Modeling of security systems for critical infrastructure facilities

dc.contributor.authorYevseiev, Serhii
dc.contributor.authorHryshchuk, Ruslan
dc.contributor.authorMolodetska, Kateryna
dc.contributor.authorNazarkevych, Mariia
dc.contributor.authorHrytsyk, Volodymyr
dc.contributor.authorMilov, Oleksandr
dc.contributor.authorKorol, Olha
dc.contributor.authorMilevskyi, Stanislav
dc.contributor.authorKorolev, Roman
dc.contributor.authorPohasii, Serhii
dc.contributor.authorTkachov, Andrii
dc.contributor.authorMelenti, Yevgen
dc.contributor.authorLavrut, Oleksandr
dc.contributor.authorHavrylova, Alla
dc.contributor.authorHerasуmov, Serhii
dc.contributor.authorHolotaistrova, Halyna
dc.contributor.authorAvramenko, Dmytro
dc.contributor.authorVozniak, Roman
dc.contributor.authorVoitko, Oleksandr
dc.contributor.authorYerhidzei, Kseniia
dc.contributor.authorMykus, Serhii
dc.contributor.authorPribyliev, Yurii
dc.contributor.authorAkhiiezer, Olena
dc.contributor.authorShyshkin, Mykhailo
dc.contributor.authorOpirskyy, Ivan
dc.contributor.authorHarasymchuk, Oleh
dc.contributor.authorMykhaylova, Olha
dc.contributor.authorNakonechnyy, Yuriy
dc.contributor.authorStakhiv, Marta
dc.contributor.authorTomashevsky, Bogdan
dc.date.accessioned2024-07-03T10:06:10Z
dc.date.available2024-07-03T10:06:10Z
dc.date.issued2022
dc.description.abstractThe development of Industry 4.0 technologies is based on the rapid growth of the computing capabilities of mobile wireless technologies, which has made it possible to significantly expand the range of digital services and form a conglomeration of socio-cyber-physical systems and smart technologies. The First Section discusses the issues of building security systems based on the proposed Concept of multi-contour security systems, taking into account the hybridity and synergy of modern targeted cyber-attacks, their integration with social engineering methods. This approach not only increases the level of security, but also forms an objective approach to the use of post-quantum security mechanisms based on the proposed Lotka-Volterra models. The Second Section analyzes the features of the functioning of social Internet services and establishes their role in ensuring the information security of the state. An approach is proposed to identify signs of threats in the text content of social Internet services, which will allow to quickly respond to changing situations and effectively counteract such threats. A classifier of information security profiles of users of social Internet services has been developed to assess the level of their danger as potential participants in disinformation campaigns. A method for identifying and evaluating the information and psychological impact on user communities in services is proposed. Models of conflict interaction of user groups in social Internet services are considered on the example of civil movements. To effectively counter threats to information security of the state, it is proposed to use the concept of synergistic user interaction and self-organization processes in a virtual community. Particular attention is paid to countering the manipulation of public opinion in the decision-making process by users of social Internet services. The Third Section proposes a biometric security system that works to authenticate users based on a comparison of their fingerprints and certain templates stored in a biometric database. A method for determining the contour based on the passage of a curve and the filtering function of contour lines has been developed. The stage of skeletal identification is analyzed in detail. The Ateb-Gabor method with wave thinning has been developed. The performance of skeletal algorithms such as the Zhang-Suen thinning algorithm, the Hilditch algorithm, and the Ateb-Gabor method with wave decimation is analyzed. The presented results of experiments with biometric fingerprints based on the NIST Special Database 302 database showed the effectiveness of the proposed method. The software and firmware were developed using the Arduino Nano.
dc.identifier.citationModeling of security systems for critical infrastructure facilities : monograph / S. Yevseiev, R. Hryshchuk, K. Molodetska, M. Nazarkevych [et al.] – Kharkiv: PC Technology Center, 2022. – 196 p.
dc.identifier.doihttps://doi.org/10.15587/978-617-7319-57-2
dc.identifier.orcidhttps://orcid.org/0000-0003-1647-6444
dc.identifier.orcidhttps://orcid.org/0000-0001-9985-8477
dc.identifier.orcidhttps://orcid.org/0000-0001-9864-2463
dc.identifier.orcidhttps://orcid.org/0000-0002-6528-9867
dc.identifier.orcidhttps://orcid.org/0000-0002-9696-5805
dc.identifier.orcidhttps://orcid.org/0000-0001-6135-2120
dc.identifier.orcidhttps://orcid.org/0000-0002-8733-9984
dc.identifier.orcidhttps://orcid.org/0000-0001-5087-7036
dc.identifier.orcidhttp://orcid.org/0000-0002-7948-5914
dc.identifier.orcidhttps://orcid.org/0000-0002-4540-3693
dc.identifier.orcidhttps://orcid.org/0000-0003-1428-0173
dc.identifier.orcidhttps://orcid.org/0000-0003-2955-2469
dc.identifier.orcidhttps://orcid.org/0000-0002-4909-6723
dc.identifier.orcidhttps://orcid.org/0000-0002-2015-8927
dc.identifier.orcidhttps://orcid.org/0000-0003-1810-0387
dc.identifier.orcidhttps://orcid.org/0000-0001-8349-6571
dc.identifier.orcidhttps://orcid.org/0000-0003-1892-380X
dc.identifier.orcidhttps://orcid.org/0000-0002-3789-2837
dc.identifier.orcidhttps://orcid.org/0000-0002-4610-4476
dc.identifier.orcidhttps://orcid.org/0000-0003-4634-133X
dc.identifier.orcidhttps://orcid.org/0000-0002-7103-4166
dc.identifier.orcidhttps://orcid.org/0000-0003-1941-3561
dc.identifier.orcidhttp://orcid.org/0000-0002-7087-9749
dc.identifier.orcidhttps://orcid.org/0000-0002-2276-7259
dc.identifier.orcidhttps://orcid.org/0000-0002-8461-8996
dc.identifier.orcidhttps://orcid.org/0000-0002-8742-8872
dc.identifier.orcidhttps://orcid.org/0000-0002-3086-3160
dc.identifier.orcidhttps://orcid.org/0000-0002-6046-6190
dc.identifier.orcidhttps://orcid.org/0000-0002-4094-2081
dc.identifier.orcidhttps://orcid.org/0000-0002-1934-4773
dc.identifier.urihttps://repository.kpi.kharkov.ua/handle/KhPI-Press/78994
dc.language.isoen
dc.publisherPC Technology Center
dc.subjectconcept of a multi-loop security system
dc.subjectsocio-cyber-physical systems
dc.subjectpost-quantum security mechanisms
dc.subjectsecurity system agents
dc.subjectLotka-Volterra models
dc.subjectmodern targeted cyber-attacks
dc.titleModeling of security systems for critical infrastructure facilities
dc.typeMonograph

Файли

Контейнер файлів
Зараз показуємо 1 - 1 з 1
Вантажиться...
Ескіз
Назва:
Monograph_2022_Yevseiev_Modeling.pdf
Розмір:
20.64 MB
Формат:
Adobe Portable Document Format
Ліцензійна угода
Зараз показуємо 1 - 1 з 1
Ескіз недоступний
Назва:
license.txt
Розмір:
11.25 KB
Формат:
Item-specific license agreed upon to submission
Опис: