SlideShare a Scribd company logo
1 of 9
Download to read offline
http://www.iaeme.com/IJCIET/index.asp 1 editor@iaeme.com
International Journal of Civil Engineering and Technology (IJCIET)
Volume 10, Issue 02, February 2019, pp. 1–9, Article ID: IJCIET_10_02_001
Available online at http://www.iaeme.com/ijciet/issues.asp?JType=IJCIET&VType=10&IType=2
ISSN Print: 0976-6308 and ISSN Online: 0976-6316
©IAEME Publication Scopus Indexed
MODEL OF INDICATOR OF CURRENT RISK OF
THREATS REALIZATION ON THE
INFORMATION COMMUNICATION SYSTEM
OF TRANSPORT
V. Lakhno
Professor, Department of Computer Systems and Networks,
National University of Life and Environmental Sciences of Ukraine, Kyiv, Ukraine
O. Kryvoruchko
Professor, Head of Department of Software Engineering and Cyber Security National
University of Trade and Economics, Kyiv, Ukraine
H. Mohylnyi
PhD., Department of Information Technologies and Systems,
Luhansk Taras Shevchenko National University, Starobilsk, Ukraine
M. Semenov
PhD., Department of Information Technologies and Systems,
Luhansk Taras Shevchenko National University, Starobilsk, Ukraine
I. Kiryeyev
PhD., Department of Information Technologies and Systems,
Luhansk Taras Shevchenko National University, Starobilsk, Ukraine
V. Matiievskyi
Department of Information Technologies and Systems,
Luhansk Taras Shevchenko National University, Starobilsk, Ukraine
V. Donchenko
Department of Information Technologies and Systems,
Luhansk Taras Shevchenko National University, Starobilsk, Ukraine
ABSTRACT
The paper proposed a model for estimating the quantitative indicator of current
risks of threats and cyberattacks realization on information communication systems of
transport (ICST), that differs from the existing models with ability to take into account
the degree of influence of each threat or cyberattack within the class on the
probability of an emergency situation that arises at cyber-attacks on components of
Model of Indicator of Current Risk of Threats Realization on the Information Communication
System of Transport
http://www.iaeme.com/IJCIET/index.asp 2 editor@iaeme.com
information communication systems of transport, which in many cases can be
attributed to critical computer systems. For approbation of the proposed model the
simulation experiment was conducted, the results of which also are presented in the
article. Simulation modeling is also carried out for verification of adequacy of the
proposed model and algorithm of estimation of current risks for components of ICST.
It is considered that many components of ICST work in real time. It is shown that the
proposed model takes into account current values of information security metrics and
new classes of cyberthreats for ICST.
Key words: Information communication systems of transport, mathematical model,
indicator of current risk, cybersecurity, information security.
Cite this Article: V. Lakhno, O. Kryvoruchko, H. Mohylnyi, M. Semenov,
I. Kiryeyev, V. Matiievskyi, V. Donchenko, Model of Indicator of Current Risk of
Threats Realization on the Information Communication System of Transport,
International Journal of Civil Engineering and Technology (IJCIET) 10(2), 2019,
pp. 1–9.
http://www.iaeme.com/IJCIET/issues.asp?JType=IJCIET&VType=10&IType=2
1. INTRODUCTION
Information security and cybersecurity of information communication systems of transport
(ICST) requires accounting for all events that occur. In particular, events in the process of
which digital information is created, modified, accessed or transmitted [1, 2]. Implementation
of these measures is the requirement of the international standard ISO/IEC 27001:2013
“Information security management systems – Requirements”.
The need to use of monitoring systems for information security (IS) in ICST is determined
by the fact that the use of conventional measures and mechanisms of information security is
inadequate [3]. In particular, because they perform only basic functions and do not allow to
control the safety of the systems functioning in conditions of permanent modifications of
cyberattacks. Existing security monitoring systems are not able to conduct a comprehensive
assessment of hackers' actions, build a sequence of implemented vulnerabilities, determine the
ultimate goal of the attacker and assess the risks of threats realization to security systems,
which can lead to repeated successful attacks, as well as to financial losses.
Existing monitoring tools of IS, such as, Intruder Alert, Real Secure Network Sensor [3–
5] and others, have some drawbacks:
high level of type I and type II errors, that is, errors are not the definition of a cyberattack,
when it occurs, and the formation of an "attack" situation in its absence;
lack of ability to adaptively manage system of IS and to conduct preventive actions.
Reducing the risks of unauthorized access to information resources of ICST can be
achieved by solving the problem of assessing and analyzing the current threat of the process
of computer attack in real time, in order to prevent the attack in a timely manner and thereby
prevent the development of an unfavorable scenario for the development of this situation.
Obviously, in order to take into account, the influence of numerous parameters of anomalies
and cyberattacks on the degree of IS ICST, as well as their interconnections of systems in real
time, special methods and corresponding organizational, technical and software tools are
necessary. So, the topic of the study is relevant.
V. Lakhno, O. Kryvoruchko, H. Mohylnyi, M. Semenov, I. Kiryeyev, V. Matiievskyi, V. Donchenko
http://www.iaeme.com/IJCIET/index.asp 3 editor@iaeme.com
2. LITERATURE REVIEW AND PROBLEM POSING
Analysis of previous studies allowed to determine the list of potential current risks, which
allows to determine the most topical threats for ICST and measures to counter them, as well
as to optimize the cost of building a system of protection [5–7].
One of the most common methods of risk assessment is the method based on the full coverage
of system, which is a triad "threats – information security measure– protection objects" in the
form of a trilogy graph [8, 9].
During the risk assessment, three tasks can be distinguished, reflecting the goals of such an
assessment:
1) risk assessment at the objects of ICST not equipped with modern information security
measures (ISM), in order to find out the need to create complexes of information security
systems (ISS);
2) risk assessment of cyber threats realization in order to modernize the existing complexes of
ISS;
3) risk assessment in order to create a new complex of ISS.
It should be noted that a certain quantitative characterization of the risk of unauthorized
access (UA) to ICST has already been introduced in the normative documentation and in the
studies of a number of authors [3, 6, 8, 10]. According to these sources, as a quantitative
characteristic of the risk of penetration in ICST, the risk is considered, measured, as a rule, in
monetary units, which is not always of paramount importance for critical systems.
Consequently, it is necessary to calculate the risk for all three formulations of the design
task. Consideration of the real connections between threats and resources leads to the fact that
the risk should be determined with taking into account the values of elements of the matrix of
relationships, the values of which are equal to 0 - if the threat cannot affect the resource, and
equal to 1 - if the threat potentially can affect the information resource.
3. GOAL AND OBJECTIVES OF THE STUDY
Research goal is to develop a model of indicator for assessment of the current risk of threats
realization on the information communication system of transport.
To achieve the research goal, it is necessary to develop:
1) obtain a quantitative indicator of the current risks (ICR) of the implementation of threats on
ICST;
2) to develop algorithms for estimating ICR for ICST components operating in real time,
taking into account current values of information security metrics and new classes of cyber
threats.
4. MODELS AND METHODS
The current risks and threats of cyberattacks or unauthorized access are indicators of
technological processes in ICST, which can acquire different values depending on various
factors [7].
It is intuitively clear that current risks may be insignificant if all potentially dangerous ICST
parameters are maintained within established limits or increased, becoming threatening, with
the deviation of such parameters from the norm. Therefore, it is necessary to describe the
degree of current risk of cyberattack threats realization with some quantitative indicator, the
value of which would depend on the deviations of the parameters associated with the IS.
The introduction of such an indicator will allow for indirect measurement of the degree of
current risks of cyberattack threat realization on ICST.
Model of Indicator of Current Risk of Threats Realization on the Information Communication
System of Transport
http://www.iaeme.com/IJCIET/index.asp 4 editor@iaeme.com
We propose to introduce a special indicator for the quantitative characterization of the
current attack hazard level or unauthorized access to ICST, which can be calculated
(measured) at any given time, in particular, using intelligent detection methods for threats [7,
10]. The results of the measurements of the indicator can be presented to the system
administrator (administrator of ISS) or used for other tasks.
If processes in ICST are characterized by the risks of implementing IS threats, all of
which lie in the zone of permissible values of 0ZS (see Figure 1), then the current IS can be
considered as zero. If one or more parameters are transferred to the zone of unsafe values 1ZS ,
the current risk increases, and it will increase with the parameters to the zone of critical values
2ZS .
LL L H HH
ZS0 ZS1 ZS2ZS1ZS2
Zone of
permissible
values
Zone of unsafe
values
Zone of
critical values
Zone of unsafe
values
Zone of
critical values
Warning value Warning valueMaximum permissible value Maximum permissible value
Figure 1 Risks of the threat’s realization to information security of ICST
It is clear that the current danger of penetration in ICST should depend on the total
number of threats of information - MI , which are simultaneously in the zone 1ZS , from the
degree of approximation of each parameter to the zone 2ZS and the degree of exposure of
each threat to the possibility of an unordinary situation emergence, for example, gaining
access to resources of ICST.
Denote ICR through ( )CRI CRIC C X , where 1( ,..., ,..., )CRI CRI CRIi CRI MIX x x x - the vector
values of the ICR, MI - the number of threats to information.
The current risk indicator CRIC should meet these requirements.
1. Be scalar with a non-dimensional variable that varies from 0 to 1 ( (0 1)CRIC   ) taking
into account the algorithm work of DDP IS.
2. Be the function of the parameters iCRIx 1(( ,..., ,..., ).CRI CRI CRIi CRI MC f x x x
3. Values of CRIC should depend on the values of all the risks of threats realization to the
components and processes in ICST, when they are in the zone of unsafe values 0 < CRIC < 1.
i 1
i
(x ) : , 1.. ;
(x ) : ( )
( ),
CRI i
CRI CRI ill CRI i CRI il
CRI ih CRI i CRI ihh
if ZS ZS i MI
or x x x
x x x
  
   
  
(1)
V. Lakhno, O. Kryvoruchko, H. Mohylnyi, M. Semenov, I. Kiryeyev, V. Matiievskyi, V. Donchenko
http://www.iaeme.com/IJCIET/index.asp 5 editor@iaeme.com
where ,CRI il CRI ihx x  warning values of indicators;
,CRI ill CRI ihhx x  maximum permissible values of indicators.
4. The value of the ICR of the IS of ICST is zero if all the parameters of the information
processes in the ICST are in the zone of permissible values 0CRIC  ,
i 0(x ) : , 1.. .CRI iif ZS ZS i MI  
5. The value of ICR is equal to one if at least one technological parameter of the ICST (see [7,
10, 11]) is in the zone of critical values 1CRIC  ,
i 2(x ) : , 1.. .CRI iif ZS ZS i MI   (2)
6. The value of CRIC should be increasing function of its arguments.
If 1CRIC – the value of the indicator CRIC when 1CRI i CRIx x ,
2CRIC – the value of the indicator CRIC when 1CRI j CRIjx x , and if degree of influence of CRI ix
is less than degree of influence CRI jx , then 1 2CRI CRIС С .
7. The value of CRIC should increase with an increase in the number of threats and attacks –
data on incidents of IS in the zones ZS1, ZS2.
If 1CRIC – the value of the indicator CRIC when 1 1,CRI i CRI i ix x ZS ZS  , 2CRIC – the value
of the indicator CRIC when
1
1
1
1 1 2
,
,
,
.
CRI i CRI i
CRI j CRI j
i
j CRI CRI
x x
x x
ZS ZS
ZS ZS else С С



 
(3)
8. Indicator CRIC should take into account the degree of influence of each threat within the
class iKL to the possibility of an emergency situation that occurs when attacking components
of ICST.
If 1CRIC – the value of the indicator CRIC when 1CRI i CRIx x ,
2CRIC – the value of the indicator CRIC when 1CRI j CRIjx x , and if degree of influence of
CRI ix is less than degree of influence then CRI jx , then 1 2CRI CRIС С .
9. The value CRIC should be applicable in any mode of operation of ICST.
Calculations of ICR of UA in ICST are based on this dependence:
2 2
1
2 22
2
( ) .
(1 ) (1 )
MI
CRI CRIi
CRI MI MI
i
CRIi CRIk
i k i
x x
C X
x x
 
 
 

 
(4)
The formula for calculating of CRIC the value when used in ICST requires special
algorithm for valuation and ordering of parameters MI .
Research of the algorithm and the main properties of the ICR is carried out with the help
of the software package Mathcad.
Model of Indicator of Current Risk of Threats Realization on the Information Communication
System of Transport
http://www.iaeme.com/IJCIET/index.asp 6 editor@iaeme.com
Suppose that any CRIC can have one or two areas of dangerous values (H – high and L – low).
If the parameter  1CRI ix i MI  has one or two zones of dangerous values, then the
conversion of its current value to the normalized value i is performed by the formula (5):
i
i i
l
i i
i i
i
1, x ,
, x ,
0, x ,
, x ,
1, x ,
i
ll
CRI CRI i
ll
CRI i CRI ll l
CRI CRI CRI il ll
i i
h
i CRI CRI CRI i
h
CRI i CRI i h l
CRI CRI CRI ihh h
CRI i CRI i
hh
CRI CRI i
if x
x x
if x x
x x
if x x
x x
if x x
x x
if x

 

 
 


  

   

 
(5)
where ixCRI – current value of indicator;
,l h
CRI i CRI ix x – warning values of indicators;
,ll hh
CRI i CRI ix x – maximum permissible values of indicators.
The degree of influence of each factor on the possibility of threat realization to IS at
deviation of this parameter from the norm, is determined by ranking, that is, assigning a
parameter to a certain coefficient (rank). The rank of the parameter Кr represents a positive
integer value: Кr = 1, 2, .... The model was tested during the simulation experiment.
5. SIMULATION EXPERIMENT
Figure 2, 3 show, for example, the dependencies of ICR CRIC on the parameters of the
parameters ixCRI and i for MI =1, 2 and Кr = 1, 2 (for example, the key abduction for the
GSM-R communication system and the organization of the DoS / DDoS attack on the train
control system).
Figure 2 Dependencies  i 1CRIC  for MI=1 і 2
& Kr1 = Kr2 = 2
Figure 3 Dependencies  i 1CRIC  for MI=2,
Kr1 > Kr2 & Kr1 < Kr2
V. Lakhno, O. Kryvoruchko, H. Mohylnyi, M. Semenov, I. Kiryeyev, V. Matiievskyi, V. Donchenko
http://www.iaeme.com/IJCIET/index.asp 7 editor@iaeme.com
6. RESULTS AND DISCUSSION
As a result of the analysis of these and other dependencies obtained during the simulation
experiment, as well as those investigated in papers [5, 7, 11–22], the following conclusions
were made:
1. 0CRIC  , if all i are equal to 0.
2. 1CRIC  , if at least one parameter i is equal to 1.
3. 0 1CRIC  , if at least one parameter i is greater than zero and less than 1 (the
corresponding parameter xi is in the danger zone).
4. If, when one or more parameters are found in the zone of unsafe values, another parameter
also enters this zone, then the indicator CRIC increases.
5. If the number of current threats IS MI = 1 and Kr1 = 1, then 1CRIC  , that is, the ICR CRIC
is proportional to the parameter 1 .
6. If MI = 1 and Kr1 = 2, then the dependence CRIC from 1 is nonlinear. In this case, CRIC
more than with Кr1 = 1 for the same values 1 .
7. If MI> 1, then all dependencies CRIC from 1 are nonlinear. At the same time, the value of
the indicator CRIC is higher, the more parameters are in the unsafe zone.
8. The higher the rank of parameters, which are in the unsafe zone, the higher level has
indicator CRIC for other equal conditions [23–25].
A certain disadvantage of work at this stage of research is insufficient approbation of
results. But our research is continuing and eventually their results will be presented in the
following publications.
7. GRATITUDES
The research and the article were done within the framework of promising scientific and
technical programs of the Department of Computer Systems and Networks of the National
University of Life and Environmental Sciences of Ukraine, as well as the grant of the
Republic of Kazakhstan, registration number AP05132723 “Development of adaptive expert
systems in the area of cybersecurity of critical objects of informatization”.
8. CONCLUSIONS
Thus, according to the results of the research, the following results were obtained:
The model was developed to assess the quantitative indicator of current risks of threats
and cyberattacks realization on information communication systems of transport (ICST),
which differs from existing ones by ability to take into account the degree of influence of each
threat or cyberattack within the class, on the probability of emergencies that occurs when
cyberattacks on ICST components;
Simulation modeling was performed to verify the adequacy of the proposed model and
algorithm for assessing the current risk indicator for ICST components operating in real time,
taking into account current values of information security metrics and new classes of cyber
threats for ICST.
Model of Indicator of Current Risk of Threats Realization on the Information Communication
System of Transport
http://www.iaeme.com/IJCIET/index.asp 8 editor@iaeme.com
REFERENCES
[1] Al Hadidi, M., Ibrahim, Y. K., Lakhno, V., Korchenko, A., Tereshchuk, A., & Pereverzev,
A. (2016). Intelligent systems for monitoring and recognition of cyberattacks on
information and communication systems of transport. International Review on Computers
and Software, 11(12), pp. 1167-1177.
[2] Alcaraz, C., Zeadally, S. (2013). Critical control system protection in the 21st century,
Computer, 46 (10), pp. 74-83.
[3] Vacca, J.R. (2010). Managing Information Security, Syngress, p. 320.
[4] Lopez, I., Aguado, M. (2015). Cyber security analysis of the European train control
system, IEEE Communications Magazine, 53(10), pp. 110-116.
[5] Lakhno, V., & Hrabariev, A. (2016). Improving the transport cyber security under
destructive impacts on information and communication systems. Eastern-European
Journal of Enterprise Technologies, 1(3), 4, pp. 4-11.
[6] Dunn, W. (2002). Practical Design of Safety-Critical Systems, Reliability Press,
Cambridge.
[7] Lakhno, V. (2016). Creation of the adaptive cyber threat detection system on the basis of
fuzzy feature clustering, Eastern-European Journal of Enterprise Technologies, Vol. 2,
Iss. 9, 2016, pp. 18-25.
[8] Beketova, G. S., Akhmetov, B. S., Korchenko, A. G. etc. (2017). Optimization backup
model for critical important information systems. Bulletin of the national academy of
sciences of the republic of Kazakhstan, (5), pp. 37-44.
[9] Lakhno, V.A., Kravchuk, P.U., Malyukov, V.P., Domrachev, V.N., Myrutenko, L.V.,
Piven, O.S. (2017). Developing of the cyber security system based on clustering and
formation of control deviation signs, Journal of Theoretical and Applied Information
Technology, Vol. 95, Iss. 21, pp. 5778-5786.
[10] Lakhno, V., Zaitsev, S., Tkach, Y. etc. (2019). Adaptive expert systems development for
cyber-attacks recognition in information educational systems on the basis of signs'
clustering, Advances in Intelligent Systems and Computing, 1st International Conference
on Computer Science, Engineering and Education Applications, ICCSEEA2018; Kiev;
Ukraine; 18 January 2018, Vol. 754, pp. 673-682.
[11] Akhmetov, B., Lakhno, V., Akhmetov, B., Alimseitova, Z. (2019). Development of
sectoral intellectualized expert systems and decision-making support systems in
cybersecurity, Advances in Intelligent Systems and Computing, 2nd Computational
Methods in Systems and Software, CoMeSySo 2018; Szczecin; Poland; 12 September
2018, Vol. 860, pp. 162-171.
[12] Akhmetov, B., etc. (2018). Models and Algorithms of Vector Optimization in Selecting
Security Measures for Higher Education Institution’s Information Learning Environment.
In Proceedings of the Computational Methods in Systems and Software (pp. 135–142).
Springer, Cham.
[13] Lakhno, V., Tkach, Y., Petrenko, T., Zaitsev, S. & Bazylevych, V. (2016). Development
of adaptive expert system of information security using a procedure of clustering the
attributes of anomalies and cyber-attacks. Eastern European Journal of Enterprise
Technologies, 6/9 (84), pp. 32–44.
[14] Lakhno, V., Akhmetov, B., Korchenko, A., Alimseitova, Z., Grebenuk, V. (2018).
Development of a decision support system based on expert evaluation for the situation
center of transport cybersecurity. Journal of Theoretical and Applied Information
Technology, 96 (14), pp. 4530–4540.
V. Lakhno, O. Kryvoruchko, H. Mohylnyi, M. Semenov, I. Kiryeyev, V. Matiievskyi, V. Donchenko
http://www.iaeme.com/IJCIET/index.asp 9 editor@iaeme.com
[15] Lakhno, V., Buriachok, V., Parkhuts, L. etc. (2018). Development of a conceptual model
of adaptive access rights management with using the apparatus of Petri nets. International
Journal of Civil Engineering & Technology (IJCIET), Vol. 9, Iss. 11, pp. 95–104.
[16] Akhmetov, B., Kydyralina, L. etc. (2018). Model for a computer decision support system
on mutual investment in the cybersecurity of educational institutions, International Journal
of Mechanical Engineering & Technology (IJMET), Vol. 9, Iss. 10, pp. 1114–1122.
[17] Borowik, B., Karpinskyy, M., Lahno, V., & Petrov, O. (2012). Theory of Digital
Automata (Vol. 63). Springer Science & Business Media.
[18] Smirniy, M., etc. (2009). The research of the conflict request threads in the data protection
systems. Proceedings of Lugansk branch of the International Academy of Informatization,
2(20), pp. 23–30.
[19] Akhmetov, B. B. etc. (2018). The Choice of Protection Strategies during the Bilinear
Quality Game on Cyber Security Financing. Bulletin of the national academy of sciences
of the republic of Kazakhstan, (3), pp. 6–14.
[20] Petrov, A., etc. (2016). Models, methods and information technologies of protection of
corporate systems of transport based on intellectual identification of threats. Decision
Making in Manufacturing and Services, 9(2), pp. 117–135.
[21] Lakhno V., Tsiutsiura S., Ryndych Y., Blozva A., Desiatko A., Usov Y. and S. Kaznadiy.
(2019). Optimization of information and communication transport systems protection
tasks. International Journal of Civil Engineering & Technology (IJCIET), Vol. 10, Iss. 1,
рр. 1–9.
[22] V. Lakhno, D. Kasatkin, V. Kozlovskyi, S. Petrovska, Y. Boiko, P. Kravchuk, N.
Lishchynovska (2019). A Model and algorithm for detecting spyware in medical
information systems, International Journal of Mechanical Engineering & Technology,
Vol. 10, Iss. pp. 287–295.
[23] Akhmetov, B. еtс. (2017). Designing a decision support system for the weakly formalized
problems in the provision of cybersecurity, Eastern-European Journal of Enterprise
Technologies, (1 (2)), 4–15.
[24] Smirniy, M. еtс. (2009). The research of the conflict request threads in the data protection
systems. Proceedings of Lugansk branch of the International Academy of Informatization,
2(20), pp. 23–30.
[25] Petrov, B. B., & Karpinskyy, M. (2016). Immune and defensive corporate systems with
intellectual identification of threats. Śląska Oficyna Drukarska, Pszczyna, 222 p.

More Related Content

What's hot

APPLICATION OF SELF-ORGANIZING FEATURE MAPS AND MARKOV CHAINS TO RECOGNITION ...
APPLICATION OF SELF-ORGANIZING FEATURE MAPS AND MARKOV CHAINS TO RECOGNITION ...APPLICATION OF SELF-ORGANIZING FEATURE MAPS AND MARKOV CHAINS TO RECOGNITION ...
APPLICATION OF SELF-ORGANIZING FEATURE MAPS AND MARKOV CHAINS TO RECOGNITION ...IAEME Publication
 
System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingSystem Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingIJNSA Journal
 
Vulnerability scanners a proactive approach to assess web application security
Vulnerability scanners a proactive approach to assess web application securityVulnerability scanners a proactive approach to assess web application security
Vulnerability scanners a proactive approach to assess web application securityijcsa
 
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...IJNSA Journal
 
Integrating Threat Modeling in Secure Agent-Oriented Software Development
Integrating Threat Modeling in Secure Agent-Oriented Software DevelopmentIntegrating Threat Modeling in Secure Agent-Oriented Software Development
Integrating Threat Modeling in Secure Agent-Oriented Software DevelopmentWaqas Tariq
 
A Behavior Based Intrusion Detection System Using Machine Learning Algorithms
A Behavior Based Intrusion Detection System Using Machine Learning AlgorithmsA Behavior Based Intrusion Detection System Using Machine Learning Algorithms
A Behavior Based Intrusion Detection System Using Machine Learning AlgorithmsCSCJournals
 
Predictive cyber security
Predictive cyber securityPredictive cyber security
Predictive cyber securitycsandit
 
Software security risk mitigation using object oriented design patterns
Software security risk mitigation using object oriented design patternsSoftware security risk mitigation using object oriented design patterns
Software security risk mitigation using object oriented design patternseSAT Journals
 
Software security risk mitigation using object
Software security risk mitigation using objectSoftware security risk mitigation using object
Software security risk mitigation using objecteSAT Publishing House
 
APPLICATION SPECIFIC USAGE CONTROL IMPLEMENTATION VERIFICATION
APPLICATION SPECIFIC USAGE CONTROL IMPLEMENTATION VERIFICATIONAPPLICATION SPECIFIC USAGE CONTROL IMPLEMENTATION VERIFICATION
APPLICATION SPECIFIC USAGE CONTROL IMPLEMENTATION VERIFICATIONIJNSA Journal
 
Attack graph based risk assessment and optimisation approach
Attack graph based risk assessment and optimisation approachAttack graph based risk assessment and optimisation approach
Attack graph based risk assessment and optimisation approachIJNSA Journal
 
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...Spark Security
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecuritySpark Security
 
A Smart Fuzzing Approach for Integer Overflow Detection
A Smart Fuzzing Approach for Integer Overflow DetectionA Smart Fuzzing Approach for Integer Overflow Detection
A Smart Fuzzing Approach for Integer Overflow DetectionITIIIndustries
 
An Overview on the Use of Data Mining and Linguistics Techniques for Building...
An Overview on the Use of Data Mining and Linguistics Techniques for Building...An Overview on the Use of Data Mining and Linguistics Techniques for Building...
An Overview on the Use of Data Mining and Linguistics Techniques for Building...ijcsit
 
carl-svensson-exjobb-merged
carl-svensson-exjobb-mergedcarl-svensson-exjobb-merged
carl-svensson-exjobb-mergedCalle Svensson
 
A web application detecting dos attack using mca and tam
A web application detecting dos attack using mca and tamA web application detecting dos attack using mca and tam
A web application detecting dos attack using mca and tameSAT Journals
 

What's hot (17)

APPLICATION OF SELF-ORGANIZING FEATURE MAPS AND MARKOV CHAINS TO RECOGNITION ...
APPLICATION OF SELF-ORGANIZING FEATURE MAPS AND MARKOV CHAINS TO RECOGNITION ...APPLICATION OF SELF-ORGANIZING FEATURE MAPS AND MARKOV CHAINS TO RECOGNITION ...
APPLICATION OF SELF-ORGANIZING FEATURE MAPS AND MARKOV CHAINS TO RECOGNITION ...
 
System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingSystem Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats Modeling
 
Vulnerability scanners a proactive approach to assess web application security
Vulnerability scanners a proactive approach to assess web application securityVulnerability scanners a proactive approach to assess web application security
Vulnerability scanners a proactive approach to assess web application security
 
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
 
Integrating Threat Modeling in Secure Agent-Oriented Software Development
Integrating Threat Modeling in Secure Agent-Oriented Software DevelopmentIntegrating Threat Modeling in Secure Agent-Oriented Software Development
Integrating Threat Modeling in Secure Agent-Oriented Software Development
 
A Behavior Based Intrusion Detection System Using Machine Learning Algorithms
A Behavior Based Intrusion Detection System Using Machine Learning AlgorithmsA Behavior Based Intrusion Detection System Using Machine Learning Algorithms
A Behavior Based Intrusion Detection System Using Machine Learning Algorithms
 
Predictive cyber security
Predictive cyber securityPredictive cyber security
Predictive cyber security
 
Software security risk mitigation using object oriented design patterns
Software security risk mitigation using object oriented design patternsSoftware security risk mitigation using object oriented design patterns
Software security risk mitigation using object oriented design patterns
 
Software security risk mitigation using object
Software security risk mitigation using objectSoftware security risk mitigation using object
Software security risk mitigation using object
 
APPLICATION SPECIFIC USAGE CONTROL IMPLEMENTATION VERIFICATION
APPLICATION SPECIFIC USAGE CONTROL IMPLEMENTATION VERIFICATIONAPPLICATION SPECIFIC USAGE CONTROL IMPLEMENTATION VERIFICATION
APPLICATION SPECIFIC USAGE CONTROL IMPLEMENTATION VERIFICATION
 
Attack graph based risk assessment and optimisation approach
Attack graph based risk assessment and optimisation approachAttack graph based risk assessment and optimisation approach
Attack graph based risk assessment and optimisation approach
 
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for Cybersecurity
 
A Smart Fuzzing Approach for Integer Overflow Detection
A Smart Fuzzing Approach for Integer Overflow DetectionA Smart Fuzzing Approach for Integer Overflow Detection
A Smart Fuzzing Approach for Integer Overflow Detection
 
An Overview on the Use of Data Mining and Linguistics Techniques for Building...
An Overview on the Use of Data Mining and Linguistics Techniques for Building...An Overview on the Use of Data Mining and Linguistics Techniques for Building...
An Overview on the Use of Data Mining and Linguistics Techniques for Building...
 
carl-svensson-exjobb-merged
carl-svensson-exjobb-mergedcarl-svensson-exjobb-merged
carl-svensson-exjobb-merged
 
A web application detecting dos attack using mca and tam
A web application detecting dos attack using mca and tamA web application detecting dos attack using mca and tam
A web application detecting dos attack using mca and tam
 

Similar to Ijciet 10 02_001

A LIGHTWEIGHT METHOD FOR DETECTING CYBER ATTACKS IN HIGH-TRAFFIC LARGE NETWOR...
A LIGHTWEIGHT METHOD FOR DETECTING CYBER ATTACKS IN HIGH-TRAFFIC LARGE NETWOR...A LIGHTWEIGHT METHOD FOR DETECTING CYBER ATTACKS IN HIGH-TRAFFIC LARGE NETWOR...
A LIGHTWEIGHT METHOD FOR DETECTING CYBER ATTACKS IN HIGH-TRAFFIC LARGE NETWOR...IJCNCJournal
 
A Lightweight Method for Detecting Cyber Attacks in High-traffic Large Networ...
A Lightweight Method for Detecting Cyber Attacks in High-traffic Large Networ...A Lightweight Method for Detecting Cyber Attacks in High-traffic Large Networ...
A Lightweight Method for Detecting Cyber Attacks in High-traffic Large Networ...IJCNCJournal
 
DEVELOPMENT OF A CONCEPTUAL MODEL OF ADAPTIVE ACCESS RIGHTS MANAGEMENT WITH U...
DEVELOPMENT OF A CONCEPTUAL MODEL OF ADAPTIVE ACCESS RIGHTS MANAGEMENT WITH U...DEVELOPMENT OF A CONCEPTUAL MODEL OF ADAPTIVE ACCESS RIGHTS MANAGEMENT WITH U...
DEVELOPMENT OF A CONCEPTUAL MODEL OF ADAPTIVE ACCESS RIGHTS MANAGEMENT WITH U...IAEME Publication
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
Analytic Hierarchy Process-based Fuzzy Measurement to Quantify Vulnerabilitie...
Analytic Hierarchy Process-based Fuzzy Measurement to Quantify Vulnerabilitie...Analytic Hierarchy Process-based Fuzzy Measurement to Quantify Vulnerabilitie...
Analytic Hierarchy Process-based Fuzzy Measurement to Quantify Vulnerabilitie...IJCNCJournal
 
Analytic Hierarchy Process-based Fuzzy Measurement to Quantify Vulnerabilitie...
Analytic Hierarchy Process-based Fuzzy Measurement to Quantify Vulnerabilitie...Analytic Hierarchy Process-based Fuzzy Measurement to Quantify Vulnerabilitie...
Analytic Hierarchy Process-based Fuzzy Measurement to Quantify Vulnerabilitie...IJCNCJournal
 
ANALYTIC HIERARCHY PROCESS-BASED FUZZY MEASUREMENT TO QUANTIFY VULNERABILITIE...
ANALYTIC HIERARCHY PROCESS-BASED FUZZY MEASUREMENT TO QUANTIFY VULNERABILITIE...ANALYTIC HIERARCHY PROCESS-BASED FUZZY MEASUREMENT TO QUANTIFY VULNERABILITIE...
ANALYTIC HIERARCHY PROCESS-BASED FUZZY MEASUREMENT TO QUANTIFY VULNERABILITIE...IJCNCJournal
 
ONTOLOGY-BASED MODEL FOR SECURITY ASSESSMENT: PREDICTING CYBERATTACKS THROUGH...
ONTOLOGY-BASED MODEL FOR SECURITY ASSESSMENT: PREDICTING CYBERATTACKS THROUGH...ONTOLOGY-BASED MODEL FOR SECURITY ASSESSMENT: PREDICTING CYBERATTACKS THROUGH...
ONTOLOGY-BASED MODEL FOR SECURITY ASSESSMENT: PREDICTING CYBERATTACKS THROUGH...IJNSA Journal
 
Classification of Malware Attacks Using Machine Learning In Decision Tree
Classification of Malware Attacks Using Machine Learning In Decision TreeClassification of Malware Attacks Using Machine Learning In Decision Tree
Classification of Malware Attacks Using Machine Learning In Decision TreeCSCJournals
 
Security against Web Application Attacks Using Ontology Based Intrusion Detec...
Security against Web Application Attacks Using Ontology Based Intrusion Detec...Security against Web Application Attacks Using Ontology Based Intrusion Detec...
Security against Web Application Attacks Using Ontology Based Intrusion Detec...IRJET Journal
 
PREDICTIVE CYBER SECURITY ANALYTICS FRAMEWORK: A NONHOMOGENOUS MARKOV MODEL F...
PREDICTIVE CYBER SECURITY ANALYTICS FRAMEWORK: A NONHOMOGENOUS MARKOV MODEL F...PREDICTIVE CYBER SECURITY ANALYTICS FRAMEWORK: A NONHOMOGENOUS MARKOV MODEL F...
PREDICTIVE CYBER SECURITY ANALYTICS FRAMEWORK: A NONHOMOGENOUS MARKOV MODEL F...cscpconf
 
A Review on Data Falsification-Based attacks In Cooperative Intelligent Trans...
A Review on Data Falsification-Based attacks In Cooperative Intelligent Trans...A Review on Data Falsification-Based attacks In Cooperative Intelligent Trans...
A Review on Data Falsification-Based attacks In Cooperative Intelligent Trans...CSCJournals
 
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...IJNSA Journal
 
A STUDY ON CYBER SECURITY AND ITS RISKS K. Jenifer
A STUDY ON CYBER SECURITY AND ITS RISKS  K. JeniferA STUDY ON CYBER SECURITY AND ITS RISKS  K. Jenifer
A STUDY ON CYBER SECURITY AND ITS RISKS K. JeniferAM Publications
 
Titles with Abstracts_2023-2024_Cyber Security.pdf
Titles with Abstracts_2023-2024_Cyber Security.pdfTitles with Abstracts_2023-2024_Cyber Security.pdf
Titles with Abstracts_2023-2024_Cyber Security.pdfinfo751436
 
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...IJNSA Journal
 
Safety monitoring to prevent fall accidents at construction site
Safety monitoring to prevent fall accidents at construction siteSafety monitoring to prevent fall accidents at construction site
Safety monitoring to prevent fall accidents at construction siteIAEME Publication
 
Cyber security: challenges for society- literature review
Cyber security: challenges for society- literature reviewCyber security: challenges for society- literature review
Cyber security: challenges for society- literature reviewIOSR Journals
 
Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and ChallengesInformation Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and Challengesijtsrd
 

Similar to Ijciet 10 02_001 (20)

A LIGHTWEIGHT METHOD FOR DETECTING CYBER ATTACKS IN HIGH-TRAFFIC LARGE NETWOR...
A LIGHTWEIGHT METHOD FOR DETECTING CYBER ATTACKS IN HIGH-TRAFFIC LARGE NETWOR...A LIGHTWEIGHT METHOD FOR DETECTING CYBER ATTACKS IN HIGH-TRAFFIC LARGE NETWOR...
A LIGHTWEIGHT METHOD FOR DETECTING CYBER ATTACKS IN HIGH-TRAFFIC LARGE NETWOR...
 
A Lightweight Method for Detecting Cyber Attacks in High-traffic Large Networ...
A Lightweight Method for Detecting Cyber Attacks in High-traffic Large Networ...A Lightweight Method for Detecting Cyber Attacks in High-traffic Large Networ...
A Lightweight Method for Detecting Cyber Attacks in High-traffic Large Networ...
 
DEVELOPMENT OF A CONCEPTUAL MODEL OF ADAPTIVE ACCESS RIGHTS MANAGEMENT WITH U...
DEVELOPMENT OF A CONCEPTUAL MODEL OF ADAPTIVE ACCESS RIGHTS MANAGEMENT WITH U...DEVELOPMENT OF A CONCEPTUAL MODEL OF ADAPTIVE ACCESS RIGHTS MANAGEMENT WITH U...
DEVELOPMENT OF A CONCEPTUAL MODEL OF ADAPTIVE ACCESS RIGHTS MANAGEMENT WITH U...
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
Analytic Hierarchy Process-based Fuzzy Measurement to Quantify Vulnerabilitie...
Analytic Hierarchy Process-based Fuzzy Measurement to Quantify Vulnerabilitie...Analytic Hierarchy Process-based Fuzzy Measurement to Quantify Vulnerabilitie...
Analytic Hierarchy Process-based Fuzzy Measurement to Quantify Vulnerabilitie...
 
Analytic Hierarchy Process-based Fuzzy Measurement to Quantify Vulnerabilitie...
Analytic Hierarchy Process-based Fuzzy Measurement to Quantify Vulnerabilitie...Analytic Hierarchy Process-based Fuzzy Measurement to Quantify Vulnerabilitie...
Analytic Hierarchy Process-based Fuzzy Measurement to Quantify Vulnerabilitie...
 
ANALYTIC HIERARCHY PROCESS-BASED FUZZY MEASUREMENT TO QUANTIFY VULNERABILITIE...
ANALYTIC HIERARCHY PROCESS-BASED FUZZY MEASUREMENT TO QUANTIFY VULNERABILITIE...ANALYTIC HIERARCHY PROCESS-BASED FUZZY MEASUREMENT TO QUANTIFY VULNERABILITIE...
ANALYTIC HIERARCHY PROCESS-BASED FUZZY MEASUREMENT TO QUANTIFY VULNERABILITIE...
 
ONTOLOGY-BASED MODEL FOR SECURITY ASSESSMENT: PREDICTING CYBERATTACKS THROUGH...
ONTOLOGY-BASED MODEL FOR SECURITY ASSESSMENT: PREDICTING CYBERATTACKS THROUGH...ONTOLOGY-BASED MODEL FOR SECURITY ASSESSMENT: PREDICTING CYBERATTACKS THROUGH...
ONTOLOGY-BASED MODEL FOR SECURITY ASSESSMENT: PREDICTING CYBERATTACKS THROUGH...
 
Classification of Malware Attacks Using Machine Learning In Decision Tree
Classification of Malware Attacks Using Machine Learning In Decision TreeClassification of Malware Attacks Using Machine Learning In Decision Tree
Classification of Malware Attacks Using Machine Learning In Decision Tree
 
Security against Web Application Attacks Using Ontology Based Intrusion Detec...
Security against Web Application Attacks Using Ontology Based Intrusion Detec...Security against Web Application Attacks Using Ontology Based Intrusion Detec...
Security against Web Application Attacks Using Ontology Based Intrusion Detec...
 
PREDICTIVE CYBER SECURITY ANALYTICS FRAMEWORK: A NONHOMOGENOUS MARKOV MODEL F...
PREDICTIVE CYBER SECURITY ANALYTICS FRAMEWORK: A NONHOMOGENOUS MARKOV MODEL F...PREDICTIVE CYBER SECURITY ANALYTICS FRAMEWORK: A NONHOMOGENOUS MARKOV MODEL F...
PREDICTIVE CYBER SECURITY ANALYTICS FRAMEWORK: A NONHOMOGENOUS MARKOV MODEL F...
 
A Review on Data Falsification-Based attacks In Cooperative Intelligent Trans...
A Review on Data Falsification-Based attacks In Cooperative Intelligent Trans...A Review on Data Falsification-Based attacks In Cooperative Intelligent Trans...
A Review on Data Falsification-Based attacks In Cooperative Intelligent Trans...
 
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
 
A STUDY ON CYBER SECURITY AND ITS RISKS K. Jenifer
A STUDY ON CYBER SECURITY AND ITS RISKS  K. JeniferA STUDY ON CYBER SECURITY AND ITS RISKS  K. Jenifer
A STUDY ON CYBER SECURITY AND ITS RISKS K. Jenifer
 
Titles with Abstracts_2023-2024_Cyber Security.pdf
Titles with Abstracts_2023-2024_Cyber Security.pdfTitles with Abstracts_2023-2024_Cyber Security.pdf
Titles with Abstracts_2023-2024_Cyber Security.pdf
 
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
 
Safety monitoring to prevent fall accidents at construction site
Safety monitoring to prevent fall accidents at construction siteSafety monitoring to prevent fall accidents at construction site
Safety monitoring to prevent fall accidents at construction site
 
Cyber security: challenges for society- literature review
Cyber security: challenges for society- literature reviewCyber security: challenges for society- literature review
Cyber security: challenges for society- literature review
 
H1803025360
H1803025360H1803025360
H1803025360
 
Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and ChallengesInformation Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 

Recently uploaded (20)

Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 

Ijciet 10 02_001

  • 1. http://www.iaeme.com/IJCIET/index.asp 1 editor@iaeme.com International Journal of Civil Engineering and Technology (IJCIET) Volume 10, Issue 02, February 2019, pp. 1–9, Article ID: IJCIET_10_02_001 Available online at http://www.iaeme.com/ijciet/issues.asp?JType=IJCIET&VType=10&IType=2 ISSN Print: 0976-6308 and ISSN Online: 0976-6316 ©IAEME Publication Scopus Indexed MODEL OF INDICATOR OF CURRENT RISK OF THREATS REALIZATION ON THE INFORMATION COMMUNICATION SYSTEM OF TRANSPORT V. Lakhno Professor, Department of Computer Systems and Networks, National University of Life and Environmental Sciences of Ukraine, Kyiv, Ukraine O. Kryvoruchko Professor, Head of Department of Software Engineering and Cyber Security National University of Trade and Economics, Kyiv, Ukraine H. Mohylnyi PhD., Department of Information Technologies and Systems, Luhansk Taras Shevchenko National University, Starobilsk, Ukraine M. Semenov PhD., Department of Information Technologies and Systems, Luhansk Taras Shevchenko National University, Starobilsk, Ukraine I. Kiryeyev PhD., Department of Information Technologies and Systems, Luhansk Taras Shevchenko National University, Starobilsk, Ukraine V. Matiievskyi Department of Information Technologies and Systems, Luhansk Taras Shevchenko National University, Starobilsk, Ukraine V. Donchenko Department of Information Technologies and Systems, Luhansk Taras Shevchenko National University, Starobilsk, Ukraine ABSTRACT The paper proposed a model for estimating the quantitative indicator of current risks of threats and cyberattacks realization on information communication systems of transport (ICST), that differs from the existing models with ability to take into account the degree of influence of each threat or cyberattack within the class on the probability of an emergency situation that arises at cyber-attacks on components of
  • 2. Model of Indicator of Current Risk of Threats Realization on the Information Communication System of Transport http://www.iaeme.com/IJCIET/index.asp 2 editor@iaeme.com information communication systems of transport, which in many cases can be attributed to critical computer systems. For approbation of the proposed model the simulation experiment was conducted, the results of which also are presented in the article. Simulation modeling is also carried out for verification of adequacy of the proposed model and algorithm of estimation of current risks for components of ICST. It is considered that many components of ICST work in real time. It is shown that the proposed model takes into account current values of information security metrics and new classes of cyberthreats for ICST. Key words: Information communication systems of transport, mathematical model, indicator of current risk, cybersecurity, information security. Cite this Article: V. Lakhno, O. Kryvoruchko, H. Mohylnyi, M. Semenov, I. Kiryeyev, V. Matiievskyi, V. Donchenko, Model of Indicator of Current Risk of Threats Realization on the Information Communication System of Transport, International Journal of Civil Engineering and Technology (IJCIET) 10(2), 2019, pp. 1–9. http://www.iaeme.com/IJCIET/issues.asp?JType=IJCIET&VType=10&IType=2 1. INTRODUCTION Information security and cybersecurity of information communication systems of transport (ICST) requires accounting for all events that occur. In particular, events in the process of which digital information is created, modified, accessed or transmitted [1, 2]. Implementation of these measures is the requirement of the international standard ISO/IEC 27001:2013 “Information security management systems – Requirements”. The need to use of monitoring systems for information security (IS) in ICST is determined by the fact that the use of conventional measures and mechanisms of information security is inadequate [3]. In particular, because they perform only basic functions and do not allow to control the safety of the systems functioning in conditions of permanent modifications of cyberattacks. Existing security monitoring systems are not able to conduct a comprehensive assessment of hackers' actions, build a sequence of implemented vulnerabilities, determine the ultimate goal of the attacker and assess the risks of threats realization to security systems, which can lead to repeated successful attacks, as well as to financial losses. Existing monitoring tools of IS, such as, Intruder Alert, Real Secure Network Sensor [3– 5] and others, have some drawbacks: high level of type I and type II errors, that is, errors are not the definition of a cyberattack, when it occurs, and the formation of an "attack" situation in its absence; lack of ability to adaptively manage system of IS and to conduct preventive actions. Reducing the risks of unauthorized access to information resources of ICST can be achieved by solving the problem of assessing and analyzing the current threat of the process of computer attack in real time, in order to prevent the attack in a timely manner and thereby prevent the development of an unfavorable scenario for the development of this situation. Obviously, in order to take into account, the influence of numerous parameters of anomalies and cyberattacks on the degree of IS ICST, as well as their interconnections of systems in real time, special methods and corresponding organizational, technical and software tools are necessary. So, the topic of the study is relevant.
  • 3. V. Lakhno, O. Kryvoruchko, H. Mohylnyi, M. Semenov, I. Kiryeyev, V. Matiievskyi, V. Donchenko http://www.iaeme.com/IJCIET/index.asp 3 editor@iaeme.com 2. LITERATURE REVIEW AND PROBLEM POSING Analysis of previous studies allowed to determine the list of potential current risks, which allows to determine the most topical threats for ICST and measures to counter them, as well as to optimize the cost of building a system of protection [5–7]. One of the most common methods of risk assessment is the method based on the full coverage of system, which is a triad "threats – information security measure– protection objects" in the form of a trilogy graph [8, 9]. During the risk assessment, three tasks can be distinguished, reflecting the goals of such an assessment: 1) risk assessment at the objects of ICST not equipped with modern information security measures (ISM), in order to find out the need to create complexes of information security systems (ISS); 2) risk assessment of cyber threats realization in order to modernize the existing complexes of ISS; 3) risk assessment in order to create a new complex of ISS. It should be noted that a certain quantitative characterization of the risk of unauthorized access (UA) to ICST has already been introduced in the normative documentation and in the studies of a number of authors [3, 6, 8, 10]. According to these sources, as a quantitative characteristic of the risk of penetration in ICST, the risk is considered, measured, as a rule, in monetary units, which is not always of paramount importance for critical systems. Consequently, it is necessary to calculate the risk for all three formulations of the design task. Consideration of the real connections between threats and resources leads to the fact that the risk should be determined with taking into account the values of elements of the matrix of relationships, the values of which are equal to 0 - if the threat cannot affect the resource, and equal to 1 - if the threat potentially can affect the information resource. 3. GOAL AND OBJECTIVES OF THE STUDY Research goal is to develop a model of indicator for assessment of the current risk of threats realization on the information communication system of transport. To achieve the research goal, it is necessary to develop: 1) obtain a quantitative indicator of the current risks (ICR) of the implementation of threats on ICST; 2) to develop algorithms for estimating ICR for ICST components operating in real time, taking into account current values of information security metrics and new classes of cyber threats. 4. MODELS AND METHODS The current risks and threats of cyberattacks or unauthorized access are indicators of technological processes in ICST, which can acquire different values depending on various factors [7]. It is intuitively clear that current risks may be insignificant if all potentially dangerous ICST parameters are maintained within established limits or increased, becoming threatening, with the deviation of such parameters from the norm. Therefore, it is necessary to describe the degree of current risk of cyberattack threats realization with some quantitative indicator, the value of which would depend on the deviations of the parameters associated with the IS. The introduction of such an indicator will allow for indirect measurement of the degree of current risks of cyberattack threat realization on ICST.
  • 4. Model of Indicator of Current Risk of Threats Realization on the Information Communication System of Transport http://www.iaeme.com/IJCIET/index.asp 4 editor@iaeme.com We propose to introduce a special indicator for the quantitative characterization of the current attack hazard level or unauthorized access to ICST, which can be calculated (measured) at any given time, in particular, using intelligent detection methods for threats [7, 10]. The results of the measurements of the indicator can be presented to the system administrator (administrator of ISS) or used for other tasks. If processes in ICST are characterized by the risks of implementing IS threats, all of which lie in the zone of permissible values of 0ZS (see Figure 1), then the current IS can be considered as zero. If one or more parameters are transferred to the zone of unsafe values 1ZS , the current risk increases, and it will increase with the parameters to the zone of critical values 2ZS . LL L H HH ZS0 ZS1 ZS2ZS1ZS2 Zone of permissible values Zone of unsafe values Zone of critical values Zone of unsafe values Zone of critical values Warning value Warning valueMaximum permissible value Maximum permissible value Figure 1 Risks of the threat’s realization to information security of ICST It is clear that the current danger of penetration in ICST should depend on the total number of threats of information - MI , which are simultaneously in the zone 1ZS , from the degree of approximation of each parameter to the zone 2ZS and the degree of exposure of each threat to the possibility of an unordinary situation emergence, for example, gaining access to resources of ICST. Denote ICR through ( )CRI CRIC C X , where 1( ,..., ,..., )CRI CRI CRIi CRI MIX x x x - the vector values of the ICR, MI - the number of threats to information. The current risk indicator CRIC should meet these requirements. 1. Be scalar with a non-dimensional variable that varies from 0 to 1 ( (0 1)CRIC   ) taking into account the algorithm work of DDP IS. 2. Be the function of the parameters iCRIx 1(( ,..., ,..., ).CRI CRI CRIi CRI MC f x x x 3. Values of CRIC should depend on the values of all the risks of threats realization to the components and processes in ICST, when they are in the zone of unsafe values 0 < CRIC < 1. i 1 i (x ) : , 1.. ; (x ) : ( ) ( ), CRI i CRI CRI ill CRI i CRI il CRI ih CRI i CRI ihh if ZS ZS i MI or x x x x x x           (1)
  • 5. V. Lakhno, O. Kryvoruchko, H. Mohylnyi, M. Semenov, I. Kiryeyev, V. Matiievskyi, V. Donchenko http://www.iaeme.com/IJCIET/index.asp 5 editor@iaeme.com where ,CRI il CRI ihx x  warning values of indicators; ,CRI ill CRI ihhx x  maximum permissible values of indicators. 4. The value of the ICR of the IS of ICST is zero if all the parameters of the information processes in the ICST are in the zone of permissible values 0CRIC  , i 0(x ) : , 1.. .CRI iif ZS ZS i MI   5. The value of ICR is equal to one if at least one technological parameter of the ICST (see [7, 10, 11]) is in the zone of critical values 1CRIC  , i 2(x ) : , 1.. .CRI iif ZS ZS i MI   (2) 6. The value of CRIC should be increasing function of its arguments. If 1CRIC – the value of the indicator CRIC when 1CRI i CRIx x , 2CRIC – the value of the indicator CRIC when 1CRI j CRIjx x , and if degree of influence of CRI ix is less than degree of influence CRI jx , then 1 2CRI CRIС С . 7. The value of CRIC should increase with an increase in the number of threats and attacks – data on incidents of IS in the zones ZS1, ZS2. If 1CRIC – the value of the indicator CRIC when 1 1,CRI i CRI i ix x ZS ZS  , 2CRIC – the value of the indicator CRIC when 1 1 1 1 1 2 , , , . CRI i CRI i CRI j CRI j i j CRI CRI x x x x ZS ZS ZS ZS else С С      (3) 8. Indicator CRIC should take into account the degree of influence of each threat within the class iKL to the possibility of an emergency situation that occurs when attacking components of ICST. If 1CRIC – the value of the indicator CRIC when 1CRI i CRIx x , 2CRIC – the value of the indicator CRIC when 1CRI j CRIjx x , and if degree of influence of CRI ix is less than degree of influence then CRI jx , then 1 2CRI CRIС С . 9. The value CRIC should be applicable in any mode of operation of ICST. Calculations of ICR of UA in ICST are based on this dependence: 2 2 1 2 22 2 ( ) . (1 ) (1 ) MI CRI CRIi CRI MI MI i CRIi CRIk i k i x x C X x x          (4) The formula for calculating of CRIC the value when used in ICST requires special algorithm for valuation and ordering of parameters MI . Research of the algorithm and the main properties of the ICR is carried out with the help of the software package Mathcad.
  • 6. Model of Indicator of Current Risk of Threats Realization on the Information Communication System of Transport http://www.iaeme.com/IJCIET/index.asp 6 editor@iaeme.com Suppose that any CRIC can have one or two areas of dangerous values (H – high and L – low). If the parameter  1CRI ix i MI  has one or two zones of dangerous values, then the conversion of its current value to the normalized value i is performed by the formula (5): i i i l i i i i i 1, x , , x , 0, x , , x , 1, x , i ll CRI CRI i ll CRI i CRI ll l CRI CRI CRI il ll i i h i CRI CRI CRI i h CRI i CRI i h l CRI CRI CRI ihh h CRI i CRI i hh CRI CRI i if x x x if x x x x if x x x x if x x x x if x                      (5) where ixCRI – current value of indicator; ,l h CRI i CRI ix x – warning values of indicators; ,ll hh CRI i CRI ix x – maximum permissible values of indicators. The degree of influence of each factor on the possibility of threat realization to IS at deviation of this parameter from the norm, is determined by ranking, that is, assigning a parameter to a certain coefficient (rank). The rank of the parameter Кr represents a positive integer value: Кr = 1, 2, .... The model was tested during the simulation experiment. 5. SIMULATION EXPERIMENT Figure 2, 3 show, for example, the dependencies of ICR CRIC on the parameters of the parameters ixCRI and i for MI =1, 2 and Кr = 1, 2 (for example, the key abduction for the GSM-R communication system and the organization of the DoS / DDoS attack on the train control system). Figure 2 Dependencies  i 1CRIC  for MI=1 і 2 & Kr1 = Kr2 = 2 Figure 3 Dependencies  i 1CRIC  for MI=2, Kr1 > Kr2 & Kr1 < Kr2
  • 7. V. Lakhno, O. Kryvoruchko, H. Mohylnyi, M. Semenov, I. Kiryeyev, V. Matiievskyi, V. Donchenko http://www.iaeme.com/IJCIET/index.asp 7 editor@iaeme.com 6. RESULTS AND DISCUSSION As a result of the analysis of these and other dependencies obtained during the simulation experiment, as well as those investigated in papers [5, 7, 11–22], the following conclusions were made: 1. 0CRIC  , if all i are equal to 0. 2. 1CRIC  , if at least one parameter i is equal to 1. 3. 0 1CRIC  , if at least one parameter i is greater than zero and less than 1 (the corresponding parameter xi is in the danger zone). 4. If, when one or more parameters are found in the zone of unsafe values, another parameter also enters this zone, then the indicator CRIC increases. 5. If the number of current threats IS MI = 1 and Kr1 = 1, then 1CRIC  , that is, the ICR CRIC is proportional to the parameter 1 . 6. If MI = 1 and Kr1 = 2, then the dependence CRIC from 1 is nonlinear. In this case, CRIC more than with Кr1 = 1 for the same values 1 . 7. If MI> 1, then all dependencies CRIC from 1 are nonlinear. At the same time, the value of the indicator CRIC is higher, the more parameters are in the unsafe zone. 8. The higher the rank of parameters, which are in the unsafe zone, the higher level has indicator CRIC for other equal conditions [23–25]. A certain disadvantage of work at this stage of research is insufficient approbation of results. But our research is continuing and eventually their results will be presented in the following publications. 7. GRATITUDES The research and the article were done within the framework of promising scientific and technical programs of the Department of Computer Systems and Networks of the National University of Life and Environmental Sciences of Ukraine, as well as the grant of the Republic of Kazakhstan, registration number AP05132723 “Development of adaptive expert systems in the area of cybersecurity of critical objects of informatization”. 8. CONCLUSIONS Thus, according to the results of the research, the following results were obtained: The model was developed to assess the quantitative indicator of current risks of threats and cyberattacks realization on information communication systems of transport (ICST), which differs from existing ones by ability to take into account the degree of influence of each threat or cyberattack within the class, on the probability of emergencies that occurs when cyberattacks on ICST components; Simulation modeling was performed to verify the adequacy of the proposed model and algorithm for assessing the current risk indicator for ICST components operating in real time, taking into account current values of information security metrics and new classes of cyber threats for ICST.
  • 8. Model of Indicator of Current Risk of Threats Realization on the Information Communication System of Transport http://www.iaeme.com/IJCIET/index.asp 8 editor@iaeme.com REFERENCES [1] Al Hadidi, M., Ibrahim, Y. K., Lakhno, V., Korchenko, A., Tereshchuk, A., & Pereverzev, A. (2016). Intelligent systems for monitoring and recognition of cyberattacks on information and communication systems of transport. International Review on Computers and Software, 11(12), pp. 1167-1177. [2] Alcaraz, C., Zeadally, S. (2013). Critical control system protection in the 21st century, Computer, 46 (10), pp. 74-83. [3] Vacca, J.R. (2010). Managing Information Security, Syngress, p. 320. [4] Lopez, I., Aguado, M. (2015). Cyber security analysis of the European train control system, IEEE Communications Magazine, 53(10), pp. 110-116. [5] Lakhno, V., & Hrabariev, A. (2016). Improving the transport cyber security under destructive impacts on information and communication systems. Eastern-European Journal of Enterprise Technologies, 1(3), 4, pp. 4-11. [6] Dunn, W. (2002). Practical Design of Safety-Critical Systems, Reliability Press, Cambridge. [7] Lakhno, V. (2016). Creation of the adaptive cyber threat detection system on the basis of fuzzy feature clustering, Eastern-European Journal of Enterprise Technologies, Vol. 2, Iss. 9, 2016, pp. 18-25. [8] Beketova, G. S., Akhmetov, B. S., Korchenko, A. G. etc. (2017). Optimization backup model for critical important information systems. Bulletin of the national academy of sciences of the republic of Kazakhstan, (5), pp. 37-44. [9] Lakhno, V.A., Kravchuk, P.U., Malyukov, V.P., Domrachev, V.N., Myrutenko, L.V., Piven, O.S. (2017). Developing of the cyber security system based on clustering and formation of control deviation signs, Journal of Theoretical and Applied Information Technology, Vol. 95, Iss. 21, pp. 5778-5786. [10] Lakhno, V., Zaitsev, S., Tkach, Y. etc. (2019). Adaptive expert systems development for cyber-attacks recognition in information educational systems on the basis of signs' clustering, Advances in Intelligent Systems and Computing, 1st International Conference on Computer Science, Engineering and Education Applications, ICCSEEA2018; Kiev; Ukraine; 18 January 2018, Vol. 754, pp. 673-682. [11] Akhmetov, B., Lakhno, V., Akhmetov, B., Alimseitova, Z. (2019). Development of sectoral intellectualized expert systems and decision-making support systems in cybersecurity, Advances in Intelligent Systems and Computing, 2nd Computational Methods in Systems and Software, CoMeSySo 2018; Szczecin; Poland; 12 September 2018, Vol. 860, pp. 162-171. [12] Akhmetov, B., etc. (2018). Models and Algorithms of Vector Optimization in Selecting Security Measures for Higher Education Institution’s Information Learning Environment. In Proceedings of the Computational Methods in Systems and Software (pp. 135–142). Springer, Cham. [13] Lakhno, V., Tkach, Y., Petrenko, T., Zaitsev, S. & Bazylevych, V. (2016). Development of adaptive expert system of information security using a procedure of clustering the attributes of anomalies and cyber-attacks. Eastern European Journal of Enterprise Technologies, 6/9 (84), pp. 32–44. [14] Lakhno, V., Akhmetov, B., Korchenko, A., Alimseitova, Z., Grebenuk, V. (2018). Development of a decision support system based on expert evaluation for the situation center of transport cybersecurity. Journal of Theoretical and Applied Information Technology, 96 (14), pp. 4530–4540.
  • 9. V. Lakhno, O. Kryvoruchko, H. Mohylnyi, M. Semenov, I. Kiryeyev, V. Matiievskyi, V. Donchenko http://www.iaeme.com/IJCIET/index.asp 9 editor@iaeme.com [15] Lakhno, V., Buriachok, V., Parkhuts, L. etc. (2018). Development of a conceptual model of adaptive access rights management with using the apparatus of Petri nets. International Journal of Civil Engineering & Technology (IJCIET), Vol. 9, Iss. 11, pp. 95–104. [16] Akhmetov, B., Kydyralina, L. etc. (2018). Model for a computer decision support system on mutual investment in the cybersecurity of educational institutions, International Journal of Mechanical Engineering & Technology (IJMET), Vol. 9, Iss. 10, pp. 1114–1122. [17] Borowik, B., Karpinskyy, M., Lahno, V., & Petrov, O. (2012). Theory of Digital Automata (Vol. 63). Springer Science & Business Media. [18] Smirniy, M., etc. (2009). The research of the conflict request threads in the data protection systems. Proceedings of Lugansk branch of the International Academy of Informatization, 2(20), pp. 23–30. [19] Akhmetov, B. B. etc. (2018). The Choice of Protection Strategies during the Bilinear Quality Game on Cyber Security Financing. Bulletin of the national academy of sciences of the republic of Kazakhstan, (3), pp. 6–14. [20] Petrov, A., etc. (2016). Models, methods and information technologies of protection of corporate systems of transport based on intellectual identification of threats. Decision Making in Manufacturing and Services, 9(2), pp. 117–135. [21] Lakhno V., Tsiutsiura S., Ryndych Y., Blozva A., Desiatko A., Usov Y. and S. Kaznadiy. (2019). Optimization of information and communication transport systems protection tasks. International Journal of Civil Engineering & Technology (IJCIET), Vol. 10, Iss. 1, рр. 1–9. [22] V. Lakhno, D. Kasatkin, V. Kozlovskyi, S. Petrovska, Y. Boiko, P. Kravchuk, N. Lishchynovska (2019). A Model and algorithm for detecting spyware in medical information systems, International Journal of Mechanical Engineering & Technology, Vol. 10, Iss. pp. 287–295. [23] Akhmetov, B. еtс. (2017). Designing a decision support system for the weakly formalized problems in the provision of cybersecurity, Eastern-European Journal of Enterprise Technologies, (1 (2)), 4–15. [24] Smirniy, M. еtс. (2009). The research of the conflict request threads in the data protection systems. Proceedings of Lugansk branch of the International Academy of Informatization, 2(20), pp. 23–30. [25] Petrov, B. B., & Karpinskyy, M. (2016). Immune and defensive corporate systems with intellectual identification of threats. Śląska Oficyna Drukarska, Pszczyna, 222 p.