1 documents found
Information × Registration Number 0223U000986, 0119U100090 , R & D reports Title Methodological basis of Ukraine cybersecurity popup.stage_title Head Subach Ihor Yu., Доктор технічних наук Registration Date 23-01-2023 Organization Institute of Special Communication and Information Protection National Technical University of Ukraine "Igor Sikorsky Kyiv Politechnic Institute" popup.description2 Methodological foundations for ensuring the cybersecurity of Ukraine have been developed. For this purpose, models for detecting anomalies and cybernetic attacks have been improved. Regression models and anomaly detection methods are proposed and highlighted. A technique for detecting anomalous network activity of users has been developed. Models, methods of conversion, information hiding, and detection of changes in encrypted network traffic are proposed. Development has been made on models and methods of identifying sources of informational influence on society and analyzing large volumes of data on cyber security issues from social media. Based on them, a set of content monitoring tools was created. The Q-analysis method is proposed for assessing the integrity of cyber protection objects. A conceptual model of cyberspace and cybersecurity has been built. A model, a method of formalizing cybersecurity risk management activities is proposed. A functional model of reverse engineering of harmful software has been created. Based on the theory of Markov processes, methods for describing cyberattack scenarios are proposed. The SIEM system has developed a rule-oriented method of detecting cyber incidents. Its architecture and functional model, as well as the methodology of their rational selection, have been created. New ways to increase user awareness of responding to cyber incidents are proposed. A model of the information processes of the behavior cycle of the corporate cybersecurity system has been built. Based on the user's biometric characteristics, models, methods, and techniques for protecting computer data from unauthorized access are proposed. A model, a method of analyzing the functions of information security management systems has been created. A monitoring subsystem of the complex information protection system has been developed. The obtained results are intended for use in the educational process by institutions of higher education. Product Description popup.authors Yevetskyi Viktor L. Hvozdinska Valeriia O. Hyrenko Ihor M. Horniichuk Ivan V. Kubrak Volodymyr O. Kulikov Vasyl M. Lande Dmytro V. Mykytiuk Artem V. Puchkov Oleksandr O. Soboliev Artem M. Subach Ihor Yu. Uspenskyi Oleksandr A. Tsurkan Vasyl V. Shapoval Oleksandr M. Sharadkin Dmytro M. Yakoviv Ihor B. popup.nrat_date 2023-01-23 Close
R & D report
6
Head: Subach Ihor Yu.. Methodological basis of Ukraine cybersecurity. (popup.stage: ). Institute of Special Communication and Information Protection National Technical University of Ukraine "Igor Sikorsky Kyiv Politechnic Institute". № 0223U000986
1 documents found

Updated: 2026-03-20