https://jrnl.nau.edu.ua/index.php/Infosecurity/issue/feedUkrainian Scientific Journal of Information Security2025-12-24T16:52:13+02:00Тетяна Олександрівна Охріменкоt.okhrimenko@npp.kai.edu.uaOpen Journal SystemsUkrainian Scientific Journal of Information Security was established in 1995. National Aviation University is the founder and publisher of the journal. <br />The main aim of the journal is to highlight the results of scientific researches and the dissemination of information on all information security aspects. <br />Journal is published three times (issues) a year in Ukrainian, English & Russian (mixed languages). <br />Categories of audience: students, postgraduate students, doctoral candidates, researchers & experts in information security.https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/20634Adaptive Information Security Management in Cloud-Oriented Intelligent Transportation Systems2025-12-24T15:57:01+02:00Світлана Леонідівна РЗАЄВАs.rzaieva@kubg.edu.uaПавло Миколайович СКЛАДАННИЙ p.skladannyi@kubg.edu.uaЮлія Володимирівна КОСТЮК y.kostiuk@kubg.edu.uaВадим Олексійович АБРАМОВv.abramov@kubg.edu.uaВолодимир Георгійович КРАВЧЕНКО kvg1953@kneu.edu.ua<p><em>The paper investigates theoretical and applied aspects of adaptive information security management in cloud-oriented Intelligent Transportation Systems (ITS). We analyze architectural features of the “Cloud–Edge–Vehicle” environment, identify key cyber-threat vectors, and substantiate the shortcomings of traditional security approaches—specifically static access policies, centralized PKI solutions, and classical IDS/IPS—in multi-domain, dynamic transportation ecosystems. We develop a mathematical and algorithmic model of adaptive management that treats an ITS as a discrete dynamical system whose state evolves over time under the influence of external threat factors and adaptive security measures. The control problem is formalized as minimization of a combined risk-and-cost functional, ensuring a balance between the level of protection and system performance.<br>Within the proposed approach, mechanisms for collecting and analyzing telemetry and network data, risk assessment methods, algorithms for optimal selection of security policies, and feedback loops across architectural layers are integrated into a single closed-loop adaptive management system. For anomaly detection in streaming data, we apply machine-learning algorithms (in particular, LSTM/GRU and autoencoders), while model consistency across layers without data centralization is achieved via Federated Learning. We consider methods to counter adversarial attacks both during training and at inference time for ML components. The obtained results provide a scientific foundation for building scalable, threat-resilient, and resource-efficient protection mechanisms for cloud-oriented ITS. The proposed model can be used to enhance the security of transportation networks, ensure policy coherence across architectural layers, and automate real-time cyber-threat response.</em></p>2025-04-22T00:00:00+03:00Copyright (c) 2025 Ukrainian Scientific Journal of Information Securityhttps://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/20633Method for calculating information protection in social networks in the conditions of fuzzy sets 2025-12-24T15:24:52+02:00Володимир Миколайович АХРАМОВИЧ12zstzi@ukr.netВадим Володимирович АХРАМОВИЧ12zstzi@ukr.net<p><em>This paper presents an approach to information security analysis in corporate and local networks under uncertainty based on fuzzy set theory. The proposed methodology integrates mathematical modeling, expert evaluations, and fuzzy logic tools to assess the effectiveness of protection systems. The influence of internal network components and external factors is examined, and their significance is evaluated using PRCC and Sobol sensitivity analyses. Examples of calculations, graphical illustrations, and practical recommendations for improving information protection are provided. The results confirm the effectiveness of applying fuzzy sets as a decision-support tool for cybersecurity assessment under uncertainty.</em></p>2025-04-22T00:00:00+03:00Copyright (c) 2025 Ukrainian Scientific Journal of Information Securityhttps://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/20639Vulnerabilities of IoT Network Architectures: Classification and Real Incidents2025-12-24T16:52:13+02:00Даніель Васильович ПАСТУЩАК danikpastushchak90@gmail.com<p>The rapid expansion of the Internet of Things (IoT) has resulted in a growing number of devices integrated into critical infrastructure, industry, and everyday life. At the same time, limited computational resources, protocol heterogeneity, and the lack of proper update mechanisms make IoT ecosystems vulnerable to a wide range of attacks. This article systematizes the main categories of IoT vulnerabilities, including device limitations, protocol weaknesses, default configurations, physical access, and organizational factors. Special attention is paid to the analysis of communication protocol flaws (MQTT, HTTP, CoAP) and the description of common incidents, such as the Mirai botnet and industrial safety system attacks Triton and CrashOverride. The results show that vulnerabilities exist at all levels of IoT network architecture, and even a single weakness can lead to large-scale consequences. The presented classification and real-world attack cases can be applied to the development of effective IoT protection strategies and further advancement of cybersecurity solutions</p>2025-04-22T00:00:00+03:00Copyright (c) 2025 https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/20568Methods of integrating hidden messages into the visual representation of a confidential document 2025-12-18T15:57:17+02:00Микола Миколайович СНІЖИНСЬКИЙ smm_mail_ua@proton.meВладислав Юрійович КОВТУН vlad.kovtun@cipher.com.uaМарія Григорівна КОВТУН mg.kovtun@gmail.comЮлія Русланівна КІНДРАТ kindrat0407@gmail.com<p><em>This paper examines methods for incorporating hidden messages into the visual representation of confidential documents to ensure controlled distribution. It discusses the practical implementation of digital watermarks (DWM) that can be extracted from both electronic and printed versions of a document. It's possible even after printing, scanning, or photographing. The authors describe the formation of embedded messages, encryption techniques, error-resistant encoding, and visual embedding strategies. Modern AI-based methods for detecting and extracting watermarks are reviewed. Additionally, the paper compares classical error correction codes (Luhn, CRC, Hamming, Reed-Solomon) used to enhance robustness against distortions</em></p>2025-04-22T00:00:00+03:00Copyright (c) 2025 https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/20636Active cyberprotection concept in context of technical capabilities for cyber threats mitigation2025-12-24T16:16:54+02:00Микола Васильович КОВАЛЬ uac.3333@gmail.com<p><em>Ensuring cybersecurity has been identified as one of the key priorities within the national security system of Ukraine, while cyberspace is regarded as a potential theater of warfare. The evolution of the cyber threat landscape and the advancement of tools used for their implementation, against the backdrop of rapid digitalization, have led to a significant increase in the speed of cyberattacks and, consequently, a reduction of the time permissible for effective response. This highlights the need for the implementation of proactive cybersecurity measures, limited strictly to non-offensive actions.</em></p> <p><em> </em><em>The article provides an overview of the cybersecurity strategies of selected European and Asian countries, with a focus on their approaches to the development of active cyber protection and the application of related technological capabilities. Such an analysis makes it possible to identify international trends and explore the potential for their adaptation in the national context.</em></p> <p><em> </em><em>Special attention is given to approaches aimed at active counteraction to cyber threats based on preventing network communication between victim's device and attacker's infrastructure at the IP and DNS levels. The study also considers the scalability of such solutions, real-time reaction, contextualization of data, and the technical feasibility of generating cyber threat alerts (early warning messages).</em></p>2025-04-22T00:00:00+03:00Copyright (c) 2025 https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/20637Method for early detection and prediction of cybersecurity incidents in information and communication systems based on machine learning 2025-12-24T16:27:40+02:00Сергій Олександрович ГНАТЮК s.gnatyuk@kai.edu.uaВікторія Миколаївна СИДОРЕНКО viktoriia.sydorenko@npp.kai.edu.uaЯрослав Петрович ЄВЧЕНКО evchenkoyaroslav29@gmail.com<p><em>In modern conditions of the rapid growth of both the number and complexity of cyber threats, the task of early detection and prediction of incidents becomes crucial for ensuring the cyber resilience of information and communication systems (ICS). An analysis of scientific approaches, open datasets, and current machine learning methods has revealed several systemic limitations, including the absence of a temporal component, imbalance of real-world data, limited generalization capability of models, and low effectiveness in real-time operation. The article presents an integrated method for early detection and prediction of cybersecurity incidents, which combines graph-based modeling of ICS structure, construction of a set of behavioral events, anomaly detection using machine learning algorithms, and attack development forecasting employing temporal neural models such as LSTM. The method enables the identification of critical nodes, assessment of incident propagation probability, and formation of a set of high-risk events for proactive response. The proposed approach provides a foundation for enhancing the cyber resilience of ICS and can be applied within monitoring and information security support systems. Future research will focus on experimental validation of the method using realistic streaming data, as well as evaluating its scalability and effectiveness in dynamic environments.</em></p>2025-04-22T00:00:00+03:00Copyright (c) 2025 https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/20638Методологія підтримки технологічних процесів у критичній інфраструктурі з забезпеченням безпеки інформації на основі хмарних технологій2025-12-24T16:37:27+02:00Тетяна Віталіївна СМІРНОВА sm.tetyana@gmail.comПавло Сергійович УСІК usikps@kntu.kr.uaІрина Анатоліївна ЛИСЕНКО min_max@i.uaКостянтин Олегович БУРАВЧЕНКО buravchenkok@gmail.comОлексій Анатолійович СМІРНОВdr.smirnovoa@gmail.com<p><em>This article proposes a methodology for supporting technological processes in critical infrastructure based on cloud technologies. The critical infrastructure of the state requires new approaches to ensure reliability, adaptability and information security of technological processes. At the same time, cloud technologies open up new opportunities for scalable monitoring, analysis and management of critical infrastructure in conditions of hybrid threats. Thus, the proposed methodology is aimed at forming an integrated digital platform based on the use of cloud technologies for monitoring, analysis and automated management of technological processes in conditions of high risks. The purpose of the developed methodology is to ensure continuous, safe and stable operation of technological processes of critical infrastructure facilities of the state through the implementation of cloud technologies for monitoring, analysis and automated management in conditions of high risks. The main task of this methodology is to develop a comprehensive architecture for supporting technological processes of critical infrastructure based on cloud solutions, increasing the level of technological readiness of critical infrastructure facilities for functioning in an unstable environment by implementing adaptive, scalable and secure solutions. The methodology proposed in this work is focused on functioning in conditions of increased threats, both man-made and cyber, taking into account the requirements for information security, communication reliability, redundancy of critical components and flexibility of the system architecture. This approach contributes to increasing the level of technological readiness of critical infrastructure objects to operate in an unstable environment, reduces the likelihood of failures and ensures resistance to external influences.</em></p>2025-04-22T00:00:00+03:00Copyright (c) 2025