The approach to automated detection of destructive cyber influences

Authors

DOI:

https://doi.org/10.20535/2411-1031.2019.7.2.190561

Keywords:

Cyberspace, security, destructive, cyber impact, detection, monitoring, method.

Abstract

Issues of information analysis and detection of destructive effects in cyberspace and across cyberspace are considered. In 2019, we confirmed the global trend in the growth of the number of users of social information network services. Therefore, the importance of ensuring the fulfillment of  information and cyber security tasks in electronic media and cyberspace analysis is increasing today. Taking into account the global trends in the detection of destructive cyber influences and in order to fulfill the tasks defined by the governing documents of the state, it is necessary to monitor cyberspace and the detection of destructive cyber influences (at the stages of planning, preparation and direct information actions). To implement the above, it is necessary to address the issue of developing appropriate models and methods for the automatic detection of destructive cyber influences. In order to create a basis for scientific research, the following studies were conducted: methods of analysis of information available in cyberspace for the detection of destructive cyber influences; advantages and disadvantages of known methods of detecting destructive cyber-influences; known cyberspace monitoring systems. The main features (functions) of known cyberspace monitoring systems are: keyword data search and fixation of available information about information disseminators (their total number, activity over a certain period, actor accounts, gender, age, geographical location, audience reach). There is a need to identify approaches in developing decision support methods and models regarding the detection of destructive cyber influences in cyberspace. In developing an approach to detecting destructive cyber-influences, an ontology method is used in the first stage to structure information (text content rubrics). Advantages of using ontological diagrams in the process of information impact detection are: the presentation of the subject area (problems) in tabular or graph form, the detection of hidden relationships, the accumulation and analysis of information online, checking the consistency of facts. In the second stage, a filter-matrix is applied that reflects the processes (planning, preparation and direct implementation of information actions) of a classic NATO information operation. The prospect of further research is to develop a method for the automated detection of destructive cyber influences in cyberspace.

Author Biographies

Yurii Danyk, Institute of information technologies of National University of Defense of Ukraine named after Ivan Chernyakhovsky, Kyiv,

doctor of technical sciences, professor, honored worker of science and technology of Ukraine, head

Kostiantyn Sokolov, Department of information technology, Ministry of defense of Ukraine, Kyiv,

head

Oleh Hudyma, Department of information technology, Ministry of Defense of Ukraine, Kyiv,

candidate of technical sciences,
senior researcher, head,
branch of information resources

References

“Social Networking: Who Uses and How ?”, Gemius Ukraine. [Electronic resource]. Available: http://www.gemius.com.ua/e-commerce-novosti/socialni-merezhi-xto-vikoristovuje- i-jak.html. Accessed on: Sept. 21, 2019.

“The number of Facebook users in Ukraine has reached 13 million - research”, Media Sapiens. [Electronic resource]. Available: https://ms.detector.media/ mediaprosvita / research / kilkist_koristuvachiv_facebook_v_ukraini_dosyagla_13_milyoniv_doslidzhennya. Accessed on: Sept. 21, 2019.

O. Chernysh, “Instagram in Ukraine is growing faster than Facebook – research”, Public space. [Electronic resource]. Available: https://www.prostir.ua/?kb=instagram-v-ukrajini-roste-shvydshe-nizh-facebook-doslidzhennya. Accessed on: Sept. 21, 2019.

D. Marcus, “Warsaw NATO Summit and the Russian Threat”, BBC News. [Electronic resource]. Available: https://www.bbc.com/ukrainian/politics/2016/07/160708_warsaw_ nato_summit_ozh. Accessed on: Sept. 21, 2019.

V. Ryabych, “The NATO Summit in Warsaw - Results and Lessons”, Ukrinform. [Electronic resource]. Available: https://www.ukrinform.ua/rubric-other_news/2049186-samit-nato-u-varsavi-pidsumki-j-uroki.html. Accessed on: Sept. 21, 2019.

Statement on the outcome of the Warsaw Summit, NATO - News. [Electronic resource]. Available: https://www.nato.int/cps/en/natohq/official_texts_133169.htm?selectedLocale= en. Date of appeal: Sept. 21, 2019.

R. Gettamuller “Cyberattacks Are Serious…”, NATO - News. [Electronic resource]. Available: https: //www.nato.int/cps/en/natohq/news.htm? Search_types = News & display_mode = news & keywordquery = Cyber% 20defence% 20 & chunk = 3. Accessed on: Sept. 21, 2019.

Brussels Summit Declaration, NATO - News. [Online]. Available: https://www.nato.int/cps/en/natohq/official_texts_156624.htm?selectedLocale=en. Accessed on: Sept. 21, 2019.

The Verkhovna Rada of Ukraine. Law No. 2469-VIII of 21.06.2018 “On National Security of Ukraine”. [Electronic resource]. Available at: https://zakon5.rada.gov.ua/laws/show/2469-19. Accessed on: Sept. 21, 2019.

The Verkhovna Rada of Ukraine. Law No. 2163-VIII (as amended) of October 5, 2017, No. 2469-VIII of June 21, 2018 “On Basic Principles of Cybersecurity of Ukraine”. [Electronic resource]. Available at: https://zakon5.rada.gov.ua/laws/show/2163-19. Accessed on: Sept. 21, 2019.

Presidential Decree No. 96/2016 of March 15, 2016 “On the decision of the National Security and Defense Council of Ukraine of January 27, 2016“ On the Cybersecurity Strategy of Ukraine ”. [Electronic resource]. Available at: https://zakon5.rada.gov.ua/laws/show/96/2016. Accessed on: Sept. 21, 2019.

A.V. Malishevsky, Qualitative models in the theory of complex systems. Moscow, Russian Federation: Science. Fizmatlit., 1998.

A.V. Lukatskiy Detection of Attacks: [Criteria for attacks and signs of their detection. Sources of information. about attacks and methods of their analysis. Classification of attack detection systems. Evaluation criteria for attack detection systems. Selecting and building an attack detection infrastructure. Installation, deployment and operation of attack detection systems]. Petersburg, Russian Federation: BHC, 2003.

G. Hacken. Synergetics. Moscow, Russian Federation: World. 1980.

O.V. Palagin, KS Malakhov, V.Yu. Velichko, and OS Shchurov “Design and program realization of the subsystem of creation and use of the ontological knowledge base of scientific researcher publications” Programming Problems, № 2, p. 72-81, 2017 [Online resource]. Available: http://nbuv.gov.ua/UJRN/Progr_2017_2_8. Accessed on: Sept. 21, 2019.

AE Strizhak, “Tools of information and analytical support for monitoring processes”, Environmental Safety and Environmental Management, Vol. 14, p. 180-191, 2014. [Electronic resource]. Available: http://nbuv.gov.ua / UJRN / ebpk_2014_14_20. Accessed on: Sept. 21, 2019.

G. Butch, Object-oriented design with examples of applications. Moscow, Russian Federation: LLC “I. D. Williams”, 2008.

O.G. Slavko, “Identification of generalized parameters of a mathematical model of a computer network in the task of providing QOS,” Radio and Electronic and Computer Systems, No. 3, p. 68–74, 2010.

V.A. Kulanov, “On estimating the diversion of the implementation of minimal forms of functions in different bases”, Radioelectronic and Computer Systems, No. 5 (32), 2008.

T. Gruber, “A Translation Approach to Portable Ontologies,” Knowledge Acquisition, No. 5 (2), p. 199–220, 1993.

V.V. Litvin, “Method of extracting knowledge of natural-language texts for automated ontology development,”, Automated Control Systems and Automation Devices, No. 164, p. 67–72, 2013.

V.V. Litvin, “An Approach to the Automatic Construction of Interpretation Functions in Ontology Learning,”, Visn. Nat. University of Lviv Polytechnic. Information Systems and Networks, № 783, p. 361–368, 2014.

V.V. Litvin, M.Ya. Gopiak, OV Oborskaya, and RV Vovnyanka, “A method for constructing intelligent agents based on adaptive ontologies”, Lviv Polytechnic National University Institutional Repository. [Electronic resource]. Available at: http://ena.lp.edu.ua. Date of appeal: Sept. 21, 2019.

D.G. Dosin, V.V. Lytvyn, and R.V. Vovnyanka, “Computer System for Automated Development of Crocus Basic Ontology,” Electrical and Computer Systems, No. 13 (89), p. 135–143, 2014.

V.V. Litvin, “A Method for Using Ontologies in the OODA Loop,” Visn. Nat. University of Lviv Polytechnic. Information Systems and Networks, № 783, p.137–145, 2014.

V.V. Lytvyn, and O.V. Oborskaya, “Modeling of an Automated Tactical Link Control System on the Basis of an Ontological Approach”, Bulletin of Kremenchuk Mykhailo Ostrogradsky National University, Ed. 5 (88), p.92–97, 2014.

V.V. Litvin, V.A. Vysotska, D.G. Dosin, and M.G. Girnyak, “Development of methods and tools for building intelligent information resource processing systems using ontological approach”, Lviv Polytechnic National University Institutional Repository. [Electronic resource]. Available at: http://ena.lp.edu.ua. Date of appeal: Sept. 21, 2019.

S.O. Long and atc., Computer ontologies and their use in the educational process. Theory and Practice: Monograph, Kyiv, Ukraine: Gifted Child Institute, 2013.

S.V. Zinchenko “Concept of creation of ontologically-managed information system”, Information systems, mechanics and control, Iss. № 1, p. Nov 11, 2008

A.V. Palagin, N.G. Petrenko, and A.O. Sevruk, “On an Approach to a Formalized Representation of a Text Document Ontology”, Computer Tools, Networks and Systems, No. 6, p. 14–20, 2007.

M.A. Popova, “Methodology for building ontologically-managed information resources as an element of computer-based business games for the training of environmental security professionals,” Environmental Safety and Environmental Management, vol. Oct 10, 2012.

A.V. Palagin, and N.G. Petrenko, “System-ontological analysis of the domain”, USiM, No. 4, p. 3-14, 2009.

O.V. Pologin, and M.G. Petrenko, “Development of an abstract model of linguistic-ontological information system”, Mathematical Machines and Systems, No. 1, p. 42–50, 2017.

O.V. Pologin, M.G. Petrenko, and A.V. Mikhailuk, “Development and Comparative Characteristics of Logic-Ontological Formal Theories”, Mathematical Machines and Systems, No. 2, p. 3-18, 2007.

A.V. Palagin, and N.G. Petrenko, “On the question of system-ontological integration of domain knowledge”, Mathematical Machines and Systems, No. 3,4, p. 63–75, 2007.

How to Cite

Danyk, Y., Sokolov, K., & Hudyma, O. (2019). The approach to automated detection of destructive cyber influences. Collection "Information Technology and Security", 7(2), 149–160. https://doi.org/10.20535/2411-1031.2019.7.2.190561

Issue

Section

INFORMATION WARFARE