Кафедра "Кібербезпека"

Постійне посилання колекціїhttps://repository.kpi.kharkov.ua/handle/KhPI-Press/63626

Офіційний сайт кафедри https://cybersecurity.kpi.kharkov.ua

Кафедра "Кібербезпека" створена 11 січня 2022 року.

Кафедра активно співпрацює у галузі освіти та наукових досліджень із провідними ІТ-компаніями (Distributed Lab, Сайфер, Microcrypt Technologies). Викладачі кафедри та студенти, що навчаються за напрямом кафедри, активно використовують ресурси хмарних обчислень та застосовують технології сучасних мереж і засоби кібербезпеки разом із провідними фахівцями.

Кафедра проводить міжнародну науково-практичну конференцію “Інформаційна безпека та інформаційні технології” в рамках міжнародного науково-практичний форуму "Цифрова реальність", є співорганізатором міжнародного конгресу ”Human-Computer Interaction, Optimization and Robotic Applications” (IEEE, Анкара, Турція).

Кафедра входить до складу Навчально-наукового інституту комп'ютерних наук та інформаційних технологій Національного технічного університету "Харківський політехнічний інститут".

На кафедрі "Кібербезпека" працюють 11 викладачів, з них 3 мають науковий ступінь доктора технічних наук, 5 – науковий ступінь кандидата технічних наук; 3 – звання професора, 8 – звання доцента.

Переглянути

Результати пошуку

Зараз показуємо 1 - 3 з 3
  • Ескіз
    Документ
    SSL/TLS protocol on post-quantum algorithms
    (Національний авіаційний університет, 2024) Milevskyi, Stanislav; Voropay, Natalya; Korol, Olha; Yevseiev, Serhii; Aksonova, Iryna
    The development of mobile technologies and their integration with Internet of Things and smart technologies form both cyber-physical and socio-cyber-physical systems. In such systems, as a rule, wireless communication channels are used, in which SSL/TLS protocols are used to provide security services (confidentiality, integrity and authenticity). However, this protocol is not only vulnerable to "Meeting in the Middle", POODLE, BEAST, CRIME, BREACH attacks, but with the advent of a full-scale quantum computer, it can be broken. The article proposes a protocol based on quantum algorithms – crypto-code constructions, which will ensure not only resistance to current attacks, but also stability in the post-quantum period. To ensure the "hybridity" of services, it is proposed to use McEliece and Niederreiter crypto-code constructions and the improved UMAC algorithm based on McEliece crypto-code design. The use of crypto-code constructions provides not only resistance to attacks, but also simplifies the formation of a connection – the parameters of elliptic curves are used for the transmission of the common key. This approach significantly reduces the time of connecting mobile gadgets and simplifies the procedure of agreement before data transfer.
  • Ескіз
    Документ
    The concept of building security of the network with elements of the semiotic approach
    (Технологічний Центр, 2023) Yevseiev, S. P.; Tolkachov, Maksym; Shetty, Darshan; Khvostenko, Vladyslav; Strelnikova, Anna; Milevskyi, Stanislav; Golovashych, Sergii
    The main scientific results: the concept of a structured protection system with the Zero Trust Security approach has been developed. The structure of the semiotic analysis of the segmentation of the transmitted load on the blocks is proposed. Blocks by signs are subjected to individual analysis. According to the features, the blocks are transformed by the selected representation into an object/groups of objects. Groups for transmission in the load are tagged, have different coding severity (depth), depending on the risk assessment. Groups are transmitted through the network in different ways (paths) – VPN (different ESP), unencrypted tunnel, open access, etc. This solution improves the throughput of malicious load analysis prior to transmission. The performance overhead for encoding/decoding the load and encapsulating/de-encapsulating during transmission is reduced. The transmission bandwidth is increased.
  • Ескіз
    Документ
    Development of a method for assessing the security of cyber-physical systems based on the Lotka-Volterra model
    (ПП "Технологічний Центр", 2021) Yevseiev, S. P.; Pohasii, Serhii ; Milevskyi, Stanislav ; Milov, Oleksandr ; Melenti, Y.; Grod, I.; Berestov, D.; Fedorenko, R.; Kurchenko, O.
    The paper presents the results of the development of a method for assessing the security of cyber-physical systems based on the Lotka–Volterra model. Security models of cyber-physical systems are proposed: “predator–prey” taking into account the computing capabilities and focus of targeted cyberattacks, “predator–prey” taking into account the possible competition of attackers in relation to the “prey”, “predator–prey” taking into account the relationships between “prey species” and “predator species”, “predator–prey” taking into account the relationship between “prey species” and “predator species”. Based on the proposed approach, the coefficients of the Lotka–Volterra model α=0.39, β=0.32, γ=0.29, φ=0.27 were obtained, which take into account the synergy and hybridity of modern threats, funding for the formation and improvement of the protection system, and also allow determining the financial and computing capabilities of the attacker based on the identified threats. The proposed method for assessing the security of cyber-physical systems is based on the developed threat classifier, allows assessing the current security level and provides recommendations regarding the allocation of limited protection resources based on an expert assessment of known threats. This approach allows offline dynamic simulation, which makes it possible to timely determine attackers' capabilities and form preventive protection measures based on threat analysis. In the simulation, actual bases for assessing real threats and incidents in cyber-physical systems can be used, which allows an expert assessment of their impact on both individual security services and security components (cyber security, information security and security of information). The presented simulation results do not contradict the graphical results of the classical Lotka–Volterra model, which indicates the adequacy of the proposed approach for assessing the security of cyber-physical systems