Ukrainian Scientific Journal of Information Security https://jrnl.nau.edu.ua/index.php/Infosecurity Ukrainian Scientific Journal of Information Security was established in 1995. National Aviation University is the founder and publisher of the journal. <br />The main aim of the journal is to highlight the results of scientific researches and the dissemination of information on all information security aspects. <br />Journal is published three times (issues) a year in Ukrainian, English &amp; Russian (mixed languages). <br />Categories of audience: students, postgraduate students, doctoral candidates, researchers &amp; experts in information security. en-US t.okhrimenko@npp.kai.edu.ua (Тетяна Олександрівна Охріменко) olga_fatuch@nau.edu.ua (Fatіch Olga Anatolіїvna) Tue, 31 Dec 2024 00:00:00 +0200 OJS 3.3.0.13 http://blogs.law.harvard.edu/tech/rss 60 Method for calculating information protection in social networks in the conditions of fuzzy sets https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/20356 <p>The current task of analyzing and managing a social network is to select such a composition of system elements and their <br>parameters that will ensure the possibility of achieving maximum functional efficiency under conditions of uncertainty. This article <br>studies the system for protecting a social network from network components under conditions of uncertainty. The main attention is <br>paid to data fuzzification, building fuzzy set models, assessing risks and the level of security of network objects. The proposed approach allows developing effective solutions for making management decisions in the cybersecurity context. An algorithm for building a tuple of protection parameters and modeling them using membership functions is presented. Methods for aggregating results and calculations using trapezoidal and triangular functions are separately considered. For this purpose, the following were compiled: a tuple of fuzzy sets from network components; its modeling was carried out; risk levels were calculated; network security levels, aggregation of results, membership functions. Trapezoidal and triangular methods were used to calculate parameters. The calculations are illustrated with graphic material. The results of the work can be used by network administrators, organizations and government agencies to improve the efficiency of cybersecurity management and protection of information resources.</p> Володимир Миколайович АХРАМОВИЧ , Олександр Анатолієвич ЛАПТЄВ, Анна Вадимівна ІЛЬЄНКО, Вадим Володимирович АХРАМОВИЧ Copyright (c) 2024 Ukrainian Scientific Journal of Information Security https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/20356 Tue, 31 Dec 2024 00:00:00 +0200 Ensuring cyber security and high data transmission speed in wireless networks https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/20357 <p>The paper investigates the problem of ensuring a balance between information security and data transmission performance in wireless communications, in particular in the context of Bluetooth technology. The relevance of the topic is due to the growing demands on the speed and reliability of video stream transmission, which is becoming critically important in the context of the <br>development of modern information and communication systems. The article analyzes the technical features of Bluetooth, in particular the IEEE 802.15.1 standard, which provides energy-efficient data transmission over short distances. The relevance of the <br>topic is due to the growing demands on the speed and reliability of video streaming, which is becoming critical in the development of modern information and communication systems. The article analyzes the technical features of Bluetooth, in particular the IEEE <br>802.15.1 standard, which provides energy-efficient data transmission over short distances. The main characteristics of Bluetooth are <br>considered, including the star network topology, frequency range, modulation methods and signal power that affect data transmission performance. Particular attention is paid to adaptive modulation and buffering methods that improve transmission quality in conditions of radio frequency interference and obstacles. Data protection mechanisms that can be integrated into wireless networks are also analyzed to prevent security threats such as unauthorized access and data interception. The proposed solutions take into account the features of Bluetooth Low Energy (BLE), which makes them particularly effective for IoT applications. The conclusions of the paper emphasize the importance of an integrated approach to resource management in wireless communications, which allows for stable, secure, and productive operation of information systems, in particular in an ever-changing threat environment.</p> Юлія Володимирівна КОСТЮК , Богдан Тарасович БЕБЕШКО , Геннадій Миколайович ГУЛАК , Павло Миколайович СКЛАДАННИЙ , Світлана Леонідівна РЗАЄВА , Карина Вікторівна ХОРОЛЬСЬКА Copyright (c) 2024 https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/20357 Fri, 15 Aug 2025 00:00:00 +0300 ФОРМУВАННЯ АКУСТИЧНОГО СИГНАЛУ ДЛЯ МЕТОДУ АКУСТИЧНОЇ ЛОКАЦІЇ https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/20358 <p>This work is dedicated to the formation and the generation of an acoustic impulse signal for the acoustic location method. In this method, the distance to the place of the secret intelligence device (SID) is determined by the time of an acoustic impulse signal pass to the microphone of the SID. The experimental and theoretical researches have shown that the use of an acoustic video impulse signal in the acoustic location of SID method is practically impossible. Researches have shown that the distortion of the acoustic video impulse of radiation is largely influenced by the presence of high-frequency harmonics and lack low-frequency harmonics. The ab- sence of high-frequency harmonics has a greater influence on the front and fall slope and to a lesser extent on the shape of the im- pulse. To use a speaker that emits mid-range acoustic frequencies, and keep the shape of the emitted impulse is necessary to use the carrier frequency, which corresponds to a centre frequency of the emission band with modulation by video impulse. In this case, the side harmonics by modulating the fall in the range of frequencies emitted by the speaker. Therefore, to generate an acoustic impulse and to generate a signal suitable for measuring the propagation delay it is necessary to form and generate the radio impulse. Thus, as a result of the work we determined the conditions and requirements for forming and generating an acoustic impulse for acoustic loca- tion method.</p> Зоя Олегівна САМОСУД Copyright (c) 2024 https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/20358 Fri, 15 Aug 2025 00:00:00 +0300 СЕМАНТИЧНИЙ АНАЛІЗ ВЕБ-РЕСУРСІВ ДЛЯ ВИЯВЛЕННЯ РОСІЙСЬКОЇ ДЕЗІНФОРМАЦІЙНОЇ ДІЯЛЬНОСТІ https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/20359 <p>The issue of disinformation influence exerted by the Russian Federation on Ukrainian society remains relevant and critically important due to its large-scale social and political consequences. Since 2014, the fight against disinformation has become a national priority. With the onset of the full-scale invasion in February 2022, the nature of disinformation messages has changed significantly: the main focus has shifted to topics related to chemical, biological, and nuclear weapons. In this regard, the main goal of this study is to create a database of disinformation texts related to these topics, as well as to develop software for the automated detection of such materials in the information space.</p> Сергій Олександрович ГНАТЮК , Юлія Ярославівна ПОЛІЩУК Copyright (c) 2024 https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/20359 Fri, 15 Aug 2025 00:00:00 +0300 ПРОГРАМНИЙ МОДУЛЬ АВТЕНТИФІКАЦІЇ З ВИКОРИСТАННЯМ УДОСКОНАЛЕНОЇ СХЕМИ МЕРКЛЕ ДЕМҐАРДА https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/20361 <p>The current task of ensuring the security of personal data of users of many systems around the world is the selection of reliable methods of information protection, their novelty, ease of implementation and updating, as well as their constant improvement. This article studies the structures of existing hash functions as a component of the authentication process, which in turn is the main component of information protection systems. The main focus is on the development of structures over time, the threats they have faced, and ways to ensure resilience against various types of attacks. A new perspective on the development of hash function construction structures in authentication systems is proposed and a solution is created that can compete with existing standards while being relatively easy to implement. The result of the work can be implemented into existing authentication systems by organizations and government agencies to increase the level of information protection.&nbsp;</p> Анна Вадимівна ІЛЬЄНКО, Лілія Павлівна ГАЛАТА , Олена Вікторівна ДУБЧАК , Мирослав Максимович АРЄШКОВ Copyright (c) 2024 https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/20361 Fri, 15 Aug 2025 00:00:00 +0300 ТЕСТУВАННЯ АНТИВІРУСНИХ РІШЕНЬ ДЛЯ КОРПОРАТИВНОГО СЕГМЕНТУ https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/20362 <p>The development of effective methods for detecting computer viruses is an urgent task, the importance of which is determined by modern trends in the development of data exchange in information systems and the requirements for their security. The number and complexity of virus attacks on enterprise information systems is constantly growing, so there is a need to choose an antivirus solution in conditions of insufficient resources either as basic protection for endpoints, or to replace the existing solution with a more advanced one. The process of testing antivirus programs necessitates the use of programs and tests to assess the effectiveness of protective solutions. The purpose of the publication is to determine the tests and programs that will be sufficient to <br>assess the effectiveness of a protective solution in a corporate environment. It is shown that the analysis of the antivirus's reactions <br>to several malicious programs from the Ransomware family and to programs that imitate their behaviour is quite sufficient to obtain <br>a basic idea of the antivirus's heuristic module and its ability to counteract new threats. A set of tests and programs sufficient to <br>assess the effectiveness of a protective solution has been determined. A test has been proposed that can provide a first idea of the <br>antivirus solution, eliminating the need for further testing. The criteria by which the antivirus is expected to work on malicious <br>programs of the Ransomware family have been determined, and a script that simulates the behaviour of known Ransomware has been proposed for testing the heuristic module of the antivirus. It is noted that testing in a specific environment by our own specialists provides an opportunity to identify the weaknesses of antiviruses and either close them with the participation of the vendor, or choose a more relevant solution, which will increase the overall level of cyber protection at the enterprise. Further research can be focused on improving methods for extracting digital artifacts, taking into account typical tasks for an information security analyst in a corporate environment.</p> Іван Андрійович ЧЕРНІГІВСЬКИЙ , Лариса Петрівна КРЮЧКОВА Copyright (c) 2024 https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/20362 Tue, 31 Dec 2024 00:00:00 +0200 АНАЛІЗ СУЧАСНИХ МЕТОДІВ СТЕГОАНАЛІЗУ АУДІОСИГНАЛІВ https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/20360 <p>The paper provides information on the current state of the problem of stegoanalysis of audio signals. Interest in this subject arises due to the constant growth of digital content and digital transformation in particular. It should be noted that most of the literature related to stegoanalysis, in particular in Ukraine, deals with the analysis of images only. There is very little information about the use of audio as a container in Ukrainian publications. The authors have analysed modern foreign literature in the field of detecting hidden information in audio files. The classification of stegoanalysis methods, in particular signature, statistical and deep learning based methods, as well as their advantages and disadvantages are considered.</p> Ганна Вадимівна МАРТИНЮК , Ігор Вадимович МАРТИНЮК, Богдан Петрович ПРОЦЕНКО Copyright (c) 2024 https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/20360 Fri, 15 Aug 2025 00:00:00 +0300