You are here

Methods and technologies for ensuring cybersecurity of computer systems and networks of critical infrastructure facilities


Work number - M 10 FILED

Presented National Aerospace University “Kharkiv Aviation Institute”

Authors:
1. ZEMLIANKO Heorhii Andriyovych – Doctor of Philosophy, Senior Lecturer at the National Aerospace University
2. MOROZOVA Olga Igorivna – Doctor of Technical Sciences, Professor, Professor at the National Aerospace University
3. NICHEPORUK Andrii Oleksandrovych – Candidate of Technical Sciences, Associate Professor, Associate Professor at Khmelnytskyi National University.
4. TETSKYI Artem Hryhorovych – Candidate of Technical Sciences, Associate Professor at the National Aerospace University.

The scientific and applied problem that is solved in the work is the development of models, methods and technologies for ensuring cybersecurity of mobile operating systems, critical infrastructure web systems, drones fleets, computer networks that provide their interaction, and a methodology for training cybersecurity of computer systems and networks of critical infrastructure facilities specialists.

Novelty of scientific results:

1. The concept and principles for ensuring cybersecurity of computer systems and networks of critical infrastructure facilities are proposed.

2. A convolutional neural network model based on the use of mixed data has been developed, as well as a method for detecting malicious software in Android-compatible mobile operating systems for critical infrastructure facilities.

3. Methods for assessing and ensuring cybersecurity of critical infrastructure web systems based on content management systems using attack trees have been developed.

4. Models and methods for ensuring cybersecurity of multifunctional fleets of unmanned aerial vehicles under single and combined attacks for critical infrastructure facilities have been developed.

5. There have been developed a methodological framework of creating information technology and a model of digital knowledge platform for using in dual system of cybersecurity of computer systems and networks of critical infrastructure facilities specialists training.

6. Methods of technologies for ensuring cybersecurity of computer systems and networks of critical infrastructure facilities have been introduced.

The implementation of the results provided an opportunity:

  • to develop and implement solutions obtained in the work in the field of information and telecommunications technologies, mechanical engineering, defense industry, as well as in higher education institutions, etc.;
  • to create and implement in the educational process of applicants for the first (Bachelor's), second (Master's) and third (educational-scientific  ̶  Doctors of Philosophy) levels of higher education a number of courses: "Databases", "IoT Software Systems", "Blockchain Technologies", "Ensuring Cybersecurity of Unmanned Aerial Vehicles", "Programming Artificial Intelligence Tools in Python", "Theory and Methods of Internet Computing", "Methods for Modeling and Optimization of Secure Computer Systems", "Methodology for Developing, Verifying and Deploying Software and Systems in Cloud Environments", "Theory and Design of Internet of Things Systems", "Mobile-Oriented Software Development", "Computer and Cyber-Physical Systems", "IT Infrastructure", "Computer Game Programming Technologies", "Operating Systems", "Computer and Cyber-Physical Systems", "Penetration Testing Tools", "Web Systems Security", as well as training modules for cybersecurity specialists;
  • to achieve the 0.933% level of the malware detection reliability value in the Android operating system and reduce the false triggering rate to 3.3% compared to known methods for detecting malware in the Android mobile operating system;
  • to provide the permissible value of the success rate of attacks at a minimum cost and choose protection measures, taking into account their impact on the success rate of attacks and cost, i.e. the use of methods on the example of one installation of content management system allowed to reduce the value of the success rate of attacks to 42,3%;
  • to improve the cybersecurity of multifunctional fleets of unmanned aerial vehicles by increasing the effectiveness of attack detection by 35% and reducing the response time to cyber threats by 40% through the implementation of an integrated threat model and adaptive countermeasure selection algorithms;
  • to increase the efficiency of training of cybersecurity of computer systems and networks of critical infrastructure facilities specialists, in particular, experimental verification shows that the absolute success due to the introduction of the proposed information technology in the educational process increased by 4%, and qualitative success increased by 14%, respectively.

Number of publications: 1 individual monograph, 7 collective monographs, including 5 in foreign publications, 4 manuals, 51 articles in journals included in category "A" of the List of Scientific Professional Publications of Ukraine and in foreign publications indexed in the Web of Science Core Collection and/or Scopus databases (including 38 in foreign publications) and 37 articles in journals included in category "B" of the List of Scientific Professional Publications of Ukraine, 7 abstracts of reports. The total number of references to the authors' publications/h-index for the work according to the databases is respectively: Web of Science 51/4, Scopus 347/11, Google Scholar 550/12. The 4 patents for a useful model have been obtained.

Comments