Methods and technologies for ensuring cybersecurity of industrial and web-oriented systems and networks

Olga Morozova, Andrii Nicheporuk, Artem Tetskyi, Vitalii Tkachov

Abstract


The subject matter of the article is methods and technologies of ensuring the cybersecurity of industrial and web-oriented systems and networks, training of cybersecurity specialists during the acquisition of professional knowledge. The purpose of the article is to ensure the cybersecurity of industrial and web-oriented systems and networks by developing and implementing appropriate methodologies (concepts, principles, set of models, methods) and technologies in the industry, as well as in training the cybersecurity specialists during the acquisition of professional knowledge. The problem of developing models, methods, and technologies for ensuring the cybersecurity of mobile systems, web-oriented systems based on content management systems, virtual networks that provide their interaction, and a methodology for training cybersecurity specialists are formulated. Based on the analysis the particular tasks of developing convolutional neural network model, information technology methods and models for ensuring the cybersecurity of web-oriented systems and networks, a methodological framework of creating information technology, and a model of digital knowledge platform for use in the field of cybersecurity specialists training and security of industrial systems were formulated. The basic theoretical decisions, which underlie the construction of real industrial and web-oriented systems and networks, were described in the article. The results of work are increased reliability value of detecting the malware in the Android operating system, reduced rates of false positives, provided an allowable value of the success rate of attacks at a minimum cost, reduced time spent on building and rebuilding the structure of the virtual network, increased efficiency of cybersecurity specialists training and security of industrial systems. From the above, it is possible to conclude that the obtained results can be used in a line of existing and prospective approaches at designing difficult, complex, hybrid, technical, cyber-physical systems with a web-oriented interface for users and administrators.

Keywords


cybersecurity; Industry 4.0; web-based systems; computer networks; information technologies; professional education

Full Text:

PDF

References


Bhamare, D., Zolanvari, M., Erbad, A., Jain, R., Khan, K., & Meskin, N. Cybersecurity for industrial control systems: A survey. Computers & security, 2020, vol. 89, article no. 101677. DOI: 10.1016/j.cose.2019.101677.

Thames, L., Schaefer, D. Cybersecurity for industry 4.0. Analysis for Design and Manufacturing. Heidelberg, Springer Publ., 2017. 265 p.

Gansac, V., Udroiu, A. M., Pistol, S. E-learning platform for cybersecurity of scada systems. International Scientific Conference "Strategies XXI". "Carol I" National Defence University, 2020, pp. 346-350.

Huang, A. Teaching, learning, and assessment with virtualization technology. Journal of Educational Technology Systems, 2019, vol. 47, no. 4, pp. 523-538.

Yu, H., Guo, J., Wu, L., Wu, S., Peng, B. Application of Server Virtualization Technology in Power Information Construction. Journal of Physics: Conference Series, 2021, vol. 1744, no. 2, article no. 022008.

Davydova, I. The formation of a practical and theoretical-practical component of the educational process in the context of legal education reform in Ukraine. Dilemas Contemporáneos: Educación, Política y Valores, 2020, vol. 7, iss. 2, pp. 1-25.

Niczeporuk, A., Kalinowska-Ozgowicz, E. Technologia informacyjna do wykrywania wirusów metamorficznych w lokalnych sieciach komputerowych. Wyniki badań interdyscyplinarnych w aspekcie edukacji techniczno-informatycznej i bezpieczeństwa. Politechnika Lubelska, Wydawnictwo Politechniki Lubelskiej, 2020, pp. 34-68.

Kim, S. G. A Study on Open API Security Protocol based on Multi-Channel. Journal of Convergence for Information Technology, 2020, vol. 10, no. 11, pp. 40-46.

Strielkina, A., Uzun, D., Kharchenko, V., Tetskyi, A. Modeling and Availability Assessment of Mobile Healthcare IoT Using Tree Analysis and Queueing Theory. Dependable IoT for Human and Industry: Modeling, Architecting, Implementation. River Publishers, 2018, pp. 105-126.

Khanna, M., Chauhan, N., Sharma, D. K., & Singh, L. K. A Multi-Objective 2- Approach for Test Suite Reduction During Testing of Web Applications: A Search-Based Approach. International Journal of Applied Metaheuristic Computing (IJAMC), 2021, vol. 12, no. 3. pp. 81-122.

Tkachov, V., Budko, A., Hvozdetska, K. and Hrebeniuk, D. Method of Building Dynamic Multi-Hop VPN Chains for Ensuring Security of Terminal Access Systems. IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T), 2020, pp. 613-618.

Lemeshko, O., Yeremenko, O., Yevdokymenko, M., Hailan, A. M. Tensor Multiflow Routing Model to Ensure the Guaranteed Quality of Service Based on Load Balancing in Network. International Conference on Computer Science, Engineering and Education Applications. Springer, Cham, 2020, pp. 120-131.

Meteshkin, К. А. Kiberneticheskaya pedagogika: teoreticheskiye osnovy upravleniya obrazovaniyem na baze integrirovannogo intellekta. [Cybernetic pedagogy: theoretical foundations of educational management based on integrated intelligence]. Kharkiv, International Slavic University Publ., 2004. 400 p.

Tetskyi, A. G., Morozova O. I. Aspekty kiberbezpeky platform dystantsiynoho navchannya. [Cybersecurity aspects of e-learning platforms]. Radioelektronni i komp'uterni sistemi – Radioelectronic and computer systems, 2020, vol. 4(96), pp. 93-97. DOI: 10.32620/reks.2020.4.08.

Slipachuk, L., Toliupa, S., Nakonechnyi, V. The Process of the Critical Infrastructure Cyber Security Management using the Integrated System of the National Cyber Security Sector Management in Ukraine. 3rd International Conference on Advanced Information and Communications Technologies (AICT), 2019, pp. 451-454.

Sharbaf, M. Reengineering Cyber Security Process: A New Perspective on Cyber Security Quality Management. IEEE International Conference on Dependable, Autonomic and Secure Computing, International Conference on Pervasive Intelligence and Computing, International Conference on Cloud and Big Data Computing, International Conference on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), 2019, pp. 332-337.

Hacimahmud, A. V. Structure and Metrics of Emerging Computing. IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET), 2020, pp. 920-925.

Kolisnyk, M. Vulnerability analysis and method of selection of communication protocols for information transfer in internet of things systems. Radioelektronni i komp'uterni sistemi – Radioelectronic and computer systems, 2021, vol. 1(97), pp. 133-149. DOI: 10.32620/reks.2021.1.12.

Kuchuk, G., Kovalenko, A., Komari, I. E., Svyrydov, A., Kharchenko, V. Improving big data centers energy efficiency: Traffic based model and method. Green IT Engineering: Social, Business and Industrial Applications. Springer, Cham, 2019, pp. 161-183.

Kuchuk, G., Kharchenko, V., Kovalenko, A., Ruchkov, E. Approaches to selection of combinatorial algorithm for optimization in network traffic control of safety-critical systems. 2016 IEEE East-West Design & Test Symposium (EWDTS), 2016, pp. 1-6.

Potii, O., Tsyplinskyi, Y., Illiashenko, O., Kharchenko, V. Criticality Assessment of Critical Information Infrastructure Objects: A Category Based Methodology and Ukrainian Experience. International Conference on Multimedia Communications, Services and Security. Springer, Cham, 2020, pp. 78-97.

Dotsenko, S. Intelektualʹni systemy: pryntsypy evrystychnoyi samoorhanizatsiyi [Intellectual systems: a principle of heuristic self-organization]. Radioelektronni i komp'uterni sistemi – Radioelectronic and computer systems, 2020, vol. 1(93), pp. 4-16. DOI: 10.32620/reks.2020.1.01.

Dotsenko, S. Intelektualʹni systemy: pryntsypy evrystychnoyi samoorhanizatsiyi protsesiv smyslovoho myslennya ta smyslovoyi diyalʹnosti [Intellectual systems: principles of heuristic self-organization of the processes of sense thinking and sense activity]. Radioelektronni i komp'uterni sistemi – Radioelectronic and computer systems, 2020, vol. 2(94), pp. 4-22. DOI: 10.32620/reks.2020.2.01.




DOI: https://doi.org/10.32620/reks.2021.4.12

Refbacks

  • There are currently no refbacks.