Логотип репозиторію
  • English
  • Українська
  • Увійти
    Новий користувач? Зареєструйтесь. Забули пароль?
Логотип репозиторію
  • Фонди та зібрання
  • Пошук за критеріями
  • English
  • Українська
  • Увійти
    Новий користувач? Зареєструйтесь. Забули пароль?
  1. Головна
  2. Переглянути за автором

Перегляд за Автор "Stopochkina, Iryna"

Зараз показуємо 1 - 6 з 6
Результатів на сторінці
Налаштування сортування
  • Вантажиться...
    Ескіз
    ДокументВідкритий доступ
    Machine Learning Models Stacking in the Malicious Links Detecting
    (Igor Sikorsky Kyiv Polytechnic Institute, 2023) Khukalenko, Yevhenii; Stopochkina, Iryna; Ilin, Mykola
    An analysis of the performance of various classifiers on address and network groups of features was performed. A new classification model is proposed, which is a stacking of 3 models: kNN, XGBoost and Transformer. The best model for stacking was experimentally determined: Logistic Regression, which made it possible to improve the result of the best available model by 3%. The hypothesis that stacking a larger number of worse models has an advantage over stacking a smaller number of more productive models on the used data set was confirmed: regardless of the choice of stacking metaalgorithm, stacking of three models showed better results than stacking two.
  • Вантажиться...
    Ескіз
    ДокументВідкритий доступ
    Methods of counteraction of bypassing two-factor authentication using reverse proxy
    (Igor Sikorsky Kyiv Polytechnic Institute, 2021) Vlasenko, Andrii; Stopochkina, Iryna; Ilin, Mykola
    The existing solutions for counteracting and preventing the interception of data and tokens of two-factor authentication are considered. Features that may indicate the presence of a silent reverse proxy server are chosen. It is proposed to analyze the information about additional time anomalies, which are usually created by the proxy server. The advantage of this approach is that the time characteristics information is generated on the client-side, and the malicious proxy server cannot modify it. Machine learning methods were used to detect implicit signs of the presence of a proxy server. A new method of detecting a silent reverse proxy server that satisfies the following conditions is proposed: 1) the human factor is minimized, 2) use by an individual user is possible, 3) the method has an acceptable impact on performance and can be used in real-time.
  • Вантажиться...
    Ескіз
    ДокументВідкритий доступ
    Peculiarities of phishing threats and preventive measures in the conditions of war in Ukraine
    (Igor Sikorsky Kyiv Polytechnic Institute, 2022) Shevchenko, Hryhorii; Stopochkina, Iryna; Babenko, Ivan
    The paper is devoted to the study of the peculiarities of phishing attacks on the personnel of enterprises and institutions of Ukraine during the war period (from February 2022- till now). The life cycle of the most popular attacks is analyzed. The focus is made on email phishing, which is the most popular for attacks on enterprises. A list of typical topics of phishing emails, psychological vectors of phishing influence, typical for attacks on Ukrainian users, additional factors that contribute to the success of attacks have been revealed. A countermeasures for phishing attacks prevention have been recommended. A list of phishing keywords was collected and templates were developed, a software solution based on artificial intelligence approaches was proposed to automate the generation of phishing letters in Ukrainian that can be used during "false alarms" and staff training in large enterprises.
  • Вантажиться...
    Ескіз
    ДокументВідкритий доступ
    Reference functions of cyber incidents displaying in the media space
    (Igor Sikorsky Kyiv Polytechnic Institute, 2021) Lande, Dmytro; Novikov, Oleksii; Stopochkina, Iryna
    The principles of cyber attacks detection that based on media content are described. Proposed methods are suitable for description of the general trends in the dynamics of information flows concerning cyber incidents. A generalized diagram of cyber attacks stages displaying in the media space is proposed. On the basis of the diagram the basic wavelet functions are selected, which can be considered as a reference for detecting cyber incidents. The proposed wavelets are low-order derivatives of Gaussian function (Wave, «Mexican Hat» and Morlaix wavelets). Retrospective analysis of already implemented information operations is a reliable way to verify them. The problem of forecasting is partly solved by probabilistic estimates in accordance with the type of reference functions.
  • Вантажиться...
    Ескіз
    ДокументВідкритий доступ
    Simulation of UAV networks on the battlefield, taking into account cyber- physical influences that affect availability
    (Igor Sikorsky Kyiv Polytechnic Institute, 2024) Novikov, Oleksii; Stopochkina, Iryna; Voitsekhovskyi, Andrii; Ilin, Mykola; Ovcharuk, Mykola
    The paper considers the types of countering means for unmanned aerial vehicles and the enemy's electronic warfare equipment used during the war in Ukraine. The types of cyber-physical influences that can be used to disrupt the availability of the network of unmanned aerial vehicles are addressed. The problem is also considered from the point of view of cybersecurity, taking into account possible harmful effects on the network of smart devices. Models based on complex networks, cellular automata and Petri nets are proposed, which allow solving the problem of optimizing the location of devices taking into account the set goal and countering cyber-physical attacks on availability and integrity. The proposed models differ from existing ones taking into account the conditions on the battlefield. A computational experiment has been performed that allows us to visualize the disposition of aircraft depending on the surrounding conditions on the battlefield. The results of the work can be used to develop a strategy for implementing operations of various types on the battlefield using UAVs.
  • Вантажиться...
    Ескіз
    ДокументВідкритий доступ
    Перспективи використання нечіткого хешування в антивірусному захисті
    (НТУУ «КПІ», 2016) Єремізін, Олександр; Стьопочкіна, Ірина; Yeremizin, Oleksandr; Stopochkina, Iryna

DSpace software copyright © 2002-2025 LYRASIS

  • Налаштування куків
  • Зворотній зв'язок