https://jrnl.nau.edu.ua/index.php/Infosecurity/issue/feedUkrainian Scientific Journal of Information Security2025-08-15T13:54:09+03:00Тетяна Олександрівна Охріменкоt.okhrimenko@npp.kai.edu.uaOpen Journal SystemsUkrainian Scientific Journal of Information Security was established in 1995. National Aviation University is the founder and publisher of the journal. <br />The main aim of the journal is to highlight the results of scientific researches and the dissemination of information on all information security aspects. <br />Journal is published three times (issues) a year in Ukrainian, English & Russian (mixed languages). <br />Categories of audience: students, postgraduate students, doctoral candidates, researchers & experts in information security.https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/20356 Method for calculating information protection in social networks in the conditions of fuzzy sets 2025-08-15T12:03:41+03:00Володимир Миколайович АХРАМОВИЧ 12z@ukr.netОлександр Анатолієвич ЛАПТЄВalaptev64@ukr.netАнна Вадимівна ІЛЬЄНКОanna.ilienko@npp.nau.edu.uaВадим Володимирович АХРАМОВИЧ12zstzi@ukr.net<p>The current task of analyzing and managing a social network is to select such a composition of system elements and their <br>parameters that will ensure the possibility of achieving maximum functional efficiency under conditions of uncertainty. This article <br>studies the system for protecting a social network from network components under conditions of uncertainty. The main attention is <br>paid to data fuzzification, building fuzzy set models, assessing risks and the level of security of network objects. The proposed approach allows developing effective solutions for making management decisions in the cybersecurity context. An algorithm for building a tuple of protection parameters and modeling them using membership functions is presented. Methods for aggregating results and calculations using trapezoidal and triangular functions are separately considered. For this purpose, the following were compiled: a tuple of fuzzy sets from network components; its modeling was carried out; risk levels were calculated; network security levels, aggregation of results, membership functions. Trapezoidal and triangular methods were used to calculate parameters. The calculations are illustrated with graphic material. The results of the work can be used by network administrators, organizations and government agencies to improve the efficiency of cybersecurity management and protection of information resources.</p>2024-12-31T00:00:00+02:00Copyright (c) 2024 Ukrainian Scientific Journal of Information Securityhttps://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/20357Ensuring cyber security and high data transmission speed in wireless networks2025-08-15T12:49:02+03:00Юлія Володимирівна КОСТЮК y.kostiuk@kubg.edu.uaБогдан Тарасович БЕБЕШКО b.bebeshko@kubg.edu.uaГеннадій Миколайович ГУЛАК hulak@kubg.edu.uaПавло Миколайович СКЛАДАННИЙ p.skladannyi@kubg.edu.uaСвітлана Леонідівна РЗАЄВА s.rzaieva@kubg.edu.uaКарина Вікторівна ХОРОЛЬСЬКАkarynakhorolska@gmail.com<p>The paper investigates the problem of ensuring a balance between information security and data transmission performance in wireless communications, in particular in the context of Bluetooth technology. The relevance of the topic is due to the growing demands on the speed and reliability of video stream transmission, which is becoming critically important in the context of the <br>development of modern information and communication systems. The article analyzes the technical features of Bluetooth, in particular the IEEE 802.15.1 standard, which provides energy-efficient data transmission over short distances. The relevance of the <br>topic is due to the growing demands on the speed and reliability of video streaming, which is becoming critical in the development of modern information and communication systems. The article analyzes the technical features of Bluetooth, in particular the IEEE <br>802.15.1 standard, which provides energy-efficient data transmission over short distances. The main characteristics of Bluetooth are <br>considered, including the star network topology, frequency range, modulation methods and signal power that affect data transmission performance. Particular attention is paid to adaptive modulation and buffering methods that improve transmission quality in conditions of radio frequency interference and obstacles. Data protection mechanisms that can be integrated into wireless networks are also analyzed to prevent security threats such as unauthorized access and data interception. The proposed solutions take into account the features of Bluetooth Low Energy (BLE), which makes them particularly effective for IoT applications. The conclusions of the paper emphasize the importance of an integrated approach to resource management in wireless communications, which allows for stable, secure, and productive operation of information systems, in particular in an ever-changing threat environment.</p>2025-08-15T00:00:00+03:00Copyright (c) 2024 https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/20358ФОРМУВАННЯ АКУСТИЧНОГО СИГНАЛУ ДЛЯ МЕТОДУ АКУСТИЧНОЇ ЛОКАЦІЇ2025-08-15T13:09:41+03:00Зоя Олегівна САМОСУД z.samosud@gmail.com<p>This work is dedicated to the formation and the generation of an acoustic impulse signal for the acoustic location method. In this method, the distance to the place of the secret intelligence device (SID) is determined by the time of an acoustic impulse signal pass to the microphone of the SID. The experimental and theoretical researches have shown that the use of an acoustic video impulse signal in the acoustic location of SID method is practically impossible. Researches have shown that the distortion of the acoustic video impulse of radiation is largely influenced by the presence of high-frequency harmonics and lack low-frequency harmonics. The ab- sence of high-frequency harmonics has a greater influence on the front and fall slope and to a lesser extent on the shape of the im- pulse. To use a speaker that emits mid-range acoustic frequencies, and keep the shape of the emitted impulse is necessary to use the carrier frequency, which corresponds to a centre frequency of the emission band with modulation by video impulse. In this case, the side harmonics by modulating the fall in the range of frequencies emitted by the speaker. Therefore, to generate an acoustic impulse and to generate a signal suitable for measuring the propagation delay it is necessary to form and generate the radio impulse. Thus, as a result of the work we determined the conditions and requirements for forming and generating an acoustic impulse for acoustic loca- tion method.</p>2025-08-15T00:00:00+03:00Copyright (c) 2024 https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/20359СЕМАНТИЧНИЙ АНАЛІЗ ВЕБ-РЕСУРСІВ ДЛЯ ВИЯВЛЕННЯ РОСІЙСЬКОЇ ДЕЗІНФОРМАЦІЙНОЇ ДІЯЛЬНОСТІ2025-08-15T13:24:48+03:00Сергій Олександрович ГНАТЮК s.gnatyuk@kai.edu.uaЮлія Ярославівна ПОЛІЩУКpolishchuk.yu.ya@gmail.com<p>The issue of disinformation influence exerted by the Russian Federation on Ukrainian society remains relevant and critically important due to its large-scale social and political consequences. Since 2014, the fight against disinformation has become a national priority. With the onset of the full-scale invasion in February 2022, the nature of disinformation messages has changed significantly: the main focus has shifted to topics related to chemical, biological, and nuclear weapons. In this regard, the main goal of this study is to create a database of disinformation texts related to these topics, as well as to develop software for the automated detection of such materials in the information space.</p>2025-08-15T00:00:00+03:00Copyright (c) 2024 https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/20361ПРОГРАМНИЙ МОДУЛЬ АВТЕНТИФІКАЦІЇ З ВИКОРИСТАННЯМ УДОСКОНАЛЕНОЇ СХЕМИ МЕРКЛЕ ДЕМҐАРДА2025-08-15T13:42:12+03:00Анна Вадимівна ІЛЬЄНКОanna.ilienko@npp.nau.edu.uaЛілія Павлівна ГАЛАТА liliia.halata@npp.kai.edu.uaОлена Вікторівна ДУБЧАК 3915922@npp.kai.edu.uaМирослав Максимович АРЄШКОВ 6350028@stud.kai.edu.ua<p>The current task of ensuring the security of personal data of users of many systems around the world is the selection of reliable methods of information protection, their novelty, ease of implementation and updating, as well as their constant improvement. This article studies the structures of existing hash functions as a component of the authentication process, which in turn is the main component of information protection systems. The main focus is on the development of structures over time, the threats they have faced, and ways to ensure resilience against various types of attacks. A new perspective on the development of hash function construction structures in authentication systems is proposed and a solution is created that can compete with existing standards while being relatively easy to implement. The result of the work can be implemented into existing authentication systems by organizations and government agencies to increase the level of information protection. </p>2025-08-15T00:00:00+03:00Copyright (c) 2024 https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/20362ТЕСТУВАННЯ АНТИВІРУСНИХ РІШЕНЬ ДЛЯ КОРПОРАТИВНОГО СЕГМЕНТУ2025-08-15T13:54:09+03:00Іван Андрійович ЧЕРНІГІВСЬКИЙ i.chernihivskiy@gmail.comЛариса Петрівна КРЮЧКОВА l.kriuchkova@kubg.edu.ua<p>The development of effective methods for detecting computer viruses is an urgent task, the importance of which is determined by modern trends in the development of data exchange in information systems and the requirements for their security. The number and complexity of virus attacks on enterprise information systems is constantly growing, so there is a need to choose an antivirus solution in conditions of insufficient resources either as basic protection for endpoints, or to replace the existing solution with a more advanced one. The process of testing antivirus programs necessitates the use of programs and tests to assess the effectiveness of protective solutions. The purpose of the publication is to determine the tests and programs that will be sufficient to <br>assess the effectiveness of a protective solution in a corporate environment. It is shown that the analysis of the antivirus's reactions <br>to several malicious programs from the Ransomware family and to programs that imitate their behaviour is quite sufficient to obtain <br>a basic idea of the antivirus's heuristic module and its ability to counteract new threats. A set of tests and programs sufficient to <br>assess the effectiveness of a protective solution has been determined. A test has been proposed that can provide a first idea of the <br>antivirus solution, eliminating the need for further testing. The criteria by which the antivirus is expected to work on malicious <br>programs of the Ransomware family have been determined, and a script that simulates the behaviour of known Ransomware has been proposed for testing the heuristic module of the antivirus. It is noted that testing in a specific environment by our own specialists provides an opportunity to identify the weaknesses of antiviruses and either close them with the participation of the vendor, or choose a more relevant solution, which will increase the overall level of cyber protection at the enterprise. Further research can be focused on improving methods for extracting digital artifacts, taking into account typical tasks for an information security analyst in a corporate environment.</p>2024-12-31T00:00:00+02:00Copyright (c) 2024 https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/20360АНАЛІЗ СУЧАСНИХ МЕТОДІВ СТЕГОАНАЛІЗУ АУДІОСИГНАЛІВ2025-08-15T13:32:58+03:00Ганна Вадимівна МАРТИНЮК ganna.martyniuk@gmail.comІгор Вадимович МАРТИНЮКimartyniukiv@gmail.comБогдан Петрович ПРОЦЕНКО bohdan.protsen@gmail.com<p>The paper provides information on the current state of the problem of stegoanalysis of audio signals. Interest in this subject arises due to the constant growth of digital content and digital transformation in particular. It should be noted that most of the literature related to stegoanalysis, in particular in Ukraine, deals with the analysis of images only. There is very little information about the use of audio as a container in Ukrainian publications. The authors have analysed modern foreign literature in the field of detecting hidden information in audio files. The classification of stegoanalysis methods, in particular signature, statistical and deep learning based methods, as well as their advantages and disadvantages are considered.</p>2025-08-15T00:00:00+03:00Copyright (c) 2024