IDEAS home Printed from https://ideas.repec.org/b/baq/pcbook/978-617-7319-57-2.redif.html
   My bibliography  Save this book

Modeling of security systems for critical infrastructure facilities

Author

Listed:
  • Serhii Yevseiev

    (National Technical University “Kharkiv Polytechnic Institute”)

  • Ruslan Hryshchuk

    (Sergei Korolyov Zhytomyr Military Institute)

  • Kateryna Molodetska

    (Polissia National University)

  • Mariia Nazarkevych

    (Lviv Polytechnic National University)

  • Volodymyr Hrytsyk

    (Lviv Polytechnic National University)

  • Oleksandr Milov

    (National Technical University “Kharkiv Polytechnic Institute”)

  • Olha Korol

    (National Technical University “Kharkiv Polytechnic Institute”)

  • Stanislav Milevskyi

    (National Technical University “Kharkiv Polytechnic Institute”)

  • Roman Korolev

    (National Technical University “Kharkiv Polytechnic Institute”)

  • Serhii Pohasii

    (National Technical University “Kharkiv Polytechnic Institute”)

  • Andrii Tkachov

    (National Technical University “Kharkiv Polytechnic Institute”)

  • Yevgen Melenti

    (Yaroslav Mudryi National Law University)

  • Oleksandr Lavrut

    (Hetman Petro Sahaidachnyi National Army Academy)

  • Alla Havrylova

    (National Technical University “Kharkiv Polytechnic Institute”)

  • Serhii Herasуmov

    (National Technical University “Kharkiv Polytechnic Institute”)

  • Halyna Holotaistrova

    (National Technical University “Kharkiv Polytechnic Institute”)

  • Dmytro Avramenko

    (National Defence University of Ukraine named after Ivan Chernyakhovskyi)

  • Roman Vozniak

    (National Defence University of Ukraine named after Ivan Chernyakhovskyi)

  • Oleksandr Voitko

    (National Defence University of Ukraine named after Ivan Chernyakhovskyi)

  • Kseniia Yerhidzei

    (National Defence University of Ukraine named after Ivan Chernyakhovskyi)

  • Serhii Mykus

    (National Defence University of Ukraine named after Ivan Chernyakhovskyi)

  • Yurii Pribyliev

    (National Defence University of Ukraine named after Ivan Chernyakhovskyi)

  • Olena Akhiiezer

    (National Technical University “Kharkiv Polytechnic Institute”)

  • Mykhailo Shyshkin

    (National Technical University “Kharkiv Polytechnic Institute”)

  • Ivan Opirskyy

    (Lviv Polytechnic National University)

  • Oleh Harasymchuk

    (Lviv Polytechnic National University)

  • Olha Mykhaylova

    (Lviv Polytechnic National University)

  • Yuriy Nakonechnyy

    (Lviv Polytechnic National University)

  • Marta Stakhiv

    (Lviv Polytechnic National University)

  • Bogdan Tomashevsky

    (Ternopil Ivan Puluj National Technical University)

Abstract

The development of Industry 4.0 technologies is based on the rapid growth of the computing capabilities of mobile wireless technologies, which has made it possible to significantly expand the range of digital services and form a conglomeration of socio-cyber-physical systems and smart technologies. The First Section discusses the issues of building security systems based on the proposed Concept of multi-contour security systems, taking into account the hybridity and synergy of modern targeted cyber-attacks, their integration with social engineering methods. This approach not only increases the level of security, but also forms an objective approach to the use of post-quantum security mechanisms based on the proposed Lotka-Volterra models. The Second Section analyzes the features of the functioning of social Internet services and establishes their role in ensuring the information security of the state. An approach is proposed to identify signs of threats in the text content of social Internet services, which will allow to quickly respond to changing situations and effectively counteract such threats. A classifier of information security profiles of users of social Internet services has been developed to assess the level of their danger as potential participants in disinformation campaigns. A method for identifying and evaluating the information and psychological impact on user communities in services is proposed. Models of conflict interaction of user groups in social Internet services are considered on the example of civil movements. To effectively counter threats to information security of the state, it is proposed to use the concept of synergistic user interaction and self-organization processes in a virtual community. Particular attention is paid to countering the manipulation of public opinion in the decision-making process by users of social Internet services. The Third Section proposes a biometric security system that works to authenticate users based on a comparison of their fingerprints and certain templates stored in a biometric database. A method for determining the contour based on the passage of a curve and the filtering function of contour lines has been developed. The stage of skeletal identification is analyzed in detail. The Ateb-Gabor method with wave thinning has been developed. The performance of skeletal algorithms such as the Zhang-Suen thinning algorithm, the Hilditch algorithm, and the Ateb-Gabor method with wave decimation is analyzed. The presented results of experiments with biometric fingerprints based on the NIST Special Database 302 database showed the effectiveness of the proposed method. The software and firmware were developed using the Arduino Nano.

Suggested Citation

  • Serhii Yevseiev & Ruslan Hryshchuk & Kateryna Molodetska & Mariia Nazarkevych & Volodymyr Hrytsyk & Oleksandr Milov & Olha Korol & Stanislav Milevskyi & Roman Korolev & Serhii Pohasii & Andrii Tkachov, 2022. "Modeling of security systems for critical infrastructure facilities," Monographs, PC TECHNOLOGY CENTER, number 978-617-7319-57-2.redif, December.
  • Handle: RePEc:baq:pcbook:978-617-7319-57-2.redif
    DOI: 10.15587/978-617-7319-57-2
    as

    Download full text from publisher

    File URL: http://monograph.com.ua/pctc/catalog/view/978-617-7319-57-2/117/419-2
    Download Restriction: no

    File URL: https://libkey.io/10.15587/978-617-7319-57-2?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:baq:pcbook:978-617-7319-57-2.redif. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Iryna Prudius (email available below). General contact details of provider: http://monograph.com.ua/pctc/catalog .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.