user in-volvement to achieve better detection results. Because the success of a phishing email de-pends on its context. Specifically, when the premise of the phishing email is consistent with the user's work context (or current situation). Most anti-phishing solutions are implemented to mitigate general phishing attacks, but they ignore some specific situations, such as advanced phishing attacks. To prevent advanced phishing attacks, phishing websites are difficult to detect if a victim is attacked using stolen DNS data because the URL content and website content are the same as legitimate websites. Most content-based approaches may not work because the content of the accessed URL is an important factor in the decision. To prevent subdomain hijacking attacks, it is difficult to detect a phishing website if the phishers have hosted the website on a subdomain taken from a legitimate website. Regardless of the web content, URL, and SSL certificate information, they will all be the same as the le-gitimate website. Moreover, the approach to enumeration of subdomains needs improvement, as most current tools are based on rough enumeration, existing dictionaries may not cover all instances of subdomains, as some subdomains may be meaningless.
网络钓鱼作为一个术语,意味着发送网络钓鱼信息的技术将根据公共访问的发现和使用列出的链接进行重新搜索。将分析网络钓鱼攻击的过程,然后我们将关注我们如何成为攻击受害者的技术向量。最后,对网络钓鱼攻击的研究现状及相关的防范方法进行了综述。减轻网络钓鱼攻击是值得探索的重要研究课题。尽管已经做了大量的研究,但这种威胁仍然存在于现实世界中,并且其患病率不断增加。研究结果表明,检测网络钓鱼攻击是一个难题。有两种主要策略用于减轻网络钓鱼攻击;或者提高网络钓鱼检测技术的性能,或者提高人们对这些攻击的认识。开发人类专业知识是打败网络钓鱼攻击的关键方法,因为网络钓鱼攻击利用的是人类的弱点,而不是网络的弱点。此外,在社会工程攻击中,人类总是最薄弱的环节。与网络钓鱼网站检测相比,网络钓鱼邮件检测可能需要用户的参与才能获得更好的检测结果。因为网络钓鱼邮件的成功与否取决于它的上下文。具体来说,当钓鱼邮件的前提与用户的工作环境(或当前情况)一致时。大多数反网络钓鱼解决方案都是为了减轻一般的网络钓鱼攻击而实现的,但它们忽略了一些特定的情况,例如高级网络钓鱼攻击。为了防止高级的网络钓鱼攻击,网络钓鱼网站的URL内容和网站内容与合法网站相同,如果受害者使用窃取的DNS数据进行攻击,则很难被检测到。大多数基于内容的方法可能不起作用,因为访问URL的内容是决策中的一个重要因素。为了防止子域名劫持攻击,如果钓鱼者将网站托管在合法网站的子域名上,则很难检测到钓鱼网站。无论网站内容、URL和SSL证书信息如何,它们都与合法网站相同。此外,子域的枚举方法需要改进,因为当前大多数工具都是基于粗略的枚举,现有的字典可能无法涵盖子域的所有实例,因为有些子域可能毫无意义。
{"title":"Phishing like the first step to gaining access","authors":"Guda Anton, Klishch Sergey","doi":"10.34185/1562-9945-4-147-2023-13","DOIUrl":"https://doi.org/10.34185/1562-9945-4-147-2023-13","url":null,"abstract":"Phishing as a term that means the technique of sending phishing messages will be re-searched based on findings in public access and using the listed links. The process of a phish-ing attack will be analyzed, and then we will pay attention to the technical vectors of how us-ers become victims of the attack. Finally, existing research on phishing attacks and related prevention approaches will be reviewed. Mitigating phishing attacks is an important research topic worth exploring. Although a lot of research has been done, this threat still exists in the real world, and its prevalence is constantly increasing. According to research results, detecting phishing attacks is a difficult problem. There are two main strategies used to mitigate phishing attacks; or improving the performance of phishing detection technology or improving people's awareness of these at-tacks. Developing human expertise is a key way to defeat phishing attacks, as phishing attacks exploit human weaknesses rather than network weaknesses. Also, humans are always the weakest link in social engineering attacks. Compared to phishing website detection, phishing email detection may require user in-volvement to achieve better detection results. Because the success of a phishing email de-pends on its context. Specifically, when the premise of the phishing email is consistent with the user's work context (or current situation). Most anti-phishing solutions are implemented to mitigate general phishing attacks, but they ignore some specific situations, such as advanced phishing attacks. To prevent advanced phishing attacks, phishing websites are difficult to detect if a victim is attacked using stolen DNS data because the URL content and website content are the same as legitimate websites. Most content-based approaches may not work because the content of the accessed URL is an important factor in the decision. To prevent subdomain hijacking attacks, it is difficult to detect a phishing website if the phishers have hosted the website on a subdomain taken from a legitimate website. Regardless of the web content, URL, and SSL certificate information, they will all be the same as the le-gitimate website. Moreover, the approach to enumeration of subdomains needs improvement, as most current tools are based on rough enumeration, existing dictionaries may not cover all instances of subdomains, as some subdomains may be meaningless.","PeriodicalId":493145,"journal":{"name":"Sistemnì tehnologìï","volume":"123 14","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136352151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Method of creation a digital twin of a vibration protection process 一种振动保护过程的数字孪生的创建方法
Pub Date : 2023-11-13 DOI: 10.34185/1562-9945-4-147-2023-06
Atamaniuk Oleksii, Legeza Viktor
Various approaches to building digital twins are considered. The data-based approach has a big disadvantage due to need of the huge amount of information. The system-based ap-proach can not be used in some cases due to the lack of a mathematically justified method. One of such cases is a ball vibration absorber but they can be really useful for the vibration protection of high-rise flexible objects. The purpose of the research is to develop an algorithmic method of creating digital twins of the vibration protection process, which will provide the possibility of determining the optimal control parameters of the ball vibration absorber. The paper examines small steady oscillations of the dynamic system "supporting body - ball vibration absorber". Under the condition of small forced oscillations, the equation of the amplitude-frequency characteristic of the linear anti-vibration system was obtained. In view of the use in construction, the input and output parameters of the method of building a digital twin of a flexible structure were described and analyzed, as well as the methods of obtaining them. As a result of the evaluation of the speed of the method, a modification of the search way for the optimal parameters of the digital twin was proposed. The comparative analysis showed the high efficiency of the proposed anti-vibration sys-tem with optimally adjusted parameters of the digital twin. The proposed method allows to reduce the maximum value of the amplitude by approximately four times. Modifications of the method made it possible to speed it up by an average of three times, reduce the load on the processor and handle cases when finding the optimal parameters of a digital twin is a rather difficult analytical problem. The input and output parameters of the method and ways of obtaining them were de-scribed and analyzed. A comparative numerical analysis showed the high efficiency of the functioning of such a vibration protection system with optimally adjusted parameters of the ball vibration absorber.
考虑了构建数字孪生的各种方法。基于数据的方法由于需要大量的信息而有很大的缺点。由于缺乏数学上合理的方法,在某些情况下不能使用基于系统的方法。其中一种情况是球形减振器,但它们对于高层柔性物体的振动保护非常有用。本研究的目的是开发一种创建振动保护过程数字孪生的算法方法,为确定滚珠减振器的最优控制参数提供可能。本文研究了“支承体-球减振器”动力系统的小稳态振动问题。在受迫振荡较小的情况下,得到了线性减振系统的幅频特性方程。针对柔性结构数字孪生的实际应用,对柔性结构数字孪生的输入、输出参数及其获取方法进行了描述和分析。通过对算法速度的评价,提出了对数字孪生体最优参数搜索方法的改进。对比分析表明,通过对数字孪生参数的优化调整,所提出的减振系统具有较高的效率。所提出的方法允许将振幅的最大值降低约四倍。该方法的改进使其平均速度提高了三倍,减少了处理器的负荷,并处理了寻找数字孪生体的最佳参数是一个相当困难的分析问题的情况。对该方法的输入输出参数及其获取方法进行了描述和分析。数值对比分析表明,优化调整滚珠减振器参数后,该系统具有较高的工作效率。
{"title":"Method of creation a digital twin of a vibration protection process","authors":"Atamaniuk Oleksii, Legeza Viktor","doi":"10.34185/1562-9945-4-147-2023-06","DOIUrl":"https://doi.org/10.34185/1562-9945-4-147-2023-06","url":null,"abstract":"Various approaches to building digital twins are considered. The data-based approach has a big disadvantage due to need of the huge amount of information. The system-based ap-proach can not be used in some cases due to the lack of a mathematically justified method. One of such cases is a ball vibration absorber but they can be really useful for the vibration protection of high-rise flexible objects. The purpose of the research is to develop an algorithmic method of creating digital twins of the vibration protection process, which will provide the possibility of determining the optimal control parameters of the ball vibration absorber. The paper examines small steady oscillations of the dynamic system \"supporting body - ball vibration absorber\". Under the condition of small forced oscillations, the equation of the amplitude-frequency characteristic of the linear anti-vibration system was obtained. In view of the use in construction, the input and output parameters of the method of building a digital twin of a flexible structure were described and analyzed, as well as the methods of obtaining them. As a result of the evaluation of the speed of the method, a modification of the search way for the optimal parameters of the digital twin was proposed. The comparative analysis showed the high efficiency of the proposed anti-vibration sys-tem with optimally adjusted parameters of the digital twin. The proposed method allows to reduce the maximum value of the amplitude by approximately four times. Modifications of the method made it possible to speed it up by an average of three times, reduce the load on the processor and handle cases when finding the optimal parameters of a digital twin is a rather difficult analytical problem. The input and output parameters of the method and ways of obtaining them were de-scribed and analyzed. A comparative numerical analysis showed the high efficiency of the functioning of such a vibration protection system with optimally adjusted parameters of the ball vibration absorber.","PeriodicalId":493145,"journal":{"name":"Sistemnì tehnologìï","volume":"130 34","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136352234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Architectural solution for the ddp (diploma defense project) web application to document the examination process 体系结构解决方案的ddp(文凭防御项目)web应用程序,以记录考试过程
Pub Date : 2023-11-13 DOI: 10.34185/1562-9945-6-143-2022-10
Selivyorstova Tatjana, Andriukhina Marharyta
Analysis of recent research and publications. The primary source of information about using Ruby on Rails is the official RoR documentation website. After researching scientific papers and textbooks on architecture, theoretical aspects that should be taken into account when developing web services were collected. Research objective. The aim of this work is to investigate existing architectural solutions for automating the work of the examination committee and to develop an architectural solution for creating a software product based on it to increase efficiency and improve the quality of the defense process. Presentation of the main research material. The main stakeholders were identified - the secretary of the commission, commission members, commission chair, academic supervisor, student undergoing defense procedures. The client-customer is considered the department. A questionnaire was proposed for teachers to determine non-functional requirements. This allowed us to better consider their needs and requirements in project development. Analysis of functional requirements (architecturally significant requirements) has been conducted. The requirements define factors that significantly influence the choice of architectural style and tools. The constraints include financial and resource aspects, as well as technical and organizational constraints, which can impact the volume, speed, and possibility of future project development. For the DDP system, the following technology stack was chosen: Ruby on Rails for backend and frontend; Postgres for the database. Additionally, a domain was purchased on the HOSTIA service - lildoc.hhos.net (domain traffic is unlimited, currently valid until 08/22/2025), andplans are in place to purchase database hosting. Github was chosen for version control. The design, class, sequence, activity, entity-relationship diagrams for theDDP system were formed and presented. The defined architecture of the DDP project: - Follows Model-View-Controller (MVC) pattern. - Components: Models, Views, Controllers, Routing, Database (PostgreSQL), User Interface, Authentication and Authorization System, Testing. Conclusions from this study and prospects for further developments in this direction. The article examines existing solutions for automating the secretary of the commission's workplace, presents the results of developing the general architecture of the DDP project based on Ruby on Rails principles and the MVC pattern. A new architectural solution for a web service to automate the work of the examination commission members is presented.
分析最近的研究和出版物。关于使用Ruby on Rails的主要信息来源是官方RoR文档网站。在研究了有关体系结构的科学论文和教科书之后,收集了开发web服务时应该考虑的理论方面。研究目标。这项工作的目的是调查现有的体系结构解决方案,使审查委员会的工作自动化,并开发一个体系结构解决方案,以创建一个基于它的软件产品,以提高效率并改进防御过程的质量。主要研究资料的介绍。确定了主要利益相关者-委员会秘书,委员会成员,委员会主席,学术导师,正在进行辩护程序的学生。客户-客户被认为是部门。提出了一份问卷,以确定教师的非功能需求。这使我们能够在项目开发中更好地考虑他们的需要和要求。对功能需求(架构上重要的需求)进行了分析。需求定义了显著影响体系结构风格和工具选择的因素。这些限制包括财务和资源方面,以及技术和组织方面的限制,这些限制会影响未来项目开发的数量、速度和可能性。对于DDP系统,选择了以下技术栈:后端和前端使用Ruby on Rails;数据库为Postgres。此外,在HOSTIA服务上购买了一个域名- lildoc.hhos.net(域名流量是无限的,目前有效期到2025年8月22日),并计划购买数据库托管。选择Github进行版本控制。形成并给出了ddp系统的设计图、类图、序列图、活动图、实体关系图。DDP项目的定义体系结构:遵循模型-视图-控制器(MVC)模式。-组件:模型,视图,控制器,路由,数据库(PostgreSQL),用户界面,认证和授权系统,测试。本研究的结论及对该方向进一步发展的展望。本文研究了自动化委员会工作场所秘书的现有解决方案,展示了基于Ruby on Rails原则和MVC模式开发DDP项目的通用体系结构的结果。提出了一种新的web服务体系结构解决方案,使考试委员会成员的工作自动化。
{"title":"Architectural solution for the ddp (diploma defense project) web application to document the examination process","authors":"Selivyorstova Tatjana, Andriukhina Marharyta","doi":"10.34185/1562-9945-6-143-2022-10","DOIUrl":"https://doi.org/10.34185/1562-9945-6-143-2022-10","url":null,"abstract":"Analysis of recent research and publications. The primary source of information about using Ruby on Rails is the official RoR documentation website. After researching scientific papers and textbooks on architecture, theoretical aspects that should be taken into account when developing web services were collected. Research objective. The aim of this work is to investigate existing architectural solutions for automating the work of the examination committee and to develop an architectural solution for creating a software product based on it to increase efficiency and improve the quality of the defense process. Presentation of the main research material. The main stakeholders were identified - the secretary of the commission, commission members, commission chair, academic supervisor, student undergoing defense procedures. The client-customer is considered the department. A questionnaire was proposed for teachers to determine non-functional requirements. This allowed us to better consider their needs and requirements in project development. Analysis of functional requirements (architecturally significant requirements) has been conducted. The requirements define factors that significantly influence the choice of architectural style and tools. The constraints include financial and resource aspects, as well as technical and organizational constraints, which can impact the volume, speed, and possibility of future project development. For the DDP system, the following technology stack was chosen: Ruby on Rails for backend and frontend; Postgres for the database. Additionally, a domain was purchased on the HOSTIA service - lildoc.hhos.net (domain traffic is unlimited, currently valid until 08/22/2025), andplans are in place to purchase database hosting. Github was chosen for version control. The design, class, sequence, activity, entity-relationship diagrams for theDDP system were formed and presented. The defined architecture of the DDP project: - Follows Model-View-Controller (MVC) pattern. - Components: Models, Views, Controllers, Routing, Database (PostgreSQL), User Interface, Authentication and Authorization System, Testing. Conclusions from this study and prospects for further developments in this direction. The article examines existing solutions for automating the secretary of the commission's workplace, presents the results of developing the general architecture of the DDP project based on Ruby on Rails principles and the MVC pattern. A new architectural solution for a web service to automate the work of the examination commission members is presented.","PeriodicalId":493145,"journal":{"name":"Sistemnì tehnologìï","volume":"123 29","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136352259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Sistemnì tehnologìï
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1