2024-03-29T13:03:57Z
http://ijet.pl/index.php/ijet/oai
oai:ojs.ijet.ise.pw.edu.pl:article/2907
2021-05-11T08:41:30Z
ijet:SECURITY
"210511 2021 eng "
2300-1933
dc
Development of data-mining technique for seismic vulnerability assessment
Wójcik, Waldemar
Lublin University of Technology http://orcid.org/0000-0002-0843-8053
Karmenova, Markhaba
D. Serikbayev East Kazakhstan
State Technical University
Smailova, Saule
East Kazakhstan State Technical University named after D.Serikbayev
Tlebaldinova, Aizhan
Sarsen Amanzholov East Kazakhstan State University http://orcid.org/0000-0003-1271-0352
Belbeubaev, Alisher
Cukurova University
Assessment of seismic vulnerability of urban
infrastructure is an actual problem, since the damage caused by
earthquakes is quite significant. Despite the complexity of such
tasks, today’s machine learning methods allow the use of “fast”
methods for assessing seismic vulnerability. The article proposes
a methodology for assessing the characteristics of typical urban
objects that affect their seismic resistance; using classification and
clustering methods. For the analysis, we use kmeans and hkmeans
clustering methods, where the Euclidean distance is used as a
measure of proximity. The optimal number of clusters is
determined using the Elbow method. A decision-making model on
the seismic resistance of an urban object is presented, also the
most important variables that have the greatest impact on the
seismic resistance of an urban object are identified. The study
shows that the results of clustering coincide with expert estimates,
and the characteristic of typical urban objects can be determined
as a result of data modeling using clustering algorithms.
Electronics and Telecommunications Committee
2021-05-11 10:41:30
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2021.135974
International Journal of Electronics and Telecommunications; Vol 67, No 2 (2021)
eng
http://ijet.pl/index.php/ijet/article/download/2907/8391
http://ijet.pl/index.php/ijet/article/download/2907/8392
http://ijet.pl/index.php/ijet/article/download/2907/9541
Copyright (c) 2021 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/2511
2020-02-06T15:08:31Z
ijet:SECURITY
"200206 2020 eng "
2300-1933
dc
Cyber(in)security
Szczypiorski, Krzysztof
Politechnika Warszawska
Wydział Elektroniki i Technik Informacyjnych (WEiTI)
Instytut Telekomunikacji
ul. Nowowiejska 15/19
00-665 Warszawa
cybersecurity, cryptology, conversation
The purpose of this article is to present three theses – (1) a cultural one: cyberspace is an advanced technical and cultural creation – it is an embodiment of dreams of numerous creators, inventors and engineers; (2) a technical one: security and cyberspace are inseparable components (hence cybersecu- rity); (3) and a paranoid one: complete security, if achievable, is not a permanent state (hence cyber(in)security). Cyberspace is conceived as a set of digital techniques used to exchange information but also as a new type of social space, partially virtual, which may constitute a being entirely separated from a physical one. A pivotal date for arising of cyberspace may be considered the year 1968 in which routing in the ARPANET network appeared and so did the first programmable logical controller (PLC). For cyberspace this will be the year 1976 – publishing of the key agreement protocol by Witfield Diffie and Martin Hellman. Development of security is correlated with warfare and armament – the military sector has historically made the most significant investments in this area.
Electronics and Telecommunications Committee
2020-02-06 14:57:52
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2020.131870
International Journal of Electronics and Telecommunications; Vol 66, No 1 (2020)
eng
http://ijet.pl/index.php/ijet/article/download/2511/7295
http://ijet.pl/index.php/ijet/article/download/2511/7297
http://ijet.pl/index.php/ijet/article/download/2511/7309
Copyright (c) 2020 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/1134
2017-11-06T11:43:13Z
ijet:SECURITY
"171031 2017 eng "
2300-1933
dc
Towards an Evaluation Model of Trust and Reputation Management Systems
Janiszewski, Marek Bogusław
NASK - Research and Academic Computer Network
Warsaw University of Technology
The paper presents a set of concepts which can establish a basis for the creation of new evaluation model of trust and reputation management systems (TRM). The presented approach takes into account essential characteristics of such systems to provide an assessment of its robustness. The model also specifies measures of effectiveness of trust and reputation systems. There is still a need to create a comprehensive evaluation model of attacks on trust and reputation management systems and evaluation model of TRM systems itself, which could facilitate establishing a framework to deeply evaluate the security of existing TRM systems. We believe that this paper could be perceived as a small step forward towards this goal.
Electronics and Telecommunications Committee
2017-10-31 01:03:37
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.1515-eletel-2017-0058
International Journal of Electronics and Telecommunications; Vol 63, No 4 (2017)
eng
Copyright (c) 2017 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/3811
2023-02-27T00:37:28Z
ijet:SECURITY
"230227 2023 eng "
2300-1933
dc
Adaptive Monitoring of Companies' Information Security
Lakhno, Valerii
National University of Life and Environmental Sciences of Ukraine
Adilzhanova, Saltanat
Al-Farabi Kazakh National University
Ydyryshbayeva, Moldir
Al-Farabi Kazakh National University
Turgynbayeva, Aliza
Al-Farabi Kazakh National University
Kryvoruchko, Olena
Kyiv National University of Trade and Economics
Chubaievskyi, Vitaliy
Kyiv National University of Trade and Economics
Desiatko, Alona
Kyiv National University of Trade and Economics
information security; event processing; event management
Additions were proposed to the method of organizing the information security (IS) event management process of companies. Unlike existing solutions, the algorithm of the "Event handling" subprocess was detailed. This detailing is a complex, which includes the IS event processing substage. In addition, the proposed detailing of the "Event Handling" subprocess allows for covering the entire life cycle of an IS event. The performed research allows in practice to fill in potential gaps in information when creating a company's ISMS. An additional advantage of the proposed solution is the possibility of using this sub-process as an independent one. The proposed approach makes it possible to simplify the procedure for managing the information security of a company as a whole, as well as potentially reduce the costs of its construction for small companies and enterprises. Also, this sub-process can be considered as an independent information security management process, for example, for a company's CIS. The proposed solutions and additions, in contrast to similar studies, are characterized by invariance with respect to the methods of implementing the company's IS infrastructure solutions, and in particular its CIS. This ultimately allows, without changing the methodological tools, to scale this approach and adapt it to the ISMS of various companies.
Electronics and Telecommunications Committee
2023-02-27 01:32:20
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2023.144334
International Journal of Electronics and Telecommunications; Vol 69, No 1 (2023)
eng
http://ijet.pl/index.php/ijet/article/download/3811/11508
http://ijet.pl/index.php/ijet/article/download/3811/11509
http://ijet.pl/index.php/ijet/article/download/3811/11510
http://ijet.pl/index.php/ijet/article/download/3811/11511
http://ijet.pl/index.php/ijet/article/download/3811/12644
Copyright (c) 2023 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/2816
2020-11-22T18:22:53Z
ijet:SECURITY
"201122 2020 eng "
2300-1933
dc
Spectrum Awareness in Cognitive Radio Systems
Suchański, Marek
Military Communication Institute http://orcid.org/0000-0002-2958-3268
Kaniewski, Paweł
Military Communication Institute http://orcid.org/0000-0001-8907-8637
Kustra, Mateusz
Military Communication Institute http://orcid.org/0000-0003-2543-1694
Kosmowski, Krzysztof
Military Communication Institute http://orcid.org/0000-0002-2567-3346
Romanik, Janusz
Military Communication Institute http://orcid.org/0000-0002-6067-423X
Electromagnetic Environment; Radio Environment Map; Situational Awareness
The paper addresses the issue of the Electromagnetic Environment Situational Awareness techniques. The main focus is put on sensing and the Radio Environment Map. These two dynamic techniques are described in detail. The Radio Environment Map is considered the essential part of the spectrum management system. It is described how the density and deployment of sensors affect the quality of maps and it is analysed which methods are the most suitable for map construction. Additionally, the paper characterizes several sensing methods.
Electronics and Telecommunications Committee
2020-11-22 19:06:03
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2020.134025
International Journal of Electronics and Telecommunications; Vol 66, No 4 (2020)
eng
http://ijet.pl/index.php/ijet/article/download/2816/8201
http://ijet.pl/index.php/ijet/article/download/2816/8203
Copyright (c) 2020 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/1430
2018-10-28T22:48:21Z
ijet:SECURITY
"181028 2018 eng "
2300-1933
dc
SHAH: Hash Function based on Irregularly Decimated Chaotic Map
Todorova, Mihaela
Konstantin Preslavsky University of Shumen
Stoyanov, Borislav
Konstantin Preslavsky University of Shumen http://orcid.org/0000-0002-7307-5914
Szczypiorski, Krzysztof
Politechnika Warszawska Wydział Elektroniki i Technik Informacyjnych (WEiTI) Instytut Telekomunikacji ul. Nowowiejska 15/19 00-665 Warszawa
Kordov, Krasimir
Konstantin Preslavsky University of Shumen
hash function; chaotic functions; shrinking decimation rule; Pseudo-random number generator
In this paper, we propose a novel hash function based on irregularly decimated chaotic map. The hash function called SHAH is based on two Tinkerbell maps filtered with irregular decimation rule. Exact study has been provided on the novel scheme using distribution analysis, sensitivity analysis, static analysis of diffusion and confusion, and collision analysis. The experimental data show that SHAH satisfied admirable level of security.
Electronics and Telecommunications Committee
2018-10-28 23:42:47
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-123546
International Journal of Electronics and Telecommunications; Vol 64, No 4 (2018)
eng
http://ijet.pl/index.php/ijet/article/download/1430/4329
Copyright (c) 2018 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/4079
2023-07-31T01:06:51Z
ijet:SECURITY
"230731 2023 eng "
2300-1933
dc
Development of an Information Security System Based on Modeling Distributed Computer Network Vulnerability Indicators of an Informatization Object
Lakhno, Valerii
National University of Life and Environmental Sciences of Ukraine
Alimseitova, Zhuldyz
Satbayev University
Kalaman, Yerbolat
Satbayev University
Kryvoruchko, Olena
Kyiv National University of Trade and Economics
Desyatko, Alona
Kyiv National University of Trade and Economics http://orcid.org/0000-0002-2284-3418
Kaminskyi, Serhii
Kyiv National University of Trade and Economics
A methodology for development for distributed computer network (DCN) information security system (IS) for an informatization object (OBI) was proposed. It was proposed to use mathematical modeling at the first stage of the methodology. In particular, a mathematical model was presented based on the use of the apparatus of probability theory to calculate the vulnerability coefficient. This coefficient allows one to assess the level of information security of the OBI network. Criteria for assessing the acceptable and critical level of risks for information security were proposed as well. At the second stage of the methodology development of the IS DCN system, methods of simulation and virtualization of the components of the IS DCN were used. In the course of experimental studies, a model of a protected DCN has been built. In the experimental model, network devices and DCN IS components were emulated on virtual machines (VMs). The DCN resources were reproduced using the Proxmox VE virtualization system. IPS Suricata was deployed on RCS hosts running PVE. Splunk was used as SIEM. It has been shown that the proposed methodology for the formation of the IS system for DCN and the model of the vulnerability coefficient makes it possible to obtain a quantitative assessment of the levels of vulnerability of DCN OBI.
Electronics and Telecommunications Committee
2023-07-31 02:52:46
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2023.146495
International Journal of Electronics and Telecommunications; Vol 69, No 3 (2023)
eng
http://ijet.pl/index.php/ijet/article/download/4079/12711
Copyright (c) 2023 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/693
2016-11-13T21:49:55Z
ijet:SECURITY
"161113 2016 eng "
2300-1933
dc
Network Steganography in the DNS Protocol
Szczypiorski, Krzysztof
Politechnika Warszawska
Wydział Elektroniki i Technik Informacyjnych (WEiTI)
Instytut Telekomunikacji
ul. Nowowiejska 15/19
00-665 Warszawa
Drzymała, Michał
Urbański, Marek Łukasz
DNS; network steganography; malware
This paper presents possibility of using of the DNS (Domain Name System) protocol for creating a simplex communication channel between a malware-infected computer with a compromised DNS server. The proposed channel can be used to steal data or confidential enterprise information secretly.
Electronics and Telecommunications Committee
2016-11-13 22:42:32
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.1515-eletel-2016-0047
International Journal of Electronics and Telecommunications; Vol 62, No 4 (2016)
eng
Copyright (c) 2016 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/2676
2021-01-31T00:11:06Z
ijet:SECURITY
"210131 2021 eng "
2300-1933
dc
Markov Model of Cyber Attack Life Cycle Triggered by Software Vulnerability
Hoffmann, Romuald
Institute of Computer and Information Systems, Faculty of Cybernetics, Military University of Technology http://orcid.org/0000-0001-5999-1986
Computer Science; Cyber Security; Risk Management
Software vulnerability life cycles illustrate changes in detection processes of software vulnerabilities during using computer systems. Unfortunately, the detection can be made by cyber-adversaries and a discovered software vulnerability may be consequently exploited for their own purpose. The vulnerability may be exploited by cyber-criminals at any time while it is not patched. Cyber-attacks on organizations by exploring vulnerabilities are usually conducted through the processes divided into many stages. These cyber-attack processes in literature are called cyber-attack live cycles or cyber kill chains. The both type of cycles have their research reflection in literature but so far, they have been separately considered and modeled. This work addresses this deficiency by proposing a Markov model which combine a cyber-attack life cycle with an idea of software vulnerability life cycles. For modeling is applied homogeneous continuous time Markov chain theory.
Electronics and Telecommunications Committee
2021-01-31 00:33:21
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2021.135941
International Journal of Electronics and Telecommunications; Vol 67, No 1 (2021)
eng
http://ijet.pl/index.php/ijet/article/download/2676/7776
Copyright (c) 2021 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/2557
2020-09-10T21:07:48Z
ijet:SECURITY
"200907 2020 eng "
2300-1933
dc
Optimization Model of Adaptive Decision Taking Support System for Distributed Systems Cyber Security Facilities Placement
Kalizhanova, Aliya
Al-Farabi Kazakh National University;
Almaty University of Power Engineering and Telecommunications
Akhmetov, Sultan
Institute of Information and Computational Technologies CS MES RK
Lakhno, Valery
National University of Life and Environmental Sciences of Ukraine, Kyiv
Wojcik, Waldemar
Lublin Technical University
Nabiyeva, Gulnaz
Sanzhar Asfendiyarov Kazakh National Medical University
distributed computational network, cyber security, optimization, protection facilities placement, decision taking support system
Abstract— An article herein presents an optimization model, designated for computational core of decision-taking support system (DTSS). DTSS is necessary for system analysis and search of optimal versions for cybersecurity facilities placement and information protection of an enterprise or organization distributed computational network (DCN). DTSS and a model allow automize the analysis of information protection and cybersecurity systems in different versions. It is possible to consider, how separate elements, influence at DCN protection factors and their combinations. Offered model, in distinction from existing, has allowed implementing both the principles of information protection equivalency to a concrete threat and a system complex approach to forming a highly effective protection system for DCN. Hereby we have presented the outcomes of computational experiments on selecting the rational program algorithm of implementing the developed optimization model. It has been offered to use genetic algorithm modification (GAM). Based on the offered model, there has been implemented the module for adaptive DTSS. DTSS module might be applied upon designing protected DCN, based on preset architecture and available sets of information protection and cybersecurity systems in the network.
Electronics and Telecommunications Committee
2020-09-07 19:51:59
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2020.134004
International Journal of Electronics and Telecommunications; Vol 66, No 3 (2020)
eng
http://ijet.pl/index.php/ijet/article/download/2557/7430
http://ijet.pl/index.php/ijet/article/download/2557/8007
http://ijet.pl/index.php/ijet/article/download/2557/8497
Copyright (c) 2020 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/1015
2017-10-31T20:27:24Z
ijet:SECURITY
"171031 2017 eng "
2300-1933
dc
Least Significant Bit Steganography using Hitzl-Zele Chaotic Map
Kordov, Krasimir Mitkov
Konstantin Preslavsky University of Shumen http://orcid.org/0000-0002-4397-8303 http://orcid.org/0000-0002-4397-8303
Stoyanov, Borislav
Konstantin Preslavsky University of Shumen http://orcid.org/0000-0002-7307-5914 http://orcid.org/0000-0002-7307-5914
Steganography; Steganalysis; Chaotic functions; Pseudorandom number generator
We propose a novel least significant bit steganography algorithm based on a Hitzl-Zele chaotic function. Exact study has been provided on the novel scheme using visual inspection, peak signal-to-noise ratio, and histogram analysis. The experimental data show excellent performance of the novel stego technique.
Electronics and Telecommunications Committee
2017-10-31 01:03:37
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.1515-eletel-2017-0061
International Journal of Electronics and Telecommunications; Vol 63, No 4 (2017)
eng
http://ijet.pl/index.php/ijet/article/download/1015/3174
Copyright (c) 2017 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/3784
2023-02-27T00:37:28Z
ijet:SECURITY
"230227 2023 eng "
2300-1933
dc
Hardware Implementation of an Enhanced Securityand Authentication-Related Automotive CAN Bus Prototype
Zniti, Asmae
Faculty of Sciences and Technology (FST), University Sidi Mohamed Ben Abdellah, Signals Systems and Components Laboratory (LSSC), Fez, Morocco.
EL Ouazzani, Nabih
Faculty of Sciences and Technology (FST), University Sidi Mohamed Ben Abdellah, Signals Systems and Components Laboratory (LSSC), Fez, Morocco.
CAN; automotive security; attack; authentication
In this paper a new security technique aiming to ensure safe and reliable communications between different nodes on an automotive Controller Area Network (CAN) is presented. The proposed method relies on a robust authentication code using Blake-3 as a hash algorithm within an adapted structure that includes a monitor node. A prototype is implemented and run effectively to perform hardware simulations of real case-based security problems of automotive embedded CAN systems. As a result, data transfer can take place on a newly enhanced CAN bus according to the standard protocol without being intercepted nor tampered with by unauthorized parties thereby highlighting the effectiveness of the proposed technique.
Electronics and Telecommunications Committee
2023-02-27 01:32:20
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2023.144335
International Journal of Electronics and Telecommunications; Vol 69, No 1 (2023)
eng
http://ijet.pl/index.php/ijet/article/download/3784/11413
http://ijet.pl/index.php/ijet/article/download/3784/11418
Copyright (c) 2023 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/2670
2020-11-22T18:22:53Z
ijet:SECURITY
"201122 2020 eng "
2300-1933
dc
Policies for Transmit Power Control in the Conditions of Jamming in Clustered Wireless System
Michalak, Jarosław Tadeusz
Military University of Technology http://orcid.org/0000-0001-6022-9315
Informatyka Techniczna i Telekomunikacja
This article presents a consistent solution of Transmit Power Control in centralized (clustered) wireless network with and without jamming. Depending on the policy assumed, solutions are applied to minimize the power used in a system or to satisfy expected Quality of Service. Because of specific nature of the system there is no optimal solution which can be applied in practice. Correctness and effectiveness of four proposed Power Control algorithms was presented in the form of computer simulation results in which the system capacity, mean power used and the number of successful links were described.
Electronics and Telecommunications Committee
2020-11-22 19:06:03
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2020.134027
International Journal of Electronics and Telecommunications; Vol 66, No 4 (2020)
eng
http://ijet.pl/index.php/ijet/article/download/2670/7758
Copyright (c) 2020 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/1992
2019-09-06T13:39:56Z
ijet:SECURITY
"190901 2019 eng "
2300-1933
dc
Design Protection Using Logic Encryption and Scan-Chain Obfuscation Techniques
Deepak, V.A.
Department of Electronics and Communications Engineering, Amrita School of Engineering, Coimbatore, Amrita Vishwa Vidyapeetham, India
Priyatharishini, M.
Department of Electronics and Communications Engineering, Amrita School of Engineering, Coimbatore, Amrita Vishwa Vidyapeetham, India
Nirmala Devi, M.
Department of Electronics and Communications Engineering, Amrita School of Engineering, Coimbatore, Amrita Vishwa Vidyapeetham, India
Due to increase in threats posed by offshore foundries, the companies outsourcing IPs are forced to protect their designs from the threats posed by the foundries. Few of the threats are IP piracy, counterfeiting and reverse engineering. To overcome these, logic encryption has been observed to be a leading countermeasure against the threats faced. It introduces extra gates in the design, known as key gates which hide the functionality of the design unless correct keys are fed to them. The scan tests are used by various designs to observe the fault coverage. These scan chains can become vulnerable to side-channel attacks. The potential solution for protection of this vulnerability is obfuscation of the scan output of the scan chain. This involves shuffling the working of the cells in the scan chain when incorrect test key is fed. In this paper, we propose a method to overcome the threats posed to scan design as well as the logic circuit. The efficiency of the secured design is verified on ISCAS’89 circuits and the results prove the security of the proposed method against the threats posed.
Electronics and Telecommunications Committee
2019-09-01 20:17:28
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2019.129790
International Journal of Electronics and Telecommunications; Vol 65, No 3 (2019)
eng
Copyright (c) 2019 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/4213
2023-07-31T01:06:51Z
ijet:SECURITY
"230731 2023 eng "
2300-1933
dc
Email phishing detection with BLSTM and word embeddings
Wolert, Rafał
Warsaw University of Technology,
Faculty of Electronics and Information Technology,
The Institute of Telecommunications
Rawski, Mariusz
Warsaw University of Technology,
Faculty of Electronics and Information Technology,
The Institute of Telecommunications http://orcid.org/0000-0002-7489-0785
The paper presents the email phishing detection method that uses BLSTM as a deep learning model. For feature extraction word embeddings ahs been used. Presented results demonstrate high accuracy and precision.
Electronics and Telecommunications Committee
2023-07-31 02:52:46
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2023.146496
International Journal of Electronics and Telecommunications; Vol 69, No 3 (2023)
eng
http://ijet.pl/index.php/ijet/article/download/4213/13270
Copyright (c) 2023 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/705
2016-11-13T21:49:55Z
ijet:SECURITY
"161113 2016 eng "
2300-1933
dc
StegHash: New Method for Information Hiding in Open Social Network
Szczypiorski, Krzysztof
Politechnika Warszawska
Wydział Elektroniki i Technik Informacyjnych (WEiTI)
Instytut Telekomunikacji
ul. Nowowiejska 15/19
00-665 Warszawa
information hiding; open social networks; hashtag
Abstract— In this paper a new method for information hiding in open social networks is introduced. The method, called StegHash, is based on the use of hashtags in various open social networks to connect multimedia files (like images, movies, songs) with embedded hidden messages. The evaluation of the system was performed on two social media services (Twitter and Instagram) with a simple environment as a proof of concept. The experiments proved that the initial idea was correct, thus the proposed system could create a completely new area of threats in social networks.
Electronics and Telecommunications Committee
2016-11-13 22:42:32
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.1515-eletel-2016-0048
International Journal of Electronics and Telecommunications; Vol 62, No 4 (2016)
eng
http://ijet.pl/index.php/ijet/article/download/705/2347
Copyright (c) 2016 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/2752
2021-05-11T08:41:30Z
ijet:SECURITY
"210511 2021 eng "
2300-1933
dc
Optimal Ensemble Learning Based on Distinctive Feature Selection by Univariate ANOVA-F Statistics for IDS
Shakeela, Shaikh
Koneru Lakshmaiah Education Foundation, Vaddeswaram, AP http://orcid.org/0000-0002-4463-588X
Sai Shankar, Nandigama
Koneru Lakshmaiah Education Foundation, Vaddeswaram, AP http://orcid.org/0000-0001-6114-2182
Mohan Reddy, P
Koneru Lakshmaiah Education Foundation, Vaddeswaram, AP
Kavya Tulasi, T
Koneru Lakshmaiah Education Foundation, Vaddeswaram, AP http://orcid.org/0000-0002-3164-6897
Mahesh Sai, M
Koneru Lakshmaiah Education Foundation, Vaddeswaram, AP
Network; security; Communication
Cyber-attacks are increasing day by day. The generation of data by the population of the world is immensely escalated. The advancements in technology, are intern leading to more chances of vulnerabilities to individual’s personal data. Across the world it became a very big challenge to bring down the threats to data security. These threats are not only targeting the user data and also destroying the whole network infrastructure in the local or global level, the attacks could be hardware or software. Central objective of this paper is to design an intrusion detection system using ensemble learning specifically Decision Trees with distinctive feature selection univariate ANOVA-F test. Decision Trees has been the most popular among ensemble learning methods and it also outperforms among the other classification algorithm in various aspects. With the essence of different feature selection techniques, the performance found to be increased more, and the detection outcome will be less prone to false classification. Analysis of Variance (ANOVA) with F-statistics computations could be a reasonable criterion to choose distinctives features in the given network traffic data. The mentioned technique is applied and tested on NSL KDD network dataset. Various performance measures like accuracy, precision, F-score and Cross Validation curve have drawn to justify the ability of the method.
Electronics and Telecommunications Committee
2021-05-11 10:41:30
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2021.135975
International Journal of Electronics and Telecommunications; Vol 67, No 2 (2021)
eng
http://ijet.pl/index.php/ijet/article/download/2752/8048
http://ijet.pl/index.php/ijet/article/download/2752/8053
Copyright (c) 2021 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/2599
2020-06-01T14:11:57Z
ijet:SECURITY
"200601 2020 eng "
2300-1933
dc
Towards Building National Cybersecurity Awareness
Amanowicz, Marek
NASK-PIB
information technology; security;
The paper depicts a complex, distributed information system aimed at promoting cybersecurity awareness at the national level. The system, that is built in accordance with the Act on National Cybersecurity, passed by the Polish Parliament, enables collecting and processing in near-real time available information on the security status of essential services and digital services and, also, provides for assessment of negative impact of the identified threats concerned with the provision of those services. Advanced access control and dissemination mechanisms, for secure information sharing within the system, are provided in order to aggregate distributed knowledge and use this information for on-line security risk analysis and for generation and distribution of early warnings.
Electronics and Telecommunications Committee
2020-06-01 16:06:47
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2020.131881
International Journal of Electronics and Telecommunications; Vol 66, No 2 (2020)
eng
http://ijet.pl/index.php/ijet/article/download/2599/7578
http://ijet.pl/index.php/ijet/article/download/2599/7579
Copyright (c) 2020 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/1142
2018-04-27T08:36:48Z
ijet:SECURITY
"180427 2018 eng "
2300-1933
dc
EFFICIENCY EVALUATING METHOD FOR THE DEVICES WITH INFRASOUND IMPACT ON THE COMPUTER EQUIPMENT FUNCTIONING
Korchenko, Alexander
National Aviation University
Tereykovcky, Igor
Technical University of Ukraine, Igor Sikorsky Kyiv Polytechnic Institute
Aytkhozhaevа, Evgenia
Seilova, Nurgul
Kosyuk, Yevgeny
Wójcik, Waldemar
Komada, Paweł
Sikora, Jan
Computer science; Information security
A significant threat to critical infrastructure of computer systems has a destructive impact caused by infrasound waves. It is shown that the known infrasound generations are based on using the following devices: a Helmholtz Resonator, Generation by using a Pulsating Sphere such as Monopolies, Rotor-type Radiator, Resonating Cylinder, VLF Speaker, Method of Paired Ultrasound Radiator, and airscrew. Research of these devices was made in this paper by revealing their characteristics, main advantages and disadvantages. A directional pattern of infrasound radiation and a graph of dependence of infrasound radiation from the consumed power was constructed. Also, during the analysis of these devices, there was proven a set of basic parameters, the values of which make it possible to characterize their structural and operational characteristics. Then approximate values of the proposed parameters of each those considered devices, were calculated. A new method was developed for evaluating the effectiveness of infrasound generation devices based on the definition of the integral efficiency index, which is calculated using the designed parameters. An example of practical application of the derived method, was shown. The use of the method makes it possible, taking into account the conditions and requirements of the infrasound generation devices construction, to choose from them the most efficient one.
Electronics and Telecommunications Committee
2018-04-27 10:31:49
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-119369
International Journal of Electronics and Telecommunications; Vol 64, No 2 (2018)
eng
http://ijet.pl/index.php/ijet/article/download/1142/3496
http://ijet.pl/index.php/ijet/article/download/1142/3497
http://ijet.pl/index.php/ijet/article/download/1142/3498
http://ijet.pl/index.php/ijet/article/download/1142/3499
http://ijet.pl/index.php/ijet/article/download/1142/3500
http://ijet.pl/index.php/ijet/article/download/1142/3501
http://ijet.pl/index.php/ijet/article/download/1142/3502
http://ijet.pl/index.php/ijet/article/download/1142/3503
http://ijet.pl/index.php/ijet/article/download/1142/3504
http://ijet.pl/index.php/ijet/article/download/1142/3577
Copyright (c) 2018 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/3550
2022-11-30T22:59:34Z
ijet:SECURITY
"221130 2022 eng "
2300-1933
dc
Lightweight PUF-Based Gate Replacement Technique to Reduce Leakage of Information through Power Profile Analysis
Mohankumar, N
Department of Electronics and Communication Engineering, Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Amritanagar, Coimbatore, Tamil Nadu - 641112, India https://www.amrita.edu/faculty/n-mohankumar http://orcid.org/0000-0002-0704-7632
Jayakumar, M
Department of
Electronics and Communication Engineering, Amrita School of Engineering,
Coimbatore, Amrita Vishwa Vidyapeetham, India https://amrita.edu/faculty/m-jayakumar/
Nirmala, Devi M
Department of
Electronics and Communication Engineering, Amrita School of Engineering,
Coimbatore, Amrita Vishwa Vidyapeetham, India https://amrita.edu/faculty/m-nirmala/
Design for Security, Hardware Security; PUF; TRNG; Wave Dynamic Differential Logic.
The major challenge faced by electronic device designers is to defend the system from attackers and malicious modules called Hardware Trojans and to deliver a secured design. Although there are many cryptographic preventive measures in place adversaries find different ways to attack the device. Differential Power Analysis (DPA) attack is a type of Side Channel Attacks, used by an attacker to analyze the power leakage in the circuit, through which the functionality of the circuit is extracted. To overcome this, a lightweight approach is proposed in this paper using, Wave Dynamic Differential Logic (WDDL) technique, without incurring any additional resource cost and power. The primary objective of WDDL is to make the power consumption constant of an entire circuit by restricting the leakage power. The alternate strategy used by an adversary is to leak the information through reverse engineering. The proposed work avoids this by using a bit sequencer and a modified butterfly PUF based randomizing architecture. A modified version of butterfly PUF is also proposed in this paper, and from various qualitative tests performed it is evident that this PUF can prevent information leakage. This work is validated on ISCAS 85, ISCAS 89 benchmark circuits and the results obtained indicate that the difference in leakage power is found to be very marginal.
Electronics and Telecommunications Committee
2022-11-30 23:52:27
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2022.143881
International Journal of Electronics and Telecommunications; Vol 68, No 4 (2022)
eng
http://ijet.pl/index.php/ijet/article/download/3550/10704
http://ijet.pl/index.php/ijet/article/download/3550/12271
http://ijet.pl/index.php/ijet/article/download/3550/12272
Copyright (c) 2022 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/2673
2020-11-22T18:22:53Z
ijet:SECURITY
"201122 2020 eng "
2300-1933
dc
Cryptographic protection for military radio communications
Białas, Robert
Military Communication Institute
Grzonkowski, Marcin
Military Communication Institute
Wicik, Robert
Military Communication Institute
telecommunication; radio communication; cryptography
Protecting the confidentiality, integrity and availability of information is very important in any telecommunications system. Information protection requires use of necessary physical, personal, information and communication technologies and above all – electromagnetic and cryptographic security measures. Equipment and tools for cryptographic protection should be examined and assessed in terms of resistance to known threats. Additional requirements are put on information protection for radio communication, especially military, where radio transmission is characterized by uncertainty of establishing and maintaining connections, bit rates are relatively low, often without full duplex. All this has an impact on the methods of cryptographic synchronization and implementation of cryptographic functions. A different approach to information protection is required by classic narrowband radio communications, a different one in time-division multi-access modes, and another one in broadband packet data transmission. Systems designed for information protection in radio communications implement appropriate operating modes of operation for cryptographic algorithms and protocols. Latest threats from quantum computers pose new challenges, especially in systems using public-key cryptography, because there are algorithms that can be used to attack these schemes with polynomial complexity.
Electronics and Telecommunications Committee
2020-11-22 19:06:03
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2020.134028
International Journal of Electronics and Telecommunications; Vol 66, No 4 (2020)
eng
http://ijet.pl/index.php/ijet/article/download/2673/8185
http://ijet.pl/index.php/ijet/article/download/2673/8186
Copyright (c) 2020 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/1965
2019-09-01T21:32:26Z
ijet:SECURITY
"190901 2019 eng "
2300-1933
dc
A New Trust Framework for E-Government in Cloud of Things
Al-Rousan, Thamer
Isra University
Abualese, Hasan
AL-SHARGABI, Bassam
Computer
The concept of Cloud of Things becomes important for each e-government, facilitating its way of work, increasing its productivity and all that leading to cost savings. It will likely have a significant impact on the e-governments in the future. E-government diversity goals face many challenges. Trust is a major challenge when deploying Cloud of Things in e-government. In this paper, a new trust framework is proposed that supports trust between Internet of Things devices interconnected to the Cloud in order to support e-government services to be delivered in trusted manner. The proposed framework has been applied to a use case study to ensure the trustworthiness of the proposed framework in a real mission. The results show that the proposed trust framework is useful to ensuring a trust environment for Cloud of Things in order to continue providing and gathering data needed to provide services to users through the E-government services.
Electronics and Telecommunications Committee
2019-09-01 20:17:28
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2019.129791
International Journal of Electronics and Telecommunications; Vol 65, No 3 (2019)
eng
Copyright (c) 2019 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/4318
2023-11-10T18:57:48Z
ijet:SECURITY
"231028 2023 eng "
2300-1933
dc
Improving the Efficiency of UAV Communication Channels in the Context of Electronic Warfare
Semendiai, Serhii
Chernihiv Polytechnic National University
Tkach, Yuliіa
Chernihiv Polytechnic National University
Shelest, Mykhailo
Chernihiv Polytechnic National University
Korchenko, Oleksandr
National Aviation University
Ziubina, Ruslana
University of Bielsko-Biala
Veselska, Olga
University of Bielsko-Biala
cognitive radio; software-defined radio; neural networks; coding; electronic warfare; communication channel; wireless communications; spectrum analysis
The article is devoted to the development of a method for increasing the efficiency of communication channels of unmanned aerial vehicles (UAVs) in the conditions of electronic warfare (EW). The author analyses the threats that may be caused by the use of electronic warfare against autonomous UAVs. A review of some technologies that can be used to create original algorithms for countering electronic warfare and increasing the autonomy of UAVs on the battlefield is carried out. The structure of modern digital communication systems is considered. The requirements of unmanned aerial vehicle manufacturers for onboard electronic equipment are analyzed, and the choice of the hardware platform of the target radio system is justified. The main idea and novelty of the proposed method are highlighted. The creation of a model of a cognitive radio channel for UAVs is considered step by step. The main steps of modeling the spectral activity of electronic warfare equipment are proposed. The main criteria for choosing a free spectral range are determined. The type of neural network for use in the target cognitive radio system is substantiated. The idea of applying adaptive coding in UAV communication channels using multicomponent turbo codes in combination with neural networks, which are simultaneously used for cognitive radio, has been further developed.
Electronics and Telecommunications Committee
2023-10-28 11:07:13
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2023.147694
International Journal of Electronics and Telecommunications; Vol 69, No 4 (2023)
eng
http://ijet.pl/index.php/ijet/article/download/4318/13562
http://ijet.pl/index.php/ijet/article/download/4318/13563
http://ijet.pl/index.php/ijet/article/download/4318/13564
Copyright (c) 2023 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/798
2018-04-29T19:24:17Z
ijet:SECURITY
"170418 2017 eng "
2300-1933
dc
Yet Another Pseudorandom Number Generator
Stoyanov, Borislav
Konstantin Preslavsky University of Shumen
Szczypiorski, Krzysztof
Politechnika Warszawska
Wydział Elektroniki i Technik Informacyjnych (WEiTI)
Instytut Telekomunikacji
ul. Nowowiejska 15/19
00-665 Warszawa
Kordov, Krasimir
Konstantin Preslavsky University of Shumen
Roessler attractor; bent Boolean function; pseudorandom number generator
We propose a novel pseudorandom number generator based on Roessler attractor and bent Boolean function. We estimated the output bits properties by number of statistical tests. The results of the cryptanalysis show that the new pseudorandom number generation scheme provides a high level of data security.
Electronics and Telecommunications Committee
2017-04-18 16:24:06
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.1515-eletel-2017-0026
International Journal of Electronics and Telecommunications; Vol 63, No 2 (2017)
eng
http://ijet.pl/index.php/ijet/article/download/798/2650
Copyright (c) 2017 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/3296
2022-03-29T00:53:03Z
ijet:SECURITY
"220226 2022 eng "
2300-1933
dc
Light Weight Clustered Trust Sensing Mechanism for Internet of Things Network
Madepogu, Rajendra Prasad
Vidya Jyothi Institute of Technology http://www.vjit.ac.in
Desireddy, Krishna Reddy
Chaitanya Bharathi Institute of
Technology http://www.cbit.ac.in
Internet of Things; Trust Sensing; Clustering; Mobility; Packet Forwarding factor; Malicious Detection Rate; Packet Delivery Ratio
Internet of Things (IoT) is the new research paradigm which has gained a great significance due to its widespread applicability in diverse fields. Due to the open nature of communication and control, the IoT network is more susceptible to several security threats. Hence the IoT network requires a trust aware mechanism which can identify and isolate the malicious nodes. Trust Sensing has been playing a significant role in dealing with security issue in IoT. A novel a Light Weight Clustered Trust Sensing (LWCTS) model is developed which ensures a secured and qualitative data transmission in the IoT network. Simulation experiments are conducted over the proposed model and the performance is compared with existing models. The obtained results prove the effectiveness when compared with existing approaches.
Electronics and Telecommunications Committee
2022-02-26 15:37:11
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2022.139841
International Journal of Electronics and Telecommunications; Vol 68, No 1 (2022)
eng
http://ijet.pl/index.php/ijet/article/download/3296/10342
http://ijet.pl/index.php/ijet/article/download/3296/10974
http://ijet.pl/index.php/ijet/article/download/3296/10976
Copyright (c) 2022 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/2597
2020-11-30T08:57:48Z
ijet:SECURITY
"201122 2020 eng "
2300-1933
dc
ARPNetSteg: Network Steganography using Address Resolution Protocol
Bedi, Punam
Department of Computer Science, University of Delhi http://people.du.ac.in/~pbedi/
Dua, Arti
Department of Computer Science, Bhaskaracharya College of Applied Sciences, University of Delhi
Network Steganography; ARP Steganography; Covert Channel; Address Resolution Protocol; Protocol Steganography.
Steganography is a technique that allows hidden transfer of data using some media such as Image, Audio, Video, Network Protocol or a Document, without its existence getting noticed. Over the past few years, a lot of research has been done in the field of Image, Video and Audio Steganography but very little work has been done in Network Steganography. A Network Steganography technique hides data in a Network Data Unit, i.e., a Network Protocol Packet. In this paper we present an algorithm ARPNetSteg that implements Network Steganography using the Address resolution protocol. Our technique is a robust technique that can transfer 44 bits of covert data per ARP reply packet.
Electronics and Telecommunications Committee
2020-11-22 19:06:03
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2020.134026
International Journal of Electronics and Telecommunications; Vol 66, No 4 (2020)
eng
http://ijet.pl/index.php/ijet/article/download/2597/7569
http://ijet.pl/index.php/ijet/article/download/2597/7570
http://ijet.pl/index.php/ijet/article/download/2597/7883
http://ijet.pl/index.php/ijet/article/download/2597/7884
http://ijet.pl/index.php/ijet/article/download/2597/7899
Copyright (c) 2020 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/1257
2018-04-27T08:36:48Z
ijet:SECURITY
"180427 2018 eng "
2300-1933
dc
Context data acquisition using adaptive non-repudiation model
Tunia, Marcin Alan
The subject of this study is the non-repudiation security service for network communication using TCP/IP stack. Generated evidence, as well as decision-making process of registering a given event, are context-aware. Non-repudiation is equipped with context-awareness by using widely utilized network tools. The aim of this paper is to present timing results for selected tools execution and to complete the evidence generation time. In some applications it is crucial to gather evidence data as fast as possible because of the rapidly changing network environment. For such situations, in case of prolonged execution time, an output from a tool might imprecisely describe the contextual situation from the time of the occurrence of an event.
Electronics and Telecommunications Committee
2018-04-27 10:31:49
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-119370
International Journal of Electronics and Telecommunications; Vol 64, No 2 (2018)
eng
Copyright (c) 2018 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/4054
2023-05-18T20:31:22Z
ijet:SECURITY
"230518 2023 eng "
2300-1933
dc
An IEEE 802.11 MAC Layer Covert Channel Based On Supported Rates
Teca, Geovani
AGH University of Science and Technology
Natkaniec, Marek
AGH University of Science and Technology
information and communication technology
Wireless Local Area Networks present several vulnerabilities that are exploited, and as a result, numerous attacks have been developed and used against them. Although countermeasures to detect and eliminate such threats have been created throughout the years, few methods exist to prevent the attacks. IEEE 802.11 covert channels could be considered a candidate to prevent Wi-Fi attacks since they allow secret communication between the client station and the access point without establishing an association. They can be implemented in frames that attackers do not target. This paper presents a new covert channel that prevents Wi-Fi attacks. We also describe metrics, and discuss the performance results of the proposed solution. We show that the new protocol is able to achieve high efficiency of operation.
Electronics and Telecommunications Committee
2023-05-18 22:17:30
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2023.144364
International Journal of Electronics and Telecommunications; Vol 69, No 2 (2023)
eng
http://ijet.pl/index.php/ijet/article/download/4054/12653
http://ijet.pl/index.php/ijet/article/download/4054/12654
http://ijet.pl/index.php/ijet/article/download/4054/12655
Copyright (c) 2023 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/561
2016-09-08T11:39:19Z
ijet:SECURITY
"160908 2016 eng "
2300-1933
dc
On Efficiency of Selected Machine Learning Algorithms for Intrusion Detection in Software Defined Networks
Jankowski, Damian
Institute of Telecommunication, Faculty of Electronics, Military University of Technology
Amanowicz, Marek
Institute of Telecommunication, Faculty of Electronics, Military University of Technology
IT Security; Intrusion Detection System; Software Defined Network
We propose a concept of using Software Defined Network (SDN) technology and machine learning algorithms for monitoring and detection of malicious activities in the SDN data plane. The statistics and features of network traffic are generated by the native mechanisms of SDN technology. In order to conduct tests and a verification of the concept, it was necessary to obtain a set of network workload test data. We present virtual environment which enables generation of the SDN network traffic. The article examines the efficiency of selected machine learning methods: Self Organizing Maps and Learning Vector Quantization and their enhanced versions. The results are compared with other SDN-based IDS.
Electronics and Telecommunications Committee
2016-09-08 13:20:11
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.1515-eletel-2016-0033
International Journal of Electronics and Telecommunications; Vol 62, No 3 (2016)
eng
http://ijet.pl/index.php/ijet/article/download/561/1863
http://ijet.pl/index.php/ijet/article/download/561/1864
Copyright (c) 2016 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/2725
2021-01-31T00:11:06Z
ijet:SECURITY
"210131 2021 eng "
2300-1933
dc
Mobility of radars on the today’s battlefield
Czeszejko, Stanislaw
General Command Polish Armed Forces
Radar
Abstract—In this article the author makes an attempt
to characterize the main factor – mobility – which is to be taken into consideration while designing the ground radar component (passive and active radars) of the Air Defense systems in order to enable them to operate on the contemporary battlefield. He presents the latest theoretical views on the relationship between the usage of anti-radiation missiles and the mobility of the passive and active radars as the key ability to protect them against such weapons. In particular the author emphasizes that the anti-radiation missiles present nowadays the biggest threat for the effective Air Defense systems, which are today characterized by
a high complexity degree. He also stresses the need to combine
the radars, both passive and active, into one system allowing for the streamlining of their work parameters and thus ensuring their complex usage. The gaining of those capabilities shall guarantee that the parameters of the air surveillance radar area can be defined effectively.
Electronics and Telecommunications Committee
2021-01-31 00:33:21
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2021.135942
International Journal of Electronics and Telecommunications; Vol 67, No 1 (2021)
eng
Copyright (c) 2021 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/2303
2019-10-21T18:07:30Z
ijet:SECURITY
"191007 2019 eng "
2300-1933
dc
Network Topology Mutation as Moving Target Defense for Corporate Networks
Rawski, Mariusz
Warsaw University of Technology,
Faculty of Electronics and Information Technology,
The Institute of Telecommunications http://orcid.org/0000-0002-7489-0785
The paper introduces a topology mutation – the novel concept in Moving Target Defense (MTD). MTD is a new technique that represents a significant shift in cyber defense. Traditional cybersecurity techniques have primarily focused on the passive defense of static networks only. In MTD approach cyber attackers are confused by making the attack surface dynamic, and thus harder to probe and infiltrate. The emergence of Network Functions Virtualization (NFV) and Software-Defined Networking (SDN) technology has opened up new possibilities in network architecture management. The application of combined NFV and SDN technologies provides a unique platform for implementing MTD techniques for securing the network infrastructure by morphing the logical view of the network topology.
Electronics and Telecommunications Committee
2019-10-07 19:16:57
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2019.129814
International Journal of Electronics and Telecommunications; Vol 65, No 4 (2019)
eng
http://ijet.pl/index.php/ijet/article/download/2303/6562
Copyright (c) 2019 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/4455
2024-03-18T16:07:31Z
ijet:SECURITY
"240318 2024 eng "
2300-1933
dc
Multi-fragmental and Multi-phase Availability Models of the Safety-critical I&C Systems with Two-cascade Redundancy
Kharchenko, Vyacheslav
National Aerospace University “Kharkiv Aviation Institute” http://orcid.org/0000-0001-5352-077X
Ponochovnyi, Yuriy
Poltava State Agrarian University http://orcid.org/0000-0002-6856-2013
Babeshko, Ievgen
National Aerospace University “Kharkiv Aviation Institute”
and
the Istituto di Scienza e Tecnologie dell’Informazione Alessandro Faedo-CNR http://orcid.org/0000-0002-4667-2393
safety; availability; reliability; I&C modeling; multi-fragmental models; multi-phase models
Traditional availability, reliability, and safety models face the dimension problem due to a huge number of components in modern systems, motivating further research in this field. This paper focuses on multi-fragmental and multiphase models for availability and functional safety assessment of the information and control (I&C) systems with two-cascade redundancy considering design faults manifestation during operation. The methodology of the research is based on Markov and semi-Markov chains with the utilization of multi-phase modeling. Several multi-phase models are developed and investigated considering different conditions of operation and failures caused by version faults. The case study of the research is based on the analysis of safety-critical nuclear power plant I&C systems such as the reactor trip systems developed using the programmable platform RadICS.
Electronics and Telecommunications Committee
2024-03-18 16:48:23
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2024.149533
International Journal of Electronics and Telecommunications; Vol 70, No 1 (2024)
eng
http://ijet.pl/index.php/ijet/article/download/4455/14136
http://ijet.pl/index.php/ijet/article/download/4455/14138
Copyright (c) 2024 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/937
2017-08-14T21:46:22Z
ijet:SECURITY
"170814 2017 eng "
2300-1933
dc
Trust and risk assessment model of popular software based on known vulnerabilities
Janiszewski, Marek Bogusław
Warsaw University of Technology
NASK - Research and Academic Computer Network
Felkner, Anna
NASK - Research and Academic Computer Network
Olszak, Jakub
NASK - Research and Academic Computer Network
Information Technology; Telecommunication; IT Security
This paper presents a new concept of an approach to risk assessment which can be done on the basis of publicly available information about vulnerabilities. The presented approach uses also the notion of trust and implements many concepts used in so called trust and reputation management systems (which are widely used in WSN, MANET or P2P networks, but also in e-commerce platforms). The article shows first outcomes obtained from the presented model. The outcomes demonstrate that the model can be implemented in real system to make software management more quantified and objective process, which can have real and beneficial impact on institutional security. In article, however the emphasis was set not on the model itself (which can be easily changed) but on the possibility of finding useful information about vulnerabilities.
Electronics and Telecommunications Committee
2017-08-14 23:38:28
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.1515-eletel-2017-0044
International Journal of Electronics and Telecommunications; Vol 63, No 3 (2017)
eng
Copyright (c) 2017 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/3600
2022-08-27T21:26:15Z
ijet:SECURITY
"220827 2022 eng "
2300-1933
dc
Automation of Information Security Risk Assessment
Akhmetov, Berik
Yessenov University
Lakhno, Valerii
National University of Life and Environmental Sciences of Ukraine
Chubaievskyi, Vitaliy
Kyiv National University of Trade and Economics
Kaminskyi, Serhii
Kyiv National University of Trade and Economics
Adilzhanova, Saltanat
Al-Farabi Kazakh National University
Ydyryshbayeva, Moldir
Al-Farabi Kazakh National University
information security; audit; Bayesian network; artificial neural networks
An information security audit method (ISA) for a distributed computer network (DCN) of an informatization object (OBI) has been developed. Proposed method is based on the ISA procedures automation by using Bayesian networks (BN) and artificial neural networks (ANN) to assess the risks. It was shown that such a combination of BN and ANN makes it possible to quickly determine the actual risks for OBI information security (IS). At the same time, data from sensors of various hardware and software information security means (ISM) in the OBI DCS segments are used as the initial information. It was shown that the automation of ISA procedures based on the use of BN and ANN allows the DCN IS administrator to respond dynamically to threats in a real time manner, to promptly select effective countermeasures to protect the DCS
Electronics and Telecommunications Committee
2022-08-27 23:16:21
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2022.141273
International Journal of Electronics and Telecommunications; Vol 68, No 3 (2022)
eng
http://ijet.pl/index.php/ijet/article/download/3600/10854
http://ijet.pl/index.php/ijet/article/download/3600/10855
Copyright (c) 2022 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/2556
2020-09-10T21:07:49Z
ijet:SECURITY
"200907 2020 eng "
2300-1933
dc
Security assessment methodology for isolated systems of a certain class
Wiechecki, Daniel
Military University of Technology
This paper introduces security assessment methodology for isolated single-workstation multilayer systems processing sensitive or classified data according with a corresponding security model for such system. The document provides a high-level tool for systematizing certain-class-systems security models development. The models based on the introduced methodology cover data confidentiality and availability attributes protection on a sufficient level.
Electronics and Telecommunications Committee
2020-09-07 19:51:59
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2020.134005
International Journal of Electronics and Telecommunications; Vol 66, No 3 (2020)
eng
http://ijet.pl/index.php/ijet/article/download/2556/7427
http://ijet.pl/index.php/ijet/article/download/2556/7428
Copyright (c) 2020 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/1355
2018-10-28T22:48:21Z
ijet:SECURITY
"181028 2018 eng "
2300-1933
dc
Modeling of the decision-making procedure for financing of cyber security means of cloud services by the medium of a bilinear multistep quality game with several terminal surfaces
Lakhno, Valery
European University
Akhmetov, Berik
Caspian State University of Technologies
and Engineering named after Sh. Yessenov
Malyukov, Volodimir
European University
Kartbayev, Timur Saatdinovich
Almaty University of Power Engineering and Telecommunication https://orcid.org/0000-0003-1711-8251
cloud infrastructures; cyber security; multistep quality game; optimum financing strategy; risks; decision-making support system
The model is developed for the intellectualized
decision-making support system on financing of cyber security
means of transport cloud-based computing infrastructures, given
the limited financial resources. The model is based on the use of
the theory of multistep games tools. The decision, which gives
specialists a chance to effectively assess risks in the financing
processes of cyber security means, is found. The model differs
from the existing approaches in the decision of bilinear multistep
quality games with several terminal surfaces. The decision of
bilinear multistep quality games with dependent movements is
found. On the basis of the decision for a one-step game, founded
by application of the domination method and developed for
infinite antagonistic games, the conclusion about risks for players
is drawn. The results of a simulation experiment within program
implementation of the intellectualized decision-making support
system in the field of financing of cyber security means of cloudbased
computing infrastructures on transport are described. Confirmed
during the simulation experiment, the decision assumes
accounting a financial component of cyber defense strategy at
any ratios of the parameters, describing financing process.
Electronics and Telecommunications Committee
2018-10-28 23:42:47
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-123547
International Journal of Electronics and Telecommunications; Vol 64, No 4 (2018)
eng
http://ijet.pl/index.php/ijet/article/download/1355/4175
Copyright (c) 2018 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/4048
2023-05-18T20:31:22Z
ijet:SECURITY
"230518 2023 eng "
2300-1933
dc
Decision-Making Supporting Models Concerning the Internal Security of the State
Kovalchuk, Olha
West Ukrainian National University http://orcid.org/0000-0001-6490-9633
Kasianchuk, Mykhailo
West Ukrainian National University http://orcid.org/0000-0002-4469-8055
Karpinski, Mikolaj
University of Bielsko-Biala http://orcid.org/0000-0002-8846-332X
Shevchuk, Ruslan
University of Bielsko-Biala and West Ukrainian National University http://orcid.org/0000-0001-5381-9528
In the digital society, states’ information security has become one of the key elements of ensuring the competitiveness and sustainable development of the state, guaranteeing its integrity and security in general. An important component of state security is the internal security of the state, which must ensure the personal and public safety of its citizens. Modern Ukraine is building a new system of criminal justice, which requires a new information system for risk assessment and support for optimal decision-making. Today, applied research and the development of information and analytical software for the internal security of the state have acquired a special meaning.
In the paper, there is built a set of models for providing operational information for decision-making in criminal justice. This is a cluster model for creating criminal profiles of convicts, and a scoring model for identifying individual characteristics of criminals that have the greatest impact on their propensity to re-offend. The obtained models can provide reliable support for decision-making in the field of criminal justice and become part of the information support system for the internal security of Ukraine in general.
Electronics and Telecommunications Committee
2023-05-18 22:17:30
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2023.144365
International Journal of Electronics and Telecommunications; Vol 69, No 2 (2023)
eng
http://ijet.pl/index.php/ijet/article/download/4048/12913
http://ijet.pl/index.php/ijet/article/download/4048/12914
Copyright (c) 2023 International Journal of Electronics and Telecommunications
oai:ojs.ijet.ise.pw.edu.pl:article/676
2016-11-13T21:49:55Z
ijet:SECURITY
"161113 2016 eng "
2300-1933
dc
MoveSteg: A Method of Network Steganography Detection
Szczypiorski, Krzysztof
Politechnika Warszawska
Wydział Elektroniki i Technik Informacyjnych (WEiTI)
Instytut Telekomunikacji
ul. Nowowiejska 15/19
00-665 Warszawa
Tyl, Tomasz
Politechnika Warszawska
Wydział Elektroniki i Technik Informacyjnych (WEiTI)
Instytut Telekomunikacji
ul. Nowowiejska 15/19
00-665 Warszawa
network steganography; information; hiding network; detection of new attacks
This article presents a new method for detecting a source point of time based network steganography - MoveSteg. A steganography carrier could be an example of multimedia stream made with packets. These packets are then delayed intentionally to send hidden information using time based steganography methods. The presented analysis describes a method that allows finding the source of steganography stream in network that is managed by us.
Electronics and Telecommunications Committee
2016-11-13 22:42:32
application/pdf
http://ijet.pl/index.php/ijet/article/view/10.1515-eletel-2016-0046
International Journal of Electronics and Telecommunications; Vol 62, No 4 (2016)
eng
http://ijet.pl/index.php/ijet/article/download/676/2244
Copyright (c) 2016 International Journal of Electronics and Telecommunications