Логотип репозиторію
  • English
  • Українська
  • Увійти
    Новий користувач? Зареєструйтесь. Забули пароль?
Логотип репозиторію
  • Фонди та зібрання
  • Пошук за критеріями
  • English
  • Українська
  • Увійти
    Новий користувач? Зареєструйтесь. Забули пароль?
  1. Головна
  2. Переглянути за автором

Перегляд за Автор "Novikov, Oleksii"

Зараз показуємо 1 - 5 з 5
Результатів на сторінці
Налаштування сортування
  • Вантажиться...
    Ескіз
    ДокументВідкритий доступ
    Application of Large Language Models for Assessing Parameters and Possible Scenarios of Cyberattacks on Information and Communication Systems
    (Igor Sikorsky Kyiv Polytechnic Institute, 2024) Lande, Dmitry; Novikov, Oleksii; Alekseichuk, Lesia
    This paper explores the use of large language models (LLMs) to evaluate parameters and identify potential hostile penetration scenarios in corporate networks, considering logical and probabilistic relationships between network nodes. The developed methodology is based on analyzing the network structure, which includes components such as the Firewall, Mail Server, Web Server, administrator and client workstations, application server, and database server. The probabilities of transitions between these nodes during adversarial attacks are determined using a swarm of virtual experts and two sets of prompts aimed at different LLMs. Among the results obtained through the swarm approach are average transition probabilities, which enable modeling the most likely attack paths from both external and internal network origins. Based on logical-probabilistic analysis, penetration scenarios are ranked according to probabilities, execution time, and resource minimization required by attackers. The proposed methodology facilitates rapid response to threats and ensures an adequate level of cybersecurity by focusing on the most probable and dangerous attack scenarios.
  • Вантажиться...
    Ескіз
    ДокументВідкритий доступ
    Cyber Security Logical and Probabilistic Model of a Critical Infrastructure Facility in the Electric Energy Industry
    (Igor Sikorsky Kyiv Polytechnic Institute, 2023) Alekseichuk, Lesia; Novikov, Oleksii; Rodionov, Andrii; Yakobchuk, Dmytro
    In the work, a cyber security logical and probabilistic model of a critical infrastructure facility in the energy sector was developed and investigated. The cyber security logical and probabilistic model describes the development of adverse events that arise in the Industrial Control System of the electrical network from the realization of possible threats from cyberspace, such as attacks on the protection system through the corporate network, connection through a modem and wireless connection. The resulting model is based on sequentially developed structural, logical and probabilistic models. The field of use of the developed model is automation systems for designing information protection systems or designing trajectories of attacks on these systems. The model was also applied to study the sensitivity of the probability of the development of adverse events to variations in the probability of realization of possible threats to the system.
  • Вантажиться...
    Ескіз
    ДокументВідкритий доступ
    Reference functions of cyber incidents displaying in the media space
    (Igor Sikorsky Kyiv Polytechnic Institute, 2021) Lande, Dmytro; Novikov, Oleksii; Stopochkina, Iryna
    The principles of cyber attacks detection that based on media content are described. Proposed methods are suitable for description of the general trends in the dynamics of information flows concerning cyber incidents. A generalized diagram of cyber attacks stages displaying in the media space is proposed. On the basis of the diagram the basic wavelet functions are selected, which can be considered as a reference for detecting cyber incidents. The proposed wavelets are low-order derivatives of Gaussian function (Wave, «Mexican Hat» and Morlaix wavelets). Retrospective analysis of already implemented information operations is a reliable way to verify them. The problem of forecasting is partly solved by probabilistic estimates in accordance with the type of reference functions.
  • Вантажиться...
    Ескіз
    ДокументВідкритий доступ
    Simulation of UAV networks on the battlefield, taking into account cyber- physical influences that affect availability
    (Igor Sikorsky Kyiv Polytechnic Institute, 2024) Novikov, Oleksii; Stopochkina, Iryna; Voitsekhovskyi, Andrii; Ilin, Mykola; Ovcharuk, Mykola
    The paper considers the types of countering means for unmanned aerial vehicles and the enemy's electronic warfare equipment used during the war in Ukraine. The types of cyber-physical influences that can be used to disrupt the availability of the network of unmanned aerial vehicles are addressed. The problem is also considered from the point of view of cybersecurity, taking into account possible harmful effects on the network of smart devices. Models based on complex networks, cellular automata and Petri nets are proposed, which allow solving the problem of optimizing the location of devices taking into account the set goal and countering cyber-physical attacks on availability and integrity. The proposed models differ from existing ones taking into account the conditions on the battlefield. A computational experiment has been performed that allows us to visualize the disposition of aircraft depending on the surrounding conditions on the battlefield. The results of the work can be used to develop a strategy for implementing operations of various types on the battlefield using UAVs.
  • Вантажиться...
    Ескіз
    ДокументВідкритий доступ
    The Best Scenario of Cyber Attack Selecting on the Information and Communication System Based on the Logical and Probabilistic Method
    (Igor Sikorsky Kyiv Polytechnic Institute, 2023) Alekseichuk, Lesia; Novikov, Oleksii; Rodionov, Andrii; Yakobchuk, Dmytro
    The task of analyzing and selecting the best scenario of a cyberattack on information and communication system is considered as a component of the task of analyzing systems security. A method and corresponding algorithm for finding the best scenario of an attack on information and communication system using a logical and probabilistic model is proposed. The model describes the development of adverse events that arise in the information and communication system from the implementation of possible attacks on the security system from cyberspace. Analysis of cyber attack scenarios allows predicting the development of possible adverse cyber security events from the implementation of multiple threats to the system. The developed method and corresponding algorithm for analyzing attack scenarios can be used to analyze the security of information and communication systems, as well as in automation systems for designing information security systems or designing attacks on such systems.

DSpace software copyright © 2002-2025 LYRASIS

  • Налаштування куків
  • Зворотній зв'язок