Кафедра безпеки інформаційних технологій (БІТ)
Постійний URI для цієї колекції
Перегляд
Перегляд Кафедра безпеки інформаційних технологій (БІТ) за назвою
Зараз показано 1 - 20 з 355
Результатів на сторінку
Варіанти сортування
Публікація Analysis and comparison of data protection protocols of Wi-Fi networks(2022) Balagura, D. S.; Karavaiev, V. М.Публікація Analysis and comparison of the PaLa consensus protocol(ХНУРЕ, 2024) Кравченко, А. А.The PaLa protocol is known for its simplicity and effectiveness in achieving Byzantine Fault Tolerance (BFT). This thesis discusses the main properties of the PaLa – partially synchronous blockchain protocol, its advantages and disadvantages, and key aspects of its structure. We also compare PaLa with other algorithms, such as Tendermint, Hotstuff, and Casper FFG, which have fewer limitations due to their more complex structure. Based on the considered limitations, the following modifications are presented, which allow to extend them: Pipelet protocol, Committee rotation algorithm, and Streamlet protocol.Публікація Analysis of correlation rules in Security information and event management systems(ХНУРЕ, 2020) Sievierinov, О. V.; Ovcharenko, M.This article discusses the main components of information security systems and information security incident management. The methods of non-signature, as well as signature analysis of rules and decision-making that are used in such systems are considered. The analysis of existing methods of correlation rules. The main types of each method have been identified.Публікація Analysis of Homomorphic Encryption Algorithms(2024) Hushchyn Bohdan-DanyloModern methods of homomorphic encryption are considered. Homomorphic encryption schemes are analyzed according to the type and complexity of operations they support. Homomorphic encryption schemes based on lattice problems, such as the BGV scheme and the CKKS scheme, are analyzed. These schemes are believed to be resistant to both classical and quantum attacks.Публікація Antivirus solutions and their variations: EDR, MDM, SIEM(2023) Yevheniev, A. M.; Shulika, K. M.Публікація Blockchain technology in civilian security(2023) Buslov, P. V.; Yevheniev, A. M.; Kireieva, S. O.Публікація CNN та їх використання для класифікації Malware(2023) Федюшин, О. І.; Хижняк, К. М.Публікація Detection of anomalous actions in the network based on machine learning(2024) Kulia, V.; Petrenko, O.As cyber threats become more sophisticated, the need for effective anomaly detection systems has never been more critical. The usage of machine learning techniques to detect anomalous behavior in network traffic in comparison with traditional detection methods has been researched in this paper. Key challenges, benefits, and real-world applications of machine learning in this area were discussed.Публікація DNA Cryptosystem Using a Simple Replacement(ХНУРЕ, 2018) Sievierinov, O.; Evheniev, A.The paper considers the main purposes and possibilities of using DNA in such areas of information security as cryptography and steganography. The main opportunities for implementing and supporting systems based on DNA transformations, as well as the use of DNA containers as storage for a large amount of data. A cryptographic system is proposed simply for replacing with the use of DNA components.Публікація Managing Mobile Devices in an Organization(ХНУРЕ, 2024) Sydorenko, Z.Questions regarding the use of Mobile Device Management systems in the organization are considered. The main areas of application of MDM technology are considered, an analysis of advantages and disadvantages, problematic issues of implementation is carried out. A consistent and clear approach in the implementation and configuration of MDM policies that meet the business goals of the organization will allow solving problems when using mobile devicesПублікація Methods for Evaluating the Resistance of Lightweight Symmetric Ciphers to Differential-Linear Attack(2024) Tsemma, D.Lightweight cryptography plays a critical role in securing devices with limited computational power and memory, such as those found in the Internet of Things (IoT), smart cards, and embedded systems. The National Institute of Standards and Technology (NIST) has recognized this growing need and initiated the Lightweight Cryptography Project to develop secure, energy-efficient cryptographic standards. Among the selected algorithms, Ascon stands out as a prime example of lightweight cipher design. However, despite their resource efficiency, lightweight cryptographic algorithms must still be resistant to advanced attacks, including differential-linear cryptanalysis, a sophisticated hybrid approach that combines differential and linear methods. This paper presents a comprehensive analysis of the techniques used to evaluate the resistance of lightweight symmetric ciphers to differential-linear cryptanalysis, identifying key vulnerabilities and proposing methods to enhance their security.Публікація QRNG web service security testing(2022) Нrinenko, T. O.; Koptieva, M. V.Публікація Research of problematic issues in Federated learning of neural networks(2023) Zuikov, A. V.; Ruzhentsev, V. I.Публікація SQL ін'єкція: загроза безпеці веб-застосунків(ХНУРЕ, 2024) Блінна, В. С.This work is devoted to exploring the threat of SQL Injection to the security of web applications. Five major types of SQL injection attacks were reviewed, their methodologies and potential impact on system integrity were examined. The paper delineates the consequences of a successful SQL Injection attack, highlighting the severity of the threat it poses to web application security. Additionally, the significance of implementing robust security measures and defenses to effectively mitigate the risks associated with SQL Injection vulnerabilities in web applications is emphasizedПублікація SQL-ін'єкції як загроза безпеці даних(2023) Іващенко, М. Д.; Петренко, О. Є.Публікація Statement of the problem of assessing instability of passive quantum frequency standards in the presence of an error from the interaction(ХНУРЕ, 2021) Nariezhnii, O. P.; Grinenko, T. O.; Gorbenko, I. D.Construction of modern measuring complexes of the coordinate-time support system of Ukraine is impossible without improving mathematical models of quantum standards of frequency (QSF) used in group standards. This work is devoted to the analysis of methods for the stable solution of direct and inverse problems (methods for solving ill-posed problems) in models of the interaction of passive QSF in the process of their comparisons. The priority task is to use these methods for the numerical solution of problems in the design of group QSF and parallel quantum generators of random numbers. Methods for solving such problems are in demand, since they make it possible to create mathematical models of group QSF interaction. These models will enable the design of efficient parallel quantum random number generation devices for high-tech areas of cybersecurity. Varieties of methods such as the method of least squares or the method of the Moore-Penrose pseudo-inverse matrix are used, as a rule when evaluating the metrological parameters of QSF. Robust methods of regularization or filtering, for example, the Kalman or Wiener filter method, are used in the algorithms of group standards, due to the instability of the solution. However, these methods do not work in the presence of an error from the interaction of QSF in the process of their functioning in a group standard or in comparisons. The aim of this work is to analyze and substantiate the formulation of the problem of assessing the potential accuracy characteristics of passive QSF in the presence of an error from the interaction. Regularization parameters when determining the state vector of the group standard are found using signals transmitted by global navigation satellite systems such as GPS\GLONASS in the local differential correction mode.Публікація Using Event Management Systems to Block Attacks on Network(ХНУРЕ, 2019) Albarghathi Mohammed Adrees Abdullah; Fediushyn, O. I.A comparative analysis of the characteristics of modern event management systems to block attacks on networks was performed. The comparison this system was performed on the following indicators: monitoring and audit level, response type, adaptive capacity, architecture, detection method supported for platform deployment, principle of construction, method of extending functionalityПублікація Virtual environment for training auditors with information security(ВА ЗС АР; НТУ "ХПІ"; НАУ, ДП "ПДПРОНДІАВІАПРОМ"; УмЖ, 2021) Fediushyn, O. I.; Yatsiuk, O. O.; Rusanov, H. O.The goal of the study is to create a laboratory infrastructure that allows instructors to quickly create virtualized environments for simulating various cyber threats. The testing environment for this demo consists of Windows 10, Ubuntu 16.4, Kali linux and OSSIM. Completed attacks together with potential moves are gathered and put into various attack tree diagrams for analysis so as to find out the most effective attacks against each host.Публікація Zero Trust Architecture in Corporate Cybersecurity Systems(ХНУРЕ, 2025) Moskvin, K.; Sievierinov, O.The Zero Trust architecture is described as a modern approach to cybersecurity based on the principle of a complete lack of trust in any network elements. The main principles of Zero Trust and implementation stages are considered. The advantages of Zero Trust for corporate systems, such as increased security, flexibility, compliance with regulatory requirements, and reduced attacks, are identified. The problems of implementation are considered and recommendations for the successful integration of Zero Trust in organizations are given.Публікація zkTLS : Enhancing Secure Communications with Zero-Knowledge Proofs(2024) Kireieva, S.; Yevheniev, A.The evolution of digital communication has necessitated the development of advanced protocols to ensure privacy, integrity, and security. One such widely adopted protocol is Transport Layer Security (TLS), which underpins secure communications over the internet by encrypting data exchanged between users and servers. However, the advent of privacy-enhancing technologies such as Zero-Knowledge Proofs (ZKPs) has led to the creation of zkTLS (Zero-Knowledge Transport Layer Security), a variant of TLS that leverages the power of ZKPs to enhance privacy and trust without revealing sensitive information. This article explores zkTLS, its underlying principles, its applications in securing communication, and the potential benefits it offers compared to traditional TLS