Кафедри
Постійне посилання на розділhttps://repository.kpi.kharkov.ua/handle/KhPI-Press/35393
Переглянути
12 результатів
Результати пошуку
Документ Modeling of security systems for critical infrastructure facilities(PC Technology Center, 2022) Yevseiev, Serhii; Hryshchuk, Ruslan; Molodetska, Kateryna; Nazarkevych, Mariia; Hrytsyk, Volodymyr; Milov, Oleksandr; Korol, Olha; Milevskyi, Stanislav; Korolev, Roman; Pohasii, Serhii; Tkachov, Andrii; Melenti, Yevgen; Lavrut, Oleksandr; Havrylova, Alla; Herasуmov, Serhii; Holotaistrova, Halyna; Avramenko, Dmytro; Vozniak, Roman; Voitko, Oleksandr; Yerhidzei, Kseniia; Mykus, Serhii; Pribyliev, Yurii; Akhiiezer, Olena; Shyshkin, Mykhailo; Opirskyy, Ivan; Harasymchuk, Oleh; Mykhaylova, Olha; Nakonechnyy, Yuriy; Stakhiv, Marta; Tomashevsky, BogdanThe development of Industry 4.0 technologies is based on the rapid growth of the computing capabilities of mobile wireless technologies, which has made it possible to significantly expand the range of digital services and form a conglomeration of socio-cyber-physical systems and smart technologies. The First Section discusses the issues of building security systems based on the proposed Concept of multi-contour security systems, taking into account the hybridity and synergy of modern targeted cyber-attacks, their integration with social engineering methods. This approach not only increases the level of security, but also forms an objective approach to the use of post-quantum security mechanisms based on the proposed Lotka-Volterra models. The Second Section analyzes the features of the functioning of social Internet services and establishes their role in ensuring the information security of the state. An approach is proposed to identify signs of threats in the text content of social Internet services, which will allow to quickly respond to changing situations and effectively counteract such threats. A classifier of information security profiles of users of social Internet services has been developed to assess the level of their danger as potential participants in disinformation campaigns. A method for identifying and evaluating the information and psychological impact on user communities in services is proposed. Models of conflict interaction of user groups in social Internet services are considered on the example of civil movements. To effectively counter threats to information security of the state, it is proposed to use the concept of synergistic user interaction and self-organization processes in a virtual community. Particular attention is paid to countering the manipulation of public opinion in the decision-making process by users of social Internet services. The Third Section proposes a biometric security system that works to authenticate users based on a comparison of their fingerprints and certain templates stored in a biometric database. A method for determining the contour based on the passage of a curve and the filtering function of contour lines has been developed. The stage of skeletal identification is analyzed in detail. The Ateb-Gabor method with wave thinning has been developed. The performance of skeletal algorithms such as the Zhang-Suen thinning algorithm, the Hilditch algorithm, and the Ateb-Gabor method with wave decimation is analyzed. The presented results of experiments with biometric fingerprints based on the NIST Special Database 302 database showed the effectiveness of the proposed method. The software and firmware were developed using the Arduino Nano.Публікація Application of Cost-Effective Acoustic Intelligence to Protect Critical Facilities from Drone Attacks(Institute of Electrical and Electronics Engineers, 2022) Pohasii, Serhii; Baranova, Valeria; Bilotserkivskyi, Oleksandr; Haponenko, Olha; Serhiienko, Olena; Vorobiov, BohdanUnauthorized use of unmanned aerial vehicles (UA Vs) for surveillance of important objects, carrying out terrorist attacks and sabotage, throwing prohibited objects (weapons, drugs) has updated the search for cost-effective and technically feasible solutions to counter UA Vs. An analysis of materials on this topic showed that the effectiveness of defeating all types of UA Vs by existing means of air defense and electronic warfare is quite high. However, the problem of countering small UA Vs, based on the experience of the war in Ukraine, is not resolved. The purpose of the article is to analyze the UA V, as an object of detection and countermeasures, using acoustic means of airspace control with minimal economic costs. The article presents the results of the analysis of the UAVas an object of detection and the issuance of target designations by means of acoustic observation.Публікація Cost-Effective Software and Hardware Complex to Ensure Security Against Unauthorized Use of Enemy Commercial Uavs on the Combat Territory(Institute of Electrical and Electronics Engineers, 2023) Pohasii, Serhii; Milevskyi, Stanislav; Bilotserkivskyi, Oleksandr; Baranova, Valeria; Ippolitova, Inna; Pyvavar, IrynaThe rapid development in unmanned aerial systems (UAS) has raised concerns about security in both civilian and military domains. Remote identification of UAS, crucial for ensuring legality and ownership verification in real-time, poses challenges. This article explores the improvement of software and hardware complexes to counter the unauthorized use of enemy commercial UAVs on combat territories. Different data transfer protocols used by UAS, such as MAVLink, DJI OcuSync, Lightbridge, Datalink, and LTE/4G/5G, are compared based on their technical characteristics. The article highlights the vulnerabilities in identity forgery that can compromise privacy and operational security, emphasizing the need for robust remote identification systems. It discusses controversies surrounding DJI's DroneID protocol and the utilization of the DJI AeroScope Monitoring System. The limitations and problems associated with existing hardware solutions are addressed, and the benefits of using budget-friendly equipment for combatting dual-purpose commercial UAS are highlighted. The proposed detection system offers cost-effectiveness, scalability, mobility, and adaptability to counter evolving enemy UAS control methods, ensuring improved security on the front lines.Публікація Assessing the Economic and Technical Effectiveness of Intercepting UAVs Using Alternative Methods(2023) Pohasii, Serhii; Mashchenko, Maryna; Serhiienko, Olena; Klimenko, Olena; Andriushchenko, Tetiana; Milevska, TetianaThe study explores the various methods and technologies employed in intercepting unmanned aerial vehicles (UAVs). It highlights the use of UAV interceptors, specifically those utilizing the kamikaze scenario, which have demonstrated effectiveness in conflicts such as the war in Ukraine. The research investigates the technical and economic aspects of combating UAVs, particularly reconnaissance and kamikaze UAVs equipped with various types of ammunition. Cost analysis and technical characteristics of commonly used kamikaze UAVs are examined. This study provides valuable insights into the challenges and potential solutions in countering UAV threats.Документ Development of crypto-code constructs based on LDPC codes(ПП "Технологічний Центр", 2022) Pohasii, Serhii; Yevseiev, S. P.; Milov, Oleksandr; Kovalenko, Oleksandr; Kostiak, Maryna; Volkov, Andrii; Lezik, Aleksandr; Susukailo, VitaliiThe results of developing post-quantum algorithms of McEliece and Niederreiter crypto-code constructs based on LDPC (Low-Density Parity-Check) codes are presented. With the rapid growth of computing capabilities of mobile technologies and the creation of wireless mesh and sensor networks, Internet of Things technologies, and smart technologies on their basis, information security is becoming an urgent problem. At the same time, there is a need to consider security in two circuits, internal (directly within the network infrastructure) and external (cloud technologies). In such conditions, it is necessary to integrate threats to both the internal and external security circuits. This allows you to take into account not only the hybridity and synergy of modern targeted threats, but also the level of significance (degree of secrecy) of information flows and information circulating in both the internal and external security circuits. The concept of building security based on two circuits is proposed. To ensure the security of wireless mobile channels, it is proposed to use McEliece and Niederreiter crypto-code constructs based on LDPC codes, which allows integration into the credibility technology of IEEE 802.15.4, IEEE 802.16 standards. This approach provides the required level of security services (confidentiality, integrity, authenticity) in a full-scale quantum computer. Practical security technologies based on the proposed crypto-code constructs, online IP telephony and the Smart Home system based on the use of an internal server are considered.Документ Development of a method for assessing the security of cyber-physical systems based on the Lotka-Volterra model(ПП "Технологічний Центр", 2021) Yevseiev, S. P.; Pohasii, Serhii ; Milevskyi, Stanislav ; Milov, Oleksandr ; Melenti, Y.; Grod, I.; Berestov, D.; Fedorenko, R.; Kurchenko, O.The paper presents the results of the development of a method for assessing the security of cyber-physical systems based on the Lotka–Volterra model. Security models of cyber-physical systems are proposed: “predator–prey” taking into account the computing capabilities and focus of targeted cyberattacks, “predator–prey” taking into account the possible competition of attackers in relation to the “prey”, “predator–prey” taking into account the relationships between “prey species” and “predator species”, “predator–prey” taking into account the relationship between “prey species” and “predator species”. Based on the proposed approach, the coefficients of the Lotka–Volterra model α=0.39, β=0.32, γ=0.29, φ=0.27 were obtained, which take into account the synergy and hybridity of modern threats, funding for the formation and improvement of the protection system, and also allow determining the financial and computing capabilities of the attacker based on the identified threats. The proposed method for assessing the security of cyber-physical systems is based on the developed threat classifier, allows assessing the current security level and provides recommendations regarding the allocation of limited protection resources based on an expert assessment of known threats. This approach allows offline dynamic simulation, which makes it possible to timely determine attackers' capabilities and form preventive protection measures based on threat analysis. In the simulation, actual bases for assessing real threats and incidents in cyber-physical systems can be used, which allows an expert assessment of their impact on both individual security services and security components (cyber security, information security and security of information). The presented simulation results do not contradict the graphical results of the classical Lotka–Volterra model, which indicates the adequacy of the proposed approach for assessing the security of cyber-physical systemsДокумент Development of a protocol for a closed mobile Internet channel based on post-quantum algorithms(Харківський національний університет Повітряних Сил ім. Івана Кожедуба, 2021) Yevseiev, S. P.; Pohasii, Serhii; Khvostenko, VladyslavThe development of computing technologies has made it possible not only to expand the range of mobile communication services, but also to significantly increase computing capabilities. The emergence of mobile Internet, 4G, 5G technologies makes it possible to talk about a fundamentally different approach to ensuring the quality of service to network customers, creating fundamentally new approaches to ensuring the efficiency and reliability of transmitted information flows. However, such a rapid growth of GSM technologies without the introduction of security services leads to active actions of attackers and cyber terrorists, the emergence of new and modification of known threats. Mobile communication channels are used by cybercriminals for selfish purposes of access to database resources not only of the mobile Internet, but also to the databases of information and communication systems and networks. The article proposes a fundamentally new approach to ensuring the closure of the voice channel of the mobile Internet based on post-quantum cryptography algorithms – McEliece and Niederreiter crypto-code constructions on elliptic codes. This approach provides not only the offline mode of closing the voice channel and creating a VPN channel in tunnel mode, but also the required level of cryptographic strength in the face of the emergence of full-scale quantum computers.Документ Safety of LTE technologies based on post-quantum algorithms(2021) Yevseiev, S. P.; Khvostenko, Vladyslav; Pohasii, SerhiiДокумент Mechanisms for ensuring the security of channels of a prospective management system(Національний технічний університет "Харківський політехнічний інститут", 2022) Tomashevsky, Bogdan; Yevseiev, S. P.; Pohasii, Serhii; Milevskyi, StanislavThe development of military (state) control systems in modern conditions of hybrid warfare requires the possibility of rapid expansion of both functionality and scaling of the physical and logical basis of management, increasing the range of digitization and use of both military and civilian communication channels to manage troops and weapons. Not only the computing power of the enemy, the means of suppressing and / or blocking the communication channels of the control system, but also the development of quantum technologies that place new and more stringent requirements on security mechanisms based on symmetric and asymmetric cryptography algorithms. According to NIST, a full-scale quantum computer breaks both symmetric and asymmetric cryptosystems in polynomial time, significantly reducing their resilience. The paper proposes mechanisms of post-quantum cryptography, which allow to ensure the stability of not only communication channels, but also elements of the structure of the control system. The basis of post-quantum encryption algorithms is the combination of algorithms (schemes) of crypto-code structures with cryptosystems on unprofitable codes (multi-channel cryptography), as well as the possibility of combining them with digital steganography methods. This approach provides the ability to hide elements of management commands, and the use of different channels provides the ability to hide individual elements of cryptograms.Документ Development of the double-contour protection concept in socio-cyberphysical systems(Національний технічний університет "Харківський політехнічний інститут", 2022) Pohasii, Serhii; Milevskyi, Stanislav; Tomashevsky, Bohdan; Voropay, NatalyaThe rapid development of mobile Internet technologies LTE (Long-Term Evolution) not only predetermined the further development of cyber-physical systems, which are based on the synthesis of technologies of classical computer systems and LTE technologies, as well as integration with Internet-of-Things technologies. As a result, the emergence of sociocyberphysical systems predetermines further development based on this integration. The creation of mesh- and sensor networks also allows the development of smart technologies and systems based on their conglomeration. The development and creation of a quantum computer, on the one hand, will make it possible to make a technical breakthrough in computing resources, use artificial intelligence, and on the other hand, it can lead to "chaos" in ensuring the security of modern technologies and systems. So, based on the algorithms of Shor and Grover quantum cryptography, symmetric cryptosystems based on traditional cryptography algorithms, as well as asymmetric cryptosystems, including systems based on elliptic curve cryptography, can be broken. The paper proposes to use a new approach to building security systems based on the concept of internal and external security contours. At the same time, security contours of continuous business processes are considered. This approach provides an objective assessment of the current state of security of the socio-cyber system as a whole.