Перегляд за Автор "Ilin, Mykola"
Зараз показуємо 1 - 5 з 5
Результатів на сторінці
Налаштування сортування
Документ Відкритий доступ Machine Learning Models Stacking in the Malicious Links Detecting(Igor Sikorsky Kyiv Polytechnic Institute, 2023) Khukalenko, Yevhenii; Stopochkina, Iryna; Ilin, MykolaAn analysis of the performance of various classifiers on address and network groups of features was performed. A new classification model is proposed, which is a stacking of 3 models: kNN, XGBoost and Transformer. The best model for stacking was experimentally determined: Logistic Regression, which made it possible to improve the result of the best available model by 3%. The hypothesis that stacking a larger number of worse models has an advantage over stacking a smaller number of more productive models on the used data set was confirmed: regardless of the choice of stacking metaalgorithm, stacking of three models showed better results than stacking two.Документ Відкритий доступ Methods of counteraction of bypassing two-factor authentication using reverse proxy(Igor Sikorsky Kyiv Polytechnic Institute, 2021) Vlasenko, Andrii; Stopochkina, Iryna; Ilin, MykolaThe existing solutions for counteracting and preventing the interception of data and tokens of two-factor authentication are considered. Features that may indicate the presence of a silent reverse proxy server are chosen. It is proposed to analyze the information about additional time anomalies, which are usually created by the proxy server. The advantage of this approach is that the time characteristics information is generated on the client-side, and the malicious proxy server cannot modify it. Machine learning methods were used to detect implicit signs of the presence of a proxy server. A new method of detecting a silent reverse proxy server that satisfies the following conditions is proposed: 1) the human factor is minimized, 2) use by an individual user is possible, 3) the method has an acceptable impact on performance and can be used in real-time.Документ Відкритий доступ Models of Denial of Service Attacks on Cyber-Physical Systems(Igor Sikorsky Kyiv Polytechnic Institute, 2023) Ovcharuk, Mykola; Ilin, MykolaMathematical models of denial-of-service attacks are investigated in the paper. Threats of kinetic impact on systems in cyberspace are considered. Targeted computer systems and systems with low and high-security levels were studied. The simulation results demonstrate a successful resolution of the task.Документ Відкритий доступ Probabilities estimating for attacks on supply chain for critical infrastructure facilities(Igor Sikorsky Kyiv Polytechnic Institute, 2024) Ilin, Mykola; Rybak, Oleksandr; Stopochkina, IrynaThe different types of supply chain for critical infrastructure facilities of industrial sector were analyzed. Also, the main types of attacks in supply chain were considered. The character of resource dependencies was analysed and representation of supply chain in form of hierarchical oriented graph, with division into levels, was considered. The algorithm of taking into account of attack probabilities for objects, which giveresources for functioning of some endpoint object of supply chain was developed basing on dynamic programming principles. Calculation complexity of proposed algorithm was estimated, and it confirmed its effectiveness for practical situations. For thetarget area of use the proposed approach gives better calculation complexity in compare existing solutions.Документ Відкритий доступ Simulation of UAV networks on the battlefield, taking into account cyber- physical influences that affect availability(Igor Sikorsky Kyiv Polytechnic Institute, 2024) Novikov, Oleksii; Stopochkina, Iryna; Voitsekhovskyi, Andrii; Ilin, Mykola; Ovcharuk, MykolaThe paper considers the types of countering means for unmanned aerial vehicles and the enemy's electronic warfare equipment used during the war in Ukraine. The types of cyber-physical influences that can be used to disrupt the availability of the network of unmanned aerial vehicles are addressed. The problem is also considered from the point of view of cybersecurity, taking into account possible harmful effects on the network of smart devices. Models based on complex networks, cellular automata and Petri nets are proposed, which allow solving the problem of optimizing the location of devices taking into account the set goal and countering cyber-physical attacks on availability and integrity. The proposed models differ from existing ones taking into account the conditions on the battlefield. A computational experiment has been performed that allows us to visualize the disposition of aircraft depending on the surrounding conditions on the battlefield. The results of the work can be used to develop a strategy for implementing operations of various types on the battlefield using UAVs.