Кафедра інфокомунікаційної інженерії (ІКІ)
Постійний URI для цієї колекції
Перегляд
Останні подання
Публікація Розгляд методів шифрування та аутентифікації для безпечних безпровідних мереж інтернету(ХНУРЕ, 2024) Стрименешенко, О. С.In recent decades, we have seen an exponential growth in the number of devices that connect to the Internet. From home devices and smart gadgets to industrial sensors and medical devices, the Internet of Things is becoming not only an integral part of our daily lives, but also a key foundation for innovation and development of modern society. However, along with this, the threat to the security and confidentiality of this data is also increasing. Each new connected device in the Internet of Things network opens up a new potential attack vector for attackers. From misuse of devices to leakage of personal information, the risks are growing as the number of connected devices grows. Therefore, the importance of ensuring data security and privacy in wireless Internet of Things networks is becoming more and more important.Публікація Моделювання багатокритеріальної задачі оптимізації вибору методики побудови СУІБ методами Томаса Сааті(ХНУРЕ, 2024) Фукс, М. А.The aim of the work is to analyze the purpose of the multi-criteria optimization, which is gaining much more popularity during the last decades. Thomas L. Saaty took part in the development of two methods to solve this type of problem, namely the Analytic Network Process and the Analytic Hierarchy Process. When choosing a methodology for building an ISMS, a CISO seeks to determine the best of the available alternatives. This task has been modeled using both of the abovementioned methods taking into account the presence of potential internal relationships between the described criteria.Публікація Дослідження захисту VPN з використанням технології Kill Switch(ХНУРЕ, 2024) Юркевич, М. О.This research investigates the effectiveness and implications of VPN protection augmented by Kill Switch technology, exploring its capacity to fortify digital privacy, prevent data exposure, and bolster overall cybersecurity in an increasingly interconnected digital landscape.Публікація Спільне використання міліметрових та субміліметрових хвиль(ХНУРЕ, 2024) Лютий, А. О.Current new 5G millimeter-wave (mm-wave) radio (NR) systems, as well as future 6G radio access technologies (RATs) in the terahertz (THz) band, will rely heavily on beamforming to combat excessive path loss. In addition, both RATs are designed for the same inelastic traffic that requires high data rates and is susceptible to blocking phenomena. To improve service reliability in these systems, multiple connections can be used to dynamically switch ongoing sessions between the two technologies. The purpose of this work is to investigate the use of millimeter and submillimeter waves for joint use.Публікація Дослідження технологій безпровідного зв’язку в інтернеті речей: переваги, обмеження та потенційні загрози(ХНУРЕ, 2024) Стрименешенко, О. С.The Internet of Things (IoT) plays an important role in our modern lives, facilitating automation and convenience in many aspects of our daily and professional lives. One of the key aspects of the IoT is wireless communication, which allows devices to communicate with each other and with central servers without the need for physical connection via cables. In this article, we will explore the benefits, limitations, and potential threats of wireless communication in the IoT.Публікація Роль штучного інтелекту та машинного навчання у виявленні та запобіганні атакам на безпровідні мережі інтернету речей(ХНУРЕ, 2024) Стрименешенко, О. С.The modern world is becoming increasingly dependent on Internet of Things (IoT) technologies, which are implemented in various areas of life: from industry to home devices. However, as the IoT grows in popularity, so does the threat to cybersecurity, especially with wireless networks being more vulnerable to attack. We now consider the role of artificial intelligence (AI) and machine learning (ML) in detecting and preventing attacks on IoT wireless networks.Публікація Пропозиції щодо оцінювання компетентності аудиторів систем управління інформаційною безпекою(ХНУРЕ, 2024) Пашкова, А. В.The work is devoted to the actual problem of assessing the consistency of experts' opinions in the field of information security. The work provides proposals for assessing the agreement of experts' opinions using the concordance coefficient, which takes into account the ranking of factors and provides a more accurate assessment of agreement than other methods.Публікація Криміналістичне дослідження месенджера SIGNAL(ХНУРЕ, 2024) Рєзніченко, Д. Ю.This work is devoted to a forensic investigation of the Signal messenger developed by Open Whisper Systems. The internal structure of the messenger, as well as its mechanisms for protecting confidential user data, will be considered. In addition, the working directories of the Signal messenger in the Android and Windows operating systems will be investigated.Публікація Аналіз існуючих підходів і методів забезпечення безпеки інфраструктури у хмарному середовищі(ХНУРЕ, 2024) Красюкова, В. В.The use of cloud environments is an essential part of working with information technologies. The use of cloud technologies requires thorough security measures. Key methods include multifactor authentication, limiting user access to the necessary minimum, network protection, and data encryption. Recommendations include creating network tiers, securing networks, using certificates, and encrypting traffic. Traffic filtering and monitoring, automated response to threats, auditing, and adherence to standards such as ISO/IEC 27001 are crucial for ensuring a high level of security and trust in cloud environments.Публікація Аналіз існуючих підходів і методів оцінки безпеки інфраструктури у хмарному середовищі(ХНУРЕ, 2024) Красюкова, В. В.The use of cloud environments is an integral part of working with information technologies. Analyzing modern methods of assessing infrastructure security in cloud environments is one of the key aspects to ensure a high level of data and resource protection. To assess security, methods such as security audits, penetration testing, risk assessment, and event log analysis can be utilized. These methods can be used separately, but to ensure maximum accuracy in security assessment, combining them is recommended. Security assessment of the infrastructure in the cloud environment needs to be conducted periodically to identify security threats and address them.Публікація Relevance of HSRP security(ХНУРЕ, 2024) Milanka, I. Yu.Currently, there are a lot of threats that can disrupt the proper functioning of information and communication systems and lead to their denial of service. If this happens, any company risks significant material and reputational losses. That is why it is so important to constantly develop new and more advanced methods of protecting information and communication systems, which can help increase the level of fault tolerance of corporate networks in relation to external influence from third parties and sources.Публікація Дослідження методів захисту від витоків інформації через метадані ресурсів web-додатків(ХНУРЕ, 2024) Качан, В. Є.The work is aimed at considering the criticality of information leakage in files metadata. A vulnerable web application OWASP Juice Shop has been analyzed and a possible solution has been developed that removes this critical vulnerability.Публікація Організаційно-технічні методи підвищення якості захисту в системах голосової автентифікації(ХНУРЕ, 2024) Квашенко, В. Р.; Пастушенко, М. С.With the rapid development of artificial intelligence technologies, industries must quickly adapt to new challenges. It is known that 62% of IT executives expressed concerns about the security threats posed by AI and deepfakes, as there have been cases where large banks’ authentication systems were bypassed using synthesized voices. Voice authentication systems are a convenient and effective method of user identity verification. However, the development of modern voice synthesis technologies creates significant security threats. Criminals can generate synthetic voices that precisely imitate another user’s voice, leading to unauthorized access. To address this issue, organizational and technical measures can be implemented. For example, the use of a changeable vocabulary, issuing a one-time password on the screen, and limiting the time for password entry are steps towards strengthening the security of voice authentication systems.Публікація Порівняльний аналіз сценаріїв розгортання інфраструктури у хмарному середовищі(ХНУРЕ, 2024) Красюкова, В. В.The process of deploying infrastructure in a cloud environment is one of the key stages that ensures the efficiency of using this infrastructure in the future. The physical location and ownership structure of the cloud environment play a significant role in the effectiveness of cloud computing applications. According to their combination, four deployment scenarios are distinguished. To choose a scenario, it is necessary to analyze the advantages and disadvantages of each of them, as well as evaluate one's own needs, requirements, and capabilities.Публікація Вирішення завдання оптимального вибору засобів захисту для корпоративної комп’ютерної мережі на основі методу аналізу ієрархій(ХНУРЕ, 2024) Гонтар, Д. Ю.This document presents a variant of solving the problem of optimal selection of security tools to create an effective integrated information security system for a small computer network of an enterprise using the T. Saaty hierarchy analysis method. The main optimality criteria are the residual risk and the level of implementation costs. In the course of the work, a hierarchical system was built, the priorities of each of the criteria were calculated, and the global priorities of the proposed security measures were determined. Based on the data obtained, the optimal complex for a given computer network of an enterprise was proposed.Публікація Інноваційні підходи до захисту безпеки інформаційних каналів керування в контексті розвитку автономних систем(ХНУРЕ, 2024) Вельма, І. Ю.In the modern world, the importance of autonomous systems such as unmanned aerial vehicles (UAVs), autonomous vehicles, and robots is growing. These systems require reliable and secure management, but they also become targets for potential cyberattacks. As a result, there is a need for innovative approaches to protecting the information channels of these systems.Публікація Використання нейронних мереж для виявлення та класифікації шахрайських повідомлень у електронній пошті(ХНУРЕ, 2024) Вельма, І. Ю.In today's digital world, email phishing has become a serious threat to users and organizations. Malicious actors employ various methods and techniques to deliver fraudulent messages, attempting to deceive recipients and gain access to their confidential data or financial resources. Consequently, there is a need for effective methods of detecting and classifying phishing emails.Публікація Роль навчання з підкріпленням у підвищенні ефективності систем захисту від електронного шахрайства(ХНУРЕ, 2024) Вельма, І. Ю.In today's digital age, where technology permeates every aspect of our lives, cybersecurity has emerged as a paramount concern. With the exponential growth of online transactions, communication, and data storage, the threat of electronic fraud, commonly known as cybercrime, has become more pervasive and sophisticated than ever before. In response to this evolving landscape, organizations worldwide are continuously striving to fortify their defense mechanisms against cyber threats.Публікація Аналіз fronthaul у централізованій архітектурі мобільної мережі(ХНУРЕ, 2024) Солоділов, В. В.It is proven that the construction of a mobile network based on a centralized architecture causes the organization of a more demanding and expensive transport network FH. The data transfer rate was analyzed to evaluate the centralized architecture of the mobile network. 4G and 5G networks are used. The difference between the maximum possible transfer rate and the actual rate at which the 5G network will increase the existing high FH requirements is shown. It has been proven that the requirements for networks will increase due to the increase in bandwidth.Публікація Дослідження методів управління параметрами якості NB-IoT 4G послуг(ХНУРЕ, 2024) Сізов, Я. А.In addition, research was carried out on methods for managing services, which is an important warehouse for any IoT system. It has been noted that there are a number of functional models for managing IoT services, one of which is IoT-A. The IoT-A model was chosen, which is an expanded version of the IoT MCE model and consists of seven horizontal levels, supplemented by two vertical ones (control and security). An analysis of methods for ensuring effective control of NB-IoT4G services, measurements and development, and an assessment of the parameters of the capacity of NB-IoT 4G services with the help of schedules was carried out.