21 research outputs found

    Socio-cyber-physical systems’ threats classifier

    Get PDF
    Summary: The article considers a new approach to the formation of a threat classifier in socio-cyber-physical systems. These systems, as a rule, are complex and based on the synthesis of cyber-physical components using smart technologies and social networks. It is important to note that these systems also belong to critical infrastructure objects, which requires a new approach to the creation of multi-contour security systems. An important task for the formation of the security contour of such systems is the development of a threat classifier that allows to objectively assess the criticality of the organization's infrastructure elements. The presented classifier allows to define an expert approach at the initial stage for establishing weighting factors of the influence of threats, such as anomalies, deviations from normal functioning and computer incidents. At the next stage, the characteristics of the impact of threats on the platforms of socio-cyber-physical systems, as well as their impact on the external and internal aspects of the system, are determined. The influence of social engineering methods, which can significantly increase the risk of threat implementation and create various channels for their implementation, including mixed (targeted) attacks, is considered in detail. On the basis of the proposed approach to the classification of threats, a method of assessing the current state of the level of security of socio-cyber-physical systems and the possibilities of determining the critical points of the system infrastructure is proposed. Countermeasures and the ability of multi-loop security systems to provide effective infrastructure protection are also discusse

    Quantum Secure Telecommunication Systems

    Get PDF
    This book guides readers through the basics of rapidly emerging networks to more advanced concepts and future expectations of Telecommunications Networks. It identifies and examines the most pressing research issues in Telecommunications and it contains chapters written by leading researchers, academics and industry professionals. Telecommunications Networks - Current Status and Future Trends covers surveys of recent publications that investigate key areas of interest such as: IMS, eTOM, 3G/4G, optimization problems, modeling, simulation, quality of service, etc. This book, that is suitable for both PhD and master students, is organized into six sections: New Generation Networks, Quality of Services, Sensor Networks, Telecommunications, Traffic Engineering and Routing

    MODELING THE PROTECTION OF PERSONAL DATA FROM TRUST AND THE AMOUNT OF INFORMATION ON SOCIAL NETWORKS

    Get PDF
    The article analyzes the parameters of social networks. The analysis is performed to identify critical threats. Threats may lead to leakage or damage to personal data. The complexity of this issue lies in the ever-increasing volume of data. Analysts note that the main causes of incidents in Internet resources are related to the action of the human factor, the mass hacking of IoT devices and cloud services. This problem is especially exacerbated by the strengthening of the digital humanistic nature of education, the growing role of social networks in human life in general. Therefore, the issue of personal information protection is constantly growing. To address this issue, let’s propose a method of assessing the dependence of personal data protection on the amount of information in the system and trust in social networks. The method is based on a mathematical model to determine the protection of personal data from trust in social networks. Based on the results of the proposed model, modeling was performed for different types of changes in confidence parameters and the amount of information in the system. As a result of mathematical modeling in the MatLab environment, graphical materials were obtained, which showed that the protection of personal data increases with increasing factors of trust in information. The dependence of personal data protection on trust is proportional to other data protection parameters. The protection of personal data is growing from growing factors of trust in information. Mathematical modeling of the proposed models of dependence of personal data protection on trust confirmed the reliability of the developed model and proved that the protection of personal data is proportional to reliability and trus

    A neural network model for object mask detection in medical images

    Get PDF
    In modern conditions in the field of medicine, raster image analysis systems are becoming more widespread, which allow automating the process of establishing a diagnosis based on the results of instrumental monitoring of a patient. One of the most important stages of such an analysis is the detection of the mask of the object to be recognized on the image. It is shown that under the conditions of a multivariate and multifactorial task of analyzing medical images, the most promising are neural network tools for extracting masks. It has also been determined that the known detection tools are highly specialized and not sufficiently adapted to the variability of the conditions of use, which necessitates the construction of an effective neural network model adapted to the definition of a mask on medical images. An approach is proposed to determine the most effective type of neural network model, which provides for expert evaluation of the effectiveness of acceptable types of models and conducting computer experiments to make a final decision. It is shown that to evaluate the effectiveness of a neural network model, it is possible to use the Intersection over Union and Dice Loss metrics. The proposed solutions were verified by isolating the brachial plexus of nerve fibers on grayscale images presented in the public Ultrasound Nerve Segmentation database. The expediency of using neural network models U-Net, YOLOv4 and PSPNet was determined by expert evaluation, and with the help of computer experiments, it was proved that U-Net is the most effective in terms of Intersection over Union and Dice Loss, which provides a detection accuracy of about 0.89. Also, the analysis of the results of the experiments showed the need to improve the mathematical apparatus, which is used to calculate the mask detection indicators

    Improving the Efficiency of UAV Communication Channels in the Context of Electronic Warfare

    Get PDF
    The article is devoted to the development of a method for increasing the efficiency of communication channels of unmanned aerial vehicles (UAVs) in the conditions of electronic warfare (EW). The author analyses the threats that may be caused by the use of electronic warfare against autonomous UAVs. A review of some technologies that can be used to create original algorithms for countering electronic warfare and increasing the autonomy of UAVs on the battlefield is carried out. The structure of modern digital communication systems is considered. The requirements of unmanned aerial vehicle manufacturers for onboard electronic equipment are analyzed, and the choice of the hardware platform of the target radio system is justified. The main idea and novelty of the proposed method are highlighted. The creation of a model of a cognitive radio channel for UAVs is considered step by step. The main steps of modeling the spectral activity of electronic warfare equipment are proposed. The main criteria for choosing a free spectral range are determined. The type of neural network for use in the target cognitive radio system is substantiated. The idea of applying adaptive coding in UAV communication channels using multicomponent turbo codes in combination with neural networks, which are simultaneously used for cognitive radio, has been further developed

    Method of Intervals Transformation in Fuzzy Numbers for Information Security Risk Analysis and Assessment Systems

    Get PDF
    Presented method of transformation intervals in trapezoidal fuzzy numbers for risk analysis and assessment systems, that will allow to automatize the intervals transformation process without involvement of subject field expert’s.Представлен метод преобразования интервалов в нечеткие числа трапециевидного типа для систем анализа и оценивания рисков, который позволит автоматизировать процесс трансформирования интервалов без участия экспертов соответственной предметной области

    ПРОЦЕДУРА ЗАСТОСУВАННЯ НЕЙРОННИХ МЕРЕЖ ДЛЯ СЕГМЕНТАЦІЇ РАСТРОВИХ ЗОБРАЖЕНЬ

    Get PDF
    Currently, means of semantic segmentation of images, based on the use of neural networks, are increasingly used in computer systems for various purposes. Despite significant successes in this field, one of the most important unsolved problems is the task of determining the type and parameters of convolutional neural networks, which are the basis of the encoder and decoder. As a result of the research, an appropriate procedure was developed that allows the neural network encoder and decoder to be adapted to the following conditions of the segmentation problem: image size, number of color channels, permissible minimum accuracy of segmentation, permissible maximum computational complexity of segmentation, the need to label segments, the need to select several segments, the need to select deformed, displaced and rotated objects, the maximum computational complexity of learning a neural network model is permissible; admissible training period of the neural network model. The implementation of the procedure of applying neural networks for image segmentation consists in the formation of the basic mathematical support, the construction of the main blocks and the general scheme of the procedure. The developed procedure was verified experimentally on examples of semantic segmentation of images containing objects such as a car. The obtained experimental results show that the application of the proposed procedure allows, avoiding complex long-term experiments, to build a neural network model that, with a sufficiently short training period, ensures the achievement of image segmentation accuracy of about 0.8, which corresponds to the best systems of a similar purpose. It is shown that the ways of further research in the direction of improving the methodological support of neural network segmentation of raster images should be correlated with the justified use of modern modules and mechanisms in the encoder and decoder, adapted to the significant conditions of the given task. For example, the use of the ResNet module allows you to increase the depth of the neural network due to the leveling of the gradient drop effect, and the Inception module provides a reduction in the number of weighting factors and the processing of objects of different sizes.В даний час засоби семантичної сегментації зображень, що базуються на використанні нейронних мереж, знаходять все ширше застосування в комп'ютерних системах різного призначення. Незважаючи на значні успіхи в даній галузі, однією з найважливіших невирішених задач є завдання визначення типу та параметрів згорткових нейронних мереж, що лежать в основі кодера та декодера. В результаті проведених досліджень розроблено відповідну процедуру, що дозволяє адаптувати нейромережевий кодер і декодер до таких умов задачі сегментації: розмір зображення, кількість кольорових каналів, допустима мінімальна точність сегментації, допустима максимальна обчислювальна складність сегментації, необхідність маркування сегментів, необхідність виділення кількох сегментів, необхідність виділення деформованих, зміщених та повернутих об'єктів, допустима максимальна обчислювальна складність навчання нейромережевої моделі; допустимий термін навчання нейромережевої моделі. Виконання процедури застосування нейронних мереж для сегментації зображень полягає у формуванні базисного математичного забезпечення, побудові основних блоків та загальної схеми процедури. Розроблена процедура верифікована експериментально на прикладах семантичної сегментації зображень, що містять об'єкти типу автомобіль. Отримані експериментальні результати свідчать, що застосування запропонованої процедури дозволяє уникнувши складних довготривалих експериментів, побудувати нейромережеву модель, яка при достатньо короткому терміні навчання забезпечує досягнення точності сегментації зображень близько 0,8, що відповідає найкращим системам аналогічного призначення. Показано, що шляхи подальших досліджень у напрямку вдосконалення методологічного забезпечення нейромережевої сегментації растрових зображень доцільно співвіднести з обґрунтованим використанням у кодері та декодері сучасних модулів та механізмів, адаптованих до значимих умов поставленої задачі. Наприклад, використання модулю ResNet дозволяє за рахунок нівелювання ефекту падіння градієнта збільшити глибину нейронної мережі, а модуля Inception забезпечує зменшення кількості вагових коефіцієнтів та обробку об'єктів різного розміру

    Modern quantum technologies of information security against cyber‐terrorist attacks

    Get PDF
    In this paper, the systematisation and classification of modern quantum technologies of information security against cyber‐terrorist attack are carried out. The characteristic of the basic directions of quantum cryptography from the viewpoint of the quantum technologies used is given. A qualitative analysis of the advantages and disadvantages of concrete quantum protocols is made. The current status of the problem of practical quantum cryptography use in telecommunication networks is considered. In particular, a short review of existing commercial systems of quantum key distribution is given. Informacijos saugumą užtikrinančios moderniosios kvantinės technologijos, nukreiptos prieš kompiuterinių teroristų atakas Santrauka. Šiame  darbe  susistemintos  ir  suklasifikuotos  informacijos  saugumą  užtikrinančios  moderniosios  kvantinės  technologijos,  skirtos  apsisaugoti  nuo kompiuterių  teroristų  atakų.  Remiantis  kvantinėmis  technologijomis,  aprašyta  pagrindinių  kvantinės  kriptografijos  krypčių  charakteristika.  Pateikti konkrečių  kvantinių  protokolų  kokybinės  analizės  privalumai  ir  trūkumai.  Taip  pat  aptartas  telekomunikaciniuose  tinkluose  naudojamos  dabartinės kvantinės kriptografijos problemos statusas. Pateikta trumpa kvantinių raktų pasiskirstymo dabartinėse komercinėse sistemose apžvalga. Reikšminiai  žodžiai:  informacijos  saugumas,  kvantinės  technologijos,  kvantinių  raktų  pasiskirstymas,  kvantiniu  pagrindu  apsaugotas  tiesioginis ryšys, slaptas kvantų paskirstymas, kvantinio srauto šifras, kvantais užkoduotas skaitmeninis parašas, kvantinė steganografija. First publish online: 09 Jun 201

    КРИТИЧЕСКАЯ ИНФОРМАЦИОННАЯ ИНФРАСТРУКТУРА УКРАИНЫ: ОПРЕДЕЛЕНИЯ, СЕКТОРЫ И ПОСЛЕДСТВИЯ

    No full text
    The article is devoted to the study of Ukraine the critical information infrastructure in order to increase the efficiency of use and protection of state information resources circulating in the information and telecommunication systems of critical infrastructure objects. The analysis of international experience and current domestic regulation of this field have revealed such basic problems as: the lack of basic terminology, the need to create a system for critical infrastructure protection and crisis management, the formation and development of a system of public-private partnership, the absence of sectors and elements in Ukraine critical infrastructure and of criteria attribution of objects to critical infrastructure, the lack of criteria for assessing the negative consequence of cyberattacks on the information telecommunicative system of the object of critical infrastructure, as well as the need for legislative changes. To resolve some of them, the authors introduce new concepts in this article, propose sectors of Ukraine the critical infrastructure with the definition of those relating to critical information infrastructure, unification of the negative consequence of cyberattacks on the information and telecommunication system of the critical infrastructure object in order to further evaluate the damage inflicted on the national security of Ukraine in the event of the leakage of state information resources

    Modern quantum technologies of information security cyber-terrorist attacks

    No full text
    In this paper, the systematisation and classification of modern quantum technologies of information security against cyber-terrorist attack are carried out. The characteristic of the basic directions of quantum cryptography from the viewpoint of the quantum technologies used is given. A qualitative analysis of the advantages and disadvantages of concrete quantum protocols is made. The current status of the problem of practical quantum cryptography use in telecommunication networks is considered. In particular, a short review of existing commercial systems of quantum key distribution is given
    corecore