Information Technology and Security: Ukrainian research papers collection
Постійне посилання на фонд
ISSN 2518-1033 (Online), ISSN 2411-1031 (Print)
Періодичність: 2 рази на рік
Рік заснування: 2012
Тематика: публікація оригінальних і оглядових робіт з основних проблем сучасних інформаційних технологій, інформаційної безпеки, інформаційного протиборства, протидії використанню соціальної інженерії, кібербезпеки та захисту критичних інфраструктур, математичного та комп'ютерного моделювання, захисту інформації в інформаційно-телекомунікаційних системах та мережах (в тому числі з питань захисту персональних даних), менеджменту інформаційної безпеки і ризиків безпеки інформації тощо
Офіційний сайт: http://its.iszzi.kpi.ua/
Рік заснування: 2012
Тематика: публікація оригінальних і оглядових робіт з основних проблем сучасних інформаційних технологій, інформаційної безпеки, інформаційного протиборства, протидії використанню соціальної інженерії, кібербезпеки та захисту критичних інфраструктур, математичного та комп'ютерного моделювання, захисту інформації в інформаційно-телекомунікаційних системах та мережах (в тому числі з питань захисту персональних даних), менеджменту інформаційної безпеки і ризиків безпеки інформації тощо
Офіційний сайт: http://its.iszzi.kpi.ua/
Переглянути
Перегляд Information Technology and Security: Ukrainian research papers collection за Назва
Зараз показуємо 1 - 20 з 216
Результатів на сторінці
Налаштування сортування
Документ Відкритий доступ A comparison enterprise architecture frameworks for critical it infrastructure design(Institute of Special Communication and Information Protection of National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, 2017) Dorohyi, Yaroslav; Tsurkan, Vasyl; Telenyk, Serhii; Doroha-Ivaniuk, Olena; Дорогий, Ярослав Юрійович; Цуркан, Василь Васильович; Теленик, Сергій Федорович; Дорога-Іванюк, Олена ОлександрівнаДокумент Відкритий доступ Aggregation of information from diverse networks as the basis for training cyber security specialists on processing ultra large data sets(Institute of Special Communication and Information Protection of National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, 2021) Lande, Dmytro; Puchkov, Oleksandr; Subach, IhorThe basic principles of training cybersecurity specialists on processing large data sets to solve complex unstructured tasks in the course of their functional responsibilities based on the achievements of Data Science in the field of cybersecurity, by acquiring the necessary competencies and practical application of the latest information technologies based on methods of aggregation of large amounts of data are substantiatedand presented. The most common latest technologiesand tools in the field of cybersecurity, the list of which allows getting a fairly holistic view of what is used today by specialists in the field of Data Science, are considered. The tools you need to have to solve complex problems using big data are analyzed.The subject of the study is the fundamental provisions of the concept of “big data”; appropriate data models; architectural concepts of creating information systems for “big data”; big data analytics, as well as the practical application of big dataprocessing results. The theoretical basis of the training, which includes two sections: “Big Data: theoretical principles”, and “Technological applications for big data”, which, in turn, are logically divided into ten, is considered. As a material and technical basis for the acquisition of practical skills by students, a model based on the system “CyberAggregator” was created and described, which operates and is constantly improved in accordance with the expansion of the list of tasks assigned to it. The CyberAggregator system consists of three main parts: a server for collecting and primary processing of information; an information retrieval server (search engine); an interface server from which the service is provided to users and other systems via the API. The system is based on technological components such as the Elasticsearch information retrieval system, the Kibana utility, the Neo4j database graph management system, JavaScript-based results visualization tools (D3.js) and network information scanningmodules. The system provides the implementation of such functions as the formation of databases from certain information resources; maintaining full-text databases of information; detection of duplicates similar in content to information messages; full-text search; analysis of text messages, determination of tonality, formation of analytical reports; integration with the geographic information system; data analysis and visualization; research of thematic information flows dynamics; forecasting events basedon the analysis of the publications dynamics, etc. The suggested approach allows students to acquire the necessary competencies needed to process effectively large amounts of data from social networks, create systems for monitoring network information on cybersecurity, selection of relevant information from social networks, search engine implementation, analytical research, forecasting.Документ Відкритий доступ An exploration of public key infrastructure applications across diverse domains: a comparative analysis(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2023) Dulia, Oleksandr; Minochkin, DmytroThis article delves into the vital role of Public Key Infrastructure (PKI) in securing and authenticating communications across a multitude of fields. PKI has evolved from a mere technical concept into a cornerstone of secure digital communications, playing a central role in various domains such as web security, healthcare, finance, the Internet of Things (IoT), and government services. PKI employs cryptographic techniques and digital certificates to establish trust, ensure data integrity, and enable secure communications, thus acting as the backbone of digital security. In the wake of the digital revolution, the demand for reliable and robust security solutions has skyrocketed. The diversity and scale of modern digital platforms necessitate adaptable security solutions, a challengewhich PKI tackles through its flexible implementation. Despite sharing core principles, the implementation of PKI demonstrates divergences influenced by factors such as scale, complexity, resource constraints, regulatory environments, and trust models. This article offers an extensive comparison of PKI's utilization across various domains, highlighting the commonalities and divergences. It explores how PKI is tailored to meet the unique requirements and challenges of each sector and discusses the certificate lifecycle management in varying contexts. Moreover, it provides an analysis of the current state of PKI applications and challenges, offering insights into the evolving landscape of threats and technologies. Not only does the article address the currentstate of PKI, but it also presents a forward-looking perspective on its potential future developments. As the digital landscape continues to evolve and expand, it is crucial to anticipate the emerging challenges and devise strategies for proactive adaptation. This article thus serves as a comprehensive resource for understanding the role and impact of PKI in the contemporary digital infrastructure.Ultimately, the article seeks to underline the importance of PKI and highlight the need for continued research and development in this area. As our reliance on digital communications and transactions continues to grow, the role of PKI in safeguarding these interactions becomes increasingly significant. This comprehensive review serves as a valuable resource for researchers, practitioners, and policymakers in understanding the diverse applications of PKI and its critical role in securing the digital world.Документ Відкритий доступ Analysis of methods of classification of electronic messages based on neural network models(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2023) Onishchenko, Volodymyr; Minochkin, AnatoliiIn the article, the creation of a mechanism for detecting and classifying messages is considered, with an assessment of how effectively different neural networks work and can recognize and classify different types of electronic messages, including phishing attacks, spam, and legitimate messages. A preliminary analysis of incoming messages has been performed, encompassing their headers, text, and other relevant attributes. For instance, in the case of emails, these attributes could be the 'subject' and 'sender' of the message. Methods for data preparation and processing have been reviewed, including text vectorization, noise removal, and normalization, to be utilized in training neural networks. Message tokenization has been performed by transforming them into a numerical format while considering the selection of features. For text messages, it is crucial to execute both tokenization and text vectorization. The model training was performed on the test data with prior splitting into two parts: 80% for training and 20% for testing. The training set is utilized for training the model, while the test set is used to evaluate its effectiveness. The peculiarity of the class structure of the data, namely the uniformity of the distribution of classes, is considered. In this case, spam occurs less frequently than legitimate messages, so class balancing techniques such as random deletion of redundant examples, upsampling, and subsampling were applied to ensure adequate model training. Optimization of network parameters was performed, by researching the optimal parameters of neural networks, such as the number and size of layers, activation functions, and optimization of hyperparameters to achieve the best performance. Hyperparameter optimization includes determining optimal settings for neural networks, such as layer size, activation functions, learning rate, and other parameters. The effectiveness was assessed by comparing the results and performance of various classification methods based on neural networks using metrics such as precision and F1-score. It was determined how well the methods can avoid misclassifications where legitimate messages are mistakenly identified as spam, and vice versa. A comparison of the methods' effectiveness in processing a large volume of messages in real time was conducted. An analysis of different architectures of neural network models was performed. Based on the analysis, it was revealed how effectively different neural network models can recognize and classify messages as spam.Документ Відкритий доступ Analysis of stability of the user's keyboard handwriting characteristics in the biometric authentication systems(Institute of Special Communication and Information Protection of National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, 2018) Yevetskyi, Viktor; Horniichuk, IvanConsideration is given to the use of biometric characteristics in order to increase the efficiency of user authentication. An identifier that uses biometric characteristics is inextricably linked to the user, and it is virtually impossible to use it unauthorized. As a biometric characteristic it is expedient to use a keyboard handwriting. Keyboard handwriting, or rhythm of typing, displays a way of typing on a keyboard that is specific to a particular user. In addition, it is quite simple to implement and does not require additional hardware costs. Moreover, the use of keyboard writing when entering a password eliminates the main disadvantages of classical password systems and systems based on access cards. The focus of the research was on the sustainability of the time characteristics of the keyboard handwriting of a particular user over a long period of time. To implement the admission of the user to the computer system, an algorithm based on the Heming distance is selected. According to the chosen algorithm an algorithm for forming a vector of biometric characteristics of the user is developed, which includes the duration of holding a specific key and the time between pressing the neighboring keys. An algorithm for forming a user's biometric standard is developed. To analyze the use of keyboard handwriting, software applications that implement the user's access based on keyboard handwriting were developed, as well as a program for collecting time characteristics. Both applications use the developed algorithms. To study the constancy of handwriting time characteristics, an empirical study was conducted. For this purpose, a group of individuals is selected, each of which has a computer input at an adequate level. They all entered the proposed phrase within a year. The obtained statistical data, on the basis of which, the average values and values of the average square deviation of the time characteristics of keyboard handwriting at the various time intervals are calculated. Estimated probability of correct user recognition by its frequency in n independent experiments. As a result of the study, the persistence of user keyboard handwriting as a biometric characteristic for use in computer data protection systems, in particular, authentication systems, was analyzed.Документ Відкритий доступ Analytical geometry approach for information security risks analyses(Institute of special communication and information security of National technical university of Ukraine «Kyiv polytechnic institute», 2015) Mokhor, Volodymyr; Bezshtanko, Vitalii; Honchar, Serhii; Kravtsov, Hryhorii; Kotsiuba, Ihor; Kruk, Olha; Makarevych, Oleksander; Maksymenko, Yevhen; Tsurkan, Vasyl; Мохор, Володимир Володимирович; Безштанько, Віталій Михайлович; Гончар, Сергій Феодосійович; Кравцов, Григорій Олексійович; Коцюба, Ігор Васильович; Крук, Ольга Миколаївна; Макаревич, Олександр Євгенович; Максименко, Євген Васильович; Цуркан, Василь ВасильовичДокумент Відкритий доступ Applications containers security model(Institute of Special Communication and Information Protection of National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, 2020) Misnik, OleksiiIt has been established the purpose of container environments for the development, delivery and operation of various types of the software applications. The web and mobile applications have the most widespread use. This is due to the container media’s emphasis on quick loading and installation. Using this method, you can think of the infrastructure as a code and get the benefits associated with it. First of foremost, accelerate the development of software applications, particularly reducing the time between their conception and launch. This is facilitated by the use of download utilities, the deployment of container environments on container virtualization platforms, and the management of software applications. Despite this, the necessity to secure the security of software programs limits the adoption of container systems in practice. This is primarily due to the use of standard approaches based on intrusion detection systems. Features of container environments in relation to real settings were overlooked when they were first introduced. Taking into account the vulnerabilities and dangers of container virtualization platforms, as well as monitoring the processes of container environments given the unique architecture and input load flow, it is important to keep in mind that there are only a few of them. A model for assuring the security of container environments of software programs is proposed to overcome the difficulties of employing intrusion detection systems. It isbased on the idea of using system calls of the host system on the example of the Linux operating system. This is because they allow the software applications to interact with the kernel. As a result, users have been identified as the sources of probable intrusions into container environments. Additionally, there are examples of atypical commands for analysis during the execution of system calls. Based on the obtained results, it has been distinguished the stages of intrusion detection and transitions between them. As a result, the Petri net is used to formalize this process. During the intrusion detection, it has been defined by the numerous sets of stages, transitions between stages, relations between stages, and transitions.As a result of the suggested approach, the security aspects of container environments for software applications are possible to be established.Документ Відкритий доступ Applying mobile devices in biometric user authentication systems(Institute of Special Communication and Information Protection of National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, 2019) Horniichuk, Ivan; Yevetskyi, Viktor; Kubrak, VolodymyrThe use of biometric characteristics to improve the efficiency of user authentication is considered. An identifier that uses biometric characteristics is inextricably linked to the user and is virtually impossible to use it unauthorized. According to this, it is proposed to use the dynamic biometric characteristics of users. Their advantage is that due to the dynamic component, the likelihood of their being forged by an attacker is very low. As a part of multifactor authentication system, biometrics can significantly reduce the chances of hacking user accounts by eliminating the disadvantages of classic password systems and card-based systems. The handwritten signature is used as the biometric characteristic of the user. The handwritten signature is a publicly and legally recognized biometric characteristic used for human authentication. It has a rather complex structure and high detail, all of which makes the solution of this problem mathematical methods rather complicated and requires a large computational cost. A major drawback is that handwritten signature authentication systems require the installation of additional specialized hardware. Therefore, using such systems as an ordinary authentication tool is very expensive. Nowadays the presence of mobile devices in almost all users has made it possible to form the idea of using them in authentication systems. Thanks to that a scheme for implementing a computer security system against unauthorized access based on handwritten signatures using Android-based mobile devices as signature input devices were proposed. In addition, a connection scheme between a computer and a mobile device was proposed. Its feature is that the connection between the mobile device and the computer is established by scanning the QR code displayed on the computer monitor by mobile device module. The practical value of the results obtained is confirmed by the copyright registration certificate of the software developed during the workДокумент Відкритий доступ Assessing the efficiency of information protection systems in the computer systems and networks(Institute of Special Communication and Information Protection of National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, 2013) Nachev, A.; Zhelezov, St.The specific features of the information protection systems in the computer systems and networks require the development of non-trivial methods for their analysis and assessment. Attempts for solutions in this area are given in this paper.Документ Відкритий доступ Assessment of insider attack with learning statistics methods(Institute of special communication and information security of National technical university of Ukraine «Kyiv polytechnic institute», 2015) Mokhor, Volodymyr; Kravtsov, Hryhorii; Kotsiuba, Ihor; Мохор, Володимир Володимирович; Кравцов, Григорій Олексійович; Коцюба, Ігор ВасильовичДокумент Відкритий доступ BKW-атака на шифросистеми NTRUCIPHER та NTRUCIPHER+(Institute of Special Communication and Information Protection of National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, 2020) Матійко, Александра АндріївнаУ зв’язку з появою квантових комп’ютерів, що суттєво зменшить час вирішення певних задач, безпека багатьох стандартизованих криптосистем знаходиться під загрозою. Це стимулювало NISTу 2016 році запустити відкритий конкурс на створення нових постквантових стандартів. Улітку 2020 року алгоритм NTRU–один із найшвидших постквантових алгоритмів, побудований на основі решіток в евклідовому просторі (1996 р.) –увійшов у сімку фіналістів цього конкурсу. Проте лише в 2017 році запропоновано аналог цієї шифросистеми –симетрична шифросистема NTRUCipher. Проведені попередні дослідження цієї шифросистеми, проте не проаналізовано її стійкість відносно природної атаки з підібраним відкритим текстом, яка полягає у складанні системи лінійних рівнянь зі спотвореними правими частинами (над певним скінченним полем простого порядку) та її розв’язанні за допомогою узагальненого алгоритму BKW. В даній статті вперше запропонована шифросистема NTRUCipher+. Її головною відмінністю є використання додаткового випадкового полінома при зашифруванні. Досліджено стійкість шифросистем NTRUCipherта її модифікації NTRUCipher+ відносно BKW-атаки. Подібна атака є можливою саме для симетричних NTRU-подібних шифросистем, проте вона не була розглянута раніше. Отримано аналітичні (верхні та нижні) оцінкискладності BKW-атаки на NTRUCipherі NTRUCipher+. Проведено порівняння цих шифросистем за довжиною шифрованих повідомлень відносно BKW-атаки при певних однакових фіксованих параметрах. Показано, що підвищення стійкості шифросистеми NTRUCipherвідносно BKW-атаки завдяки використанню додаткового доданку при зашифруванні, майже повністю нівелюється збільшенням верхньої межі ймовірності помилки розшифрування. Проведені дослідження дозволили порівняти ці шифросистеми за стійкістю та практичністю, а такожзробити висновок про недоцільність використовувати NTRUCipher+ для підвищення стійкості шифросистеми NTRUCipherвідносно BKW-атаки. Надаліпланується розробити методи побудови симетричних аналогів криптосистеми NTRUна основі інших загальних конструкцій, що базуються на решітках.Документ Відкритий доступ Computer assisted language learning(Institute of Special Communication and Information Protection of National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, 2012) Zhytska, S. A.The article considers the main advantages and disadvantages of computer-assisted language learning, exercises to develop students’ communicative competence are suggested. Also the possibilities of the Internet to develop foreign language skills are determined and the necessity to apply modern methods and technologies in the foreign language teaching is highlighted.Документ Відкритий доступ Detection of vulnerabilities of the computer systems and networks using social engineering techniques(Institute of Special Communication and Information Protection of National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, 2018) Tsurkan, Oksana; Herasymov, RostyslavInformation protection in computer systems and networks is focused on preserving its confidentiality properties of, integrity and availability from various inherently adverse impacts. Potentially possible adverse effects are interpreted as a threat. To prevent or complicate the possibility of realizing threats and reducing potential losses, a system of information protection measures is created and maintained in a healthy state. Such a system includes a computing system, physical environment, staff, and information. One of the most vulnerable elements of such system is staff. Within the framework of the socio-engineering approach, staff vulnerability is interpreted as its weaknesses, needs, mania (passions), hobbies. Manipulating them allows one to gain unauthorized access to information without destroying and distorting its main system-forming qualities. This is reflected in such forms as fraud, deception, scam, intrigue, hoax, provocation. The use of each of these manipulation forms is preceded by the determination of its content by careful planning, organization, and control. These actions are the basis of social engineering methods. Their use is aimed at imitating the actions of the information security violator, which are aimed at staff. This allows to assess the level of staff skills in the information security field and, as a result, to identify information vulnerabilities in computer systems and networks. The methods of social engineering used for this are divided into two groups, in particular, remote social engineering and personal contact. Methods of remote social engineering are implemented by means of modern telecommunications. In addition, the second group of methods involves the establishment of personal contact with the object of influence. In the end, it becomes possible not only to identify, neutralize, but also to prevent information vulnerabilities in computer systems and networks with the introduction of social engineering methods. Therefore, firstly, its protection is ensured taking into account the requirements of the information security policy; secondly, the rules of conduct of the staff are established, regulated by the job descriptions; thirdly, training is held to increase the persistence of employees stereotypes of the organization.Документ Відкритий доступ Determination of components of route hijack risk by internet connectionstopology analysis(Institute of Special Communication and Information Protection of National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, 2020) Zubok, VitaliiThe possibility of dynamic routes change between nodes that are not physically connected is a key feature of the Internet routing. The exterior gateway protocol BGP-4 has been developed to deliver this feature, along with policies and procedures of inter-domain routing. Developed for the network of hundreds nodes that rely on information from each other, after decades BGP-4 is still the same with tens thousands nodes and its crucial lack of routing data integrity. One of the most significant problems deriving from its weaknesses is route leaks and route hijacks. None of the proposed and partially implemented upgrades and add-ons like MANRS and RPKI can not deliver reliable defense against those types of attacks. In this paper, the approach of risk assessment via internetworking links analysis is developed. Although modern information security is based on risk management, in this paper it is proposed to mitigate route hijack risks byenhancing links topology. Estimating the risks of route hijack requires quantitative measurement of the impact of an attack on the routing distortion, and therefore, the loss of information security breach. For this assessment, this paper proposes to use knowledge of the features of the Internet topology at the layer of global routing, which is determined by the interaction of autonomous systems -groups of subnets under common control -according to the routing protocol BGP-4. Based on our formal representation of IP routing, the relationship between topology and the risk of route hijack is shown. A new approach to quantifying information risk using a new risk-oriented model of global routing, which will reflect the properties of Internet nodes in terms ofthe risk of routes hijack.Документ Відкритий доступ High performance encryption tools of visual information based on cellular automata(Institute of special communication and information security of National technical university of Ukraine «Kyiv polytechnic institute», 2016) Bilan, Stepan; Demash, Andrii; Білан, Степан; Демаш, АндрійДокумент Відкритий доступ Implementation of information security management system in organization(Institute of special communication and information security of National technical university of Ukraine «Kyiv polytechnic institute», 2016) Bezshtanko, Vitalii; Makarevych, Oleksandr; Безштанько, Віталій; Макаревич, ОлександрДокумент Відкритий доступ Information, signs, knowledge and intelligence(Institute of Special Communication and Information Protection of National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, 2020) Yakoviv, IhorUnderstanding the special role of information in scientific knowledge formation is simultaneously accompanied by a highlevel of uncertainty regarding the nature of both information and knowledge. There are many approaches to information that can be constructively applied in some special areas of activity but remain completely useless in others. Against the background of such “informational diversity”, many researchers more often had the idea of the need for a universal explanation of the information phenomenon. The need to solve this problem is intuitively substantiated by the fact that the formation of information and itsapplication create the foundation for many processes of self-organization and control in systems of various nature: chemical, biological, social, technical, and others. From the same point of view, the concept of information is often referred to as the primary one when explaining other also little understood phenomena: signs, semantics, knowledge, psyche, intelligence, mind, consciousness, self-awareness, mathematics, probability, and others. The universal concept of information and concepts derived from it can become a set of tools for formalized analysis from common conceptual positions of information processes in various scientific fields. The article presents the results of research, within the framework of which a universal information concept was obtained using a set of basic statements (axiomatic approach) and means of terminological, graphic, mathematical formalization (means of overcoming uncertainties). The information phenomenon is presented as a special result of the interaction of physical objects: the property of an object acquired during interaction contains the characteristics of another object. This approach to explaining the nature of information (attributive-transfer nature of information, ATNI), made it possible to determine the componentsof the process of its formation: informational impact, information carrier, essence, and semantics of information. With their help, derived concepts are defined: information environment and its characteristics; cybernetic system, the formalized model of its controlled behavior and security criteria; signs and their relationship with information; knowledge and intelligence of the cybernetic system. The applicability of the proposed approach to the analysis of processes in information environments of variousnatures: protein, neural, computer, has been tested.Документ Відкритий доступ Methodology of formation of fuzzy associative rules with weighted attributes from SIEM database for detection of cyber incidents in special information and communication systems(Institute of Special Communication and Information Protection of National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, 2023) Subach, Ihor; Mykytiuk, ArtemThe article presents the method of forming associative rules from the database of the SIEM system for detecting cyber incidents, which is based on the theory of fuzzy sets and methods of data mining. On the basis of the conducted analysis, a conclusion was made about the expediency of detecting cyber incidents in special information and communication systems (SICS) by applying rule- oriented methods. The necessity of applying data mining technologies, in particular, methods of forming associative rules to supplement the knowledge base (KB) of the SIEM system with the aim of improving its characteristics in the process of detecting cyber incidents, is substantiated. For the effective application of cyber incident detection models built on the basis of the theory of fuzzy sets, the use of fuzzy associative rule search methods is proposed, which allow processing heterogeneous data about cyber incidents and are transparent for perception. The mathematical apparatus for forming fuzzy associative rules is considered and examples of its application are given. In order to increase the effectiveness of the methods of searching for fuzzy associative rules from the database of the SIEM it is proposed to use weighting coefficients of attributes that characterize the degree of manifestation of their importance in the fuzzy rule. A formal formulation of the problem of forming fuzzy associative rules with weighted attributes and which are used for the identification of cyber incidents is given. A scheme of their formation and application for identification of cyber incidents is proposed. The method of forming fuzzy associative rules with weighted attributes from the database of the SIEM is given. The problem of determining the weighting coefficients of the relative importance of SIEM system DB attributes is formulated and a method for its solution is proposed. The formulation of the problem of finding sets of elements that have a weighted fuzzy support of at least the given one and are used to form fuzzy associative rules with weighted attributes is given. Methods for its solution are proposed.Документ Відкритий доступ Methods and approaches analysis of artificial intelligence designing for real time strategy game(Institute of Special Communication and Information Protection of National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, 2021) Dorohyi, Yaroslav; Svyrydenko, OleksandrThe research provides a detailed analysis of approaches to creating AI in video games. The main area of research is AI for real-time strategies, as this genre is characterized by the complexity of the game environment and the practice of creating a comprehensive AI, consisting of several agents responsible for a particular aspect of the game. The analysis shows that the main areas of use of AI methods in strategies are strategic and tactical decisions, as well as analysis of the current situation and forecasting the enemy and his chosen strategy. Among the analyzed approaches to tactical AI, reinforcement, game tree search, Bayesian model, precedent-based solutions and neural networks are most often used. Popular approaches to building strategic AI are precedent-based decision-making, hierarchical planning, and autonomousachievement of goals. When creating a module for research and determination of plans, the most popular methods are deductive, abduction, probabilistic and precedent. In addition to the considered methods, others are used in the development, but they are not as popular as above, due to problems with speed or specific implementation, which does not allow to adapt them to the standard rules of genre games. Comparison of algorithms and implementations of AI in the framework of commercial and scientific developments. Among the main differences are the high cost of commercial development of complex agents, as well as the specifics of the scientific approach, which aims to create the most effective agent in terms of game quality, rather than maximizing positive impressions of players, which is the basis of commercial development. The reasons for insufficiently active development of scientific research in the field of AI for games in general and the genre of real-time strategies in particular are described.Документ Відкритий доступ Minimization measurement requirements for maintenance and repair special communication means(Institute of Special Communication and Information Protection of National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, 2017) Ryzhov, Yevhen; Sakovych, Lev; Рижов, Євген Вікторович; Сакович, Лев Миколайович