Перегляд за Автор "Voitsekhovskyi, Andrii"
Зараз показуємо 1 - 3 з 3
Результатів на сторінці
Налаштування сортування
Документ Відкритий доступ Determination of Cyberattack Parameters on the Measurements System of Critical Infrastructure Facility(Igor Sikorsky Kyiv Polytechnic Institute, 2025) Novikov, Oleksii; Ilin, Mykola; Ovcharuk, Mykola; Stopochkina, Iryna; Voitsekhovskyi, AndriiThe paper solves the problem of determination and researching the parameters of stealth attacks on the linear Kalman filter data measurement system that bypasses the standard fault diagnosis detector. The relevance of the research is determined not only by the importance of solving cyber security problems, but also by the active use of the Kalman filter in large industrial power supply networks to evaluate the indicators of system nodes, in industrial automation systems, and others. A cyber attack on the measuring system of the Kalman filter is under consideration, the purpose of which is to disrupt the normal functioning of the filter by distorting the measurement signal, which is a mandatory component of the filter. The filtering system is equipped with a fault detector, which detects the presence of an attack on the measurement signals. The condition of the attack is invisibility for the fault detector, that is, the attacker implements a class of stealth attacks on the integrity of the information that circulates and is processed in the system. The task of finding a distorted measurement signal was solved using the variational optimization method and the gradient method of the fastest descent. A computational experiment was conducted, the quantitative characteristics of the algorithm were obtained and analyzed. The proposed method and the corresponding algorithm for determining the parameters of stealth attacks on the measurement system of critical infrastructure objects can be used to solve the problems of testing cyber defense systemsДокумент Відкритий доступ Petri Net–Based Analysis of UAV Networks Availability Issues in Conditions of Adversary Counteraction(Igor Sikorsky Kyiv Polytechnic Institute, 2025) Novikov, Oleksii; Voitsekhovskyi, Andrii; Stopochkina, Iryna; Ilin, Mykola; Ovcharuk, MykolaThe article proposes Petri net-based models that make it possible to simulate scenarios that reflect the real operating conditions of unmanned aerial vehicles (UAVs) in the presence of hostile factors. The modeling takes into account cyber-physical aspects of UAV availability and attacks aimed at disrupting this availability, including by means of enemy electronic warfare (EW) systems. The factor of natural obstacles is also considered, in particular terrain-induced obstacles that interfere with communication between operational UAVs and the relay node.A set of basic places and transitions is proposed and implemented as a software model. The study uses both ordinary and colored Petri nets. In the ordinary Petri net, the state corresponds to the signal level of the device, and the simulation is carried out to track precisely this characteristic for each UAV in the network. Interference leads to degradation of the state, which can be improved by introducing additional relay devices into the line of sight of the current UAV, reducing the distance between the current UAV and the relay, or deliberately searching for an exit from the EW coverage area.The colored Petri net is intended for more general tasks, which include counting the active devices in the network, assessing the impact of interference on changes in the network structure, and evaluating mission success. Simulation based on this model was implemented in a Python software application, with visualization performed using the graph-oriented library Graphviz. To account for specific conditions such as terrain and changes in device parameters, an additional module was developed that extracts data from open terrain map datasetsДокумент Відкритий доступ Simulation of UAV networks on the battlefield, taking into account cyber- physical influences that affect availability(Igor Sikorsky Kyiv Polytechnic Institute, 2024) Novikov, Oleksii; Stopochkina, Iryna; Voitsekhovskyi, Andrii; Ilin, Mykola; Ovcharuk, MykolaThe paper considers the types of countering means for unmanned aerial vehicles and the enemy's electronic warfare equipment used during the war in Ukraine. The types of cyber-physical influences that can be used to disrupt the availability of the network of unmanned aerial vehicles are addressed. The problem is also considered from the point of view of cybersecurity, taking into account possible harmful effects on the network of smart devices. Models based on complex networks, cellular automata and Petri nets are proposed, which allow solving the problem of optimizing the location of devices taking into account the set goal and countering cyber-physical attacks on availability and integrity. The proposed models differ from existing ones taking into account the conditions on the battlefield. A computational experiment has been performed that allows us to visualize the disposition of aircraft depending on the surrounding conditions on the battlefield. The results of the work can be used to develop a strategy for implementing operations of various types on the battlefield using UAVs.