Updated: 2026-01-12
Total number
Full text
Total number
Full text
Number of local repositories
Full text
0226U000365, (0121U107693) , R & D reports
Development of technology to ensure the survivability of territorially distributed information computer systems in a single information space (code: TDICS-2021)
Розробка технології розпізнавання загроз ТРІКС ЄІП. Розробка технології аналізу загроз ТРІКС ЄІП.
Dodonov Oleksandr Н., д.т.н.
08-01-2026
Institute for Information Recording NASU
The purpose of the work is to solve a topical scientific and technical problem, which is to develop technologies to ensure the survivability of territorially distributed information computer systems in a single information space (TDICS SIS) in conditions of destructive influences. TDICS SIS means a set of organizational structure, software and hardware and telecommunication means, mechanisms of functioning, algorithms, technologies, bases and banks data and knowledge that operate on the basis of common principles in a single information space, and designed to collect, process, store and provide the necessary information users of the system to make timely and adequate decisions.
The TDICS SIS threat recognition technology is considered as a set of methods, tools and processes aimed at identifying potential threats, which includes the following main processes: collecting data on the status of TDICS SIS and its elements; detecting and recognizing threats; automatically or manually taking measures after detecting a threat, such as blocking, notifying or eliminating vulnerabilities. Methods of signature, anomalous and hybrid threat recognition are considered, methods based on: machine learning, threat information, vulnerability analysis; content analysis. A comparative analysis of the considered methods is performed, tools for their implementation are provided. Step-by-step flowcharts of the application of each of the methods are developed, examples of their practical use are provided. The TDICS SIS threat recognition algorithm is developed and described. Threat recognition models are presented. The TDICS SIS threat analysis technology is considered as a set of methods, tools and processes, which includes the following main stages: obtaining threat data from threat recognition technology; risk assessment and forecasting: using risk analysis models to determine the probability of threat implementation and assessing their impact on the system; modeling the threat implementation (undesirable impact): creating attack scenarios to assess possible ways of threat implementation; formalizing an analytical conclusion about the threat for TDICS SIS. The TDICS SIS threat analysis methods are considered. Tools for their implementation are presented. The TDICS SIS threat analysis algorithm is developed and described. Models used for TDICS SIS threat analysis are presented. General principles for applying survivability technology to detect, recognize and analyze TDICS SIS threats are presented.
Andrii V. Boichenko
Oleksandr V. Koval
Kuzmychov Anatolii I.
Dodonov Oleksandr H.
Olena S. Horbachyk
Alina P. Hermaniuk
Pievtsov Hennadii V.
Viacheslav R. Senchenko
Iryna O. Khramova
Kutsenko Svitlana A.
Vadym O. Dodonov
Olha M. Kopitsena
Putiatin Volodymyr H.
Kirsanov Serhii O.
Bezuhlyi Oleksii M.
Maryna H. Kuznetsova
Yevhen O. Dodonov
2026-01-08
Updated: 2026-01-12
Saving a scientific data set occurs in two stages:
1.) Creating a data set
Enter the name of the set, a brief description of the set (annotation), and click the “Create set” button. After that, a draft data set will be automatically created, which you can save for further work with the set. The system will redirect you to the “Data set information” page.
2.) Filling in the data
On the “Data set information” page, you need to fill in all the fields related to the data set and upload the files.
Please note! Each file is uploaded separately. This is done to ensure the stable operation of the system.
Once you have filled in the information about the scientific data set and added the necessary files, you can save the draft or send the data to the system.
Please note! Once the data has been sent, you cannot change it.
Drafts are necessary for storing the data set and editing it before sending.
All accounts on the NRA website go through a standard registration procedure and are verified. However, in order to obtain additional features, such as publishing open reviews of academic texts, verification by affiliation is required.
To obtain the status “verified”, you must change your primary email address to a corporate one, which is tied to a scientific or educational institution.
For example: user@ukrintei.ua, user@nas.gov.ua
After confirming your corporate email address, your account will be automatically verified by affiliation.
If your email address is corporate, but your account does not have a verification mark, you need to write to us at the email address NRAT@ukrintei.ua. After verification, we will add your address to the database, and your account will be verified.
After completing the verification procedure for affiliation, you can change the primary email address to a convenient one for you, without losing your status during the current verification.
You only need to verify for affiliation once.
* We use corporate addresses from the Unified State Database on Education and the State Register of Scientific Institutions Supported by the State
To search for news published on the official website of NRАT in the “News” section, you need to enter one word, several words, or an exact phrase in the search field. Different terms are separated by spaces.
The search is performed everywhere – in the title and the news text.
For a more comprehensive result, it is recommended to use word stems (parts of words without endings).
When using multiple words for the search, they are combined using one of the logical methods described below.
By default, the logical connector “and” is used. In this case, search results will include all news releases that contain the specified words, even if they are located separately from each other and are in different parts of the text.
Example: Search phrase: OECD report. Search result: all news containing the words “report” and “OECD” in the text and in the title, both together and separately.
If a phrase or phrase is enclosed in quotation marks (“), the results will include all publications where this exact phrase or phrase is found.
Example: Search phrase: “OECD report.” Search result: all news containing the exact phrase “OECD report.”
If you know the publication date of the news or are interested in a specific time frame in which they were published on the website, you can select such a date or date range in the additional field that looks like a calendar. The date is entered in the format year-month-day and confirmed by clicking on the corresponding date in the calendar dropdown. You can enter a date or choose one by browsing through the calendar by months and years. By default, the interval starts from the oldest date (2018-01-23) and ends with the current date.
You can also use one or more hashtags, which are located under the search field on the right side of the “News” page.
Please note: The search for academic texts is carried out in a separate search window at the following link https://nrat.ukrintei.ua/searchdb.