Theoretical and Applied Cybersecurity: scientific journal, Vol. 6, No. 2
Постійне посилання зібрання
Переглянути
Перегляд Theoretical and Applied Cybersecurity: scientific journal, Vol. 6, No. 2 за Ключові слова "Cybersecurity"
Зараз показуємо 1 - 3 з 3
Результатів на сторінці
Налаштування сортування
Документ Відкритий доступ Comparison analysis between strict ontologies and fuzzy ontologies(Igor Sikorsky Kyiv Polytechnic Institute, 2024) Kozlenko, OlehOntological modeling has been important in the field of cybersecurity, but with the growing use of artificial intelligence in various processes related to cybersecurity, it has become an increasingly relevant area for research every new year. Ontologies can serve as a primary source of knowledge for artificial intelligence models and as a "sequence of actions" in different processes. Typically, strictontologies were used due to their formalized structure, but they did not fully capture processes that involve fuzzy contexts of actions or results. The aim of this article is to present and analyze different ontologies, both strict and fuzzy, that are used or could be used in the field of cybersecurity and related processes, demonstrating their similarities, differences, and areas of application.Документ Відкритий доступ Fuzzy logic in risk assessment of multi-stage cyber attacks on critical infrastructure networks(Igor Sikorsky Kyiv Polytechnic Institute, 2024) Nakonechna, Yuliia; Savchuk, Bohdan; Kovalova, AnnaIn the current environment, critical infrastructure has become the target of increasingly complex multi-stage cyber attacks characterized by sequential phases of infiltration, privilege escalation, and lateral movement within the target network. Traditional risk assessment methods often rely on assumptions of precise data availability and well-defined probabilities, which limit their applicability in real-world scenarios marked by uncertainty and imprecise information. This paper proposes an approach based on the use of fuzzy logic systems to assess the risks of multi-stage cyber attacks against networked critical infrastructure services. The proposed methodology takes into account the ambiguity and fuzziness of input data, expert judgments, and the dynamic progression of attacks. The result is a more flexible and adaptive risk assessment model that supports informed decision-making to enhance cybersecurity, prioritize countermeasures, and optimize the allocation of defensive resources.Документ Відкритий доступ Simulation of UAV networks on the battlefield, taking into account cyber- physical influences that affect availability(Igor Sikorsky Kyiv Polytechnic Institute, 2024) Novikov, Oleksii; Stopochkina, Iryna; Voitsekhovskyi, Andrii; Ilin, Mykola; Ovcharuk, MykolaThe paper considers the types of countering means for unmanned aerial vehicles and the enemy's electronic warfare equipment used during the war in Ukraine. The types of cyber-physical influences that can be used to disrupt the availability of the network of unmanned aerial vehicles are addressed. The problem is also considered from the point of view of cybersecurity, taking into account possible harmful effects on the network of smart devices. Models based on complex networks, cellular automata and Petri nets are proposed, which allow solving the problem of optimizing the location of devices taking into account the set goal and countering cyber-physical attacks on availability and integrity. The proposed models differ from existing ones taking into account the conditions on the battlefield. A computational experiment has been performed that allows us to visualize the disposition of aircraft depending on the surrounding conditions on the battlefield. The results of the work can be used to develop a strategy for implementing operations of various types on the battlefield using UAVs.