Igor Saenko
YOU?
Author Swipe
View article: Machine Learning Based Detection of Anomalous User Behavior in University Data Centers
Machine Learning Based Detection of Anomalous User Behavior in University Data Centers Open
Anomalies in the work of data center users can be caused by both Structured Query Language (SQL) injection attacks and user attempts to make unauthorized access to data. The paper explores various machine learning models to detect such ano…
View article: AN APPROACH TO EXPLAINABLE ANOMALY DETECTION IN DATA STREAMS FROM TECHNOLOGICAL SYSTEMS
AN APPROACH TO EXPLAINABLE ANOMALY DETECTION IN DATA STREAMS FROM TECHNOLOGICAL SYSTEMS Open
The purpose of the study: development of an approach to identify anomalies in process data based on explainable machine learning in order to further select countermeasures taking into account possible sources of anomalies. Research methods…
View article: A METHOD OF COUNTERING ADVERSARIAL ATTACKS ON IMAGE CLASSIFICATION SYSTEMS
A METHOD OF COUNTERING ADVERSARIAL ATTACKS ON IMAGE CLASSIFICATION SYSTEMS Open
The purpose of the study: development and evaluation of a method for countering FGSM, ZOO, OPA adversarial attacks on image classification systems based on the integration of noise pollution, neural cleansing and JPEG data compression. Res…
View article: Optimization of Information Resources Distribution in Common Information Space
Optimization of Information Resources Distribution in Common Information Space Open
The article solves the problem of optimal distribution of information resources across the storage nodes of a common information space. The relevance of the work is due to the contradictions between the required level of timeliness in a co…
View article: ATTACKS AND DEFENSE METHODS IN MACHINE LEARNING SYSTEMS: ANALYSIS OF MODERN RESEARCH
ATTACKS AND DEFENSE METHODS IN MACHINE LEARNING SYSTEMS: ANALYSIS OF MODERN RESEARCH Open
Цель исследования: проведение анализа атак на системы машинного обучения и методов защиты от них на основе известных обзорных статей, опубликованных за последние пять лет в высокорейтинговых журналах.
View article: ATTACKS AND DEFENSE METHODS IN MACHINE LEARNING SYSTEMS: ANALYSIS OF MODERN RESEARCH
ATTACKS AND DEFENSE METHODS IN MACHINE LEARNING SYSTEMS: ANALYSIS OF MODERN RESEARCH Open
Цель исследования: проведение анализа атак на системы машинного обучения и методов защиты от них на основе известных обзорных статей, опубликованных за последние пять лет в высокорейтинговых журналах.
View article: Modeling the Development of Energy Network Software, Taking into Account the Detection and Elimination of Vulnerabilities
Modeling the Development of Energy Network Software, Taking into Account the Detection and Elimination of Vulnerabilities Open
This paper solves the problem of modeling the scheme for developing software systems, which can be used in building solutions for secure energy networks. A development scheme is proposed in a set of representations through which each progr…
View article: Ensuring SDN Resilience under the Influence of Cyber Attacks: Combining Methods of Topological Transformation of Stochastic Networks, Markov Processes, and Neural Networks
Ensuring SDN Resilience under the Influence of Cyber Attacks: Combining Methods of Topological Transformation of Stochastic Networks, Markov Processes, and Neural Networks Open
The article proposes an approach to ensuring the functioning of Software-Defined Networks (SDN) in cyber attack conditions based on the analytical modeling of cyber attacks using the method of topological transformation of stochastic netwo…
View article: DETECTING ABNORMAL BEHAVIOUR OF USERS OF DATA PROCESSING CENTRES OF HIGHER EDUCATION INSTITUTIONS
DETECTING ABNORMAL BEHAVIOUR OF USERS OF DATA PROCESSING CENTRES OF HIGHER EDUCATION INSTITUTIONS Open
ВЫЯВЛЕНИЕ АНОмАЛЬНОгО ПОВЕдЕНИЯ ПОЛЬзОВАТЕЛЕЙ цЕНТрОВ ОБрАБОТКИ дАННЫХ ВУзОВКотенко И.В. 1 , Саенко И
View article: Subsystem for Prevention of Computer Attacks Against Objects of Critical Information Infrastructure: Analysis of Functioning and Implementation
Subsystem for Prevention of Computer Attacks Against Objects of Critical Information Infrastructure: Analysis of Functioning and Implementation Open
The purpose of the article: conducting a system analysis of the requirements for the subsystem for preventing computer attacks on critical information infrastructure in order to substantiate the directions for further improved scientific a…
View article: Computer attack models on software-configurable networks
Computer attack models on software-configurable networks Open
SDN technology in the near future will allow to introduce aspects of the openness of the code of the network component of the cloud infrastructure, which is considered the most favorable basis for the development and implementation of a wi…
View article: MANAGEMENT OF ACCESS TO ELECTRONIC INFORMATION AND EDUCATIONAL ENVIRONMENT OF UNIVERSITIES OF FEDERAL EXECUTIVE AUTHORITIES
MANAGEMENT OF ACCESS TO ELECTRONIC INFORMATION AND EDUCATIONAL ENVIRONMENT OF UNIVERSITIES OF FEDERAL EXECUTIVE AUTHORITIES Open
The purpose of the article: analysis of the problem of ensuring timely authorized access to the resources of the electronic information and educational environment of universities of federal executive authorities and identification of poss…
View article: Anomaly and Cyber Attack Detection Technique Based on the Integration of Fractal Analysis and Machine Learning Methods
Anomaly and Cyber Attack Detection Technique Based on the Integration of Fractal Analysis and Machine Learning Methods Open
In modern data transmission networks, in order to constantly monitor network traffic and detect abnormal activity in it, as well as identify and classify cyber attacks, it is necessary to take into account a large number of factors and par…
View article: A Proactive Protection of Smart Power Grids against Cyberattacks on Service Data Transfer Protocols by Computational Intelligence Methods
A Proactive Protection of Smart Power Grids against Cyberattacks on Service Data Transfer Protocols by Computational Intelligence Methods Open
The article discusses an approach to the construction and operation of a proactive system for protecting smart power grids against cyberattacks on service data transfer protocols. It is based on a combination of computational intelligence …
View article: Application of Artificial Neural Networks to Reveal Abnormal Behavior of Data Center Users
Application of Artificial Neural Networks to Reveal Abnormal Behavior of Data Center Users Open
The purpose of the article: development of the method for detecting anomalous behavior of users of data centers based on the use of artificial neural networks. Research method: theoretical and system analysis of open data sources for detec…
View article: An approach for selecting countermeasures against harmful information based on uncertainty management
An approach for selecting countermeasures against harmful information based on uncertainty management Open
Currently, one of the big problems in the Internet is the counteraction against the spread of harmful information. The paper considers models, algorithms and a common technique for choosing measures to counter harmful information, based on…
View article: Methodology for Management of the Protection System of Smart Power Supply Networks in the Context of Cyberattacks
Methodology for Management of the Protection System of Smart Power Supply Networks in the Context of Cyberattacks Open
This paper examines an approach that allows one to build an efficient system for protecting the information resources of smart power supply networks from cyberattacks based on the use of graph models and artificial neural networks. The pos…
View article: Evaluating the Functioning Quality of Data Transmission Networks in the Context of Cyberattacks
Evaluating the Functioning Quality of Data Transmission Networks in the Context of Cyberattacks Open
Cyberattacks against the elements of technological data transmission networks represent a rather significant threat of disrupting the management of regional electric power complexes. Therefore, evaluating the functioning quality of data tr…
View article: Intelligent System of Analytical Processing of Digital Network Content for Protection against Inappropriate Information
Intelligent System of Analytical Processing of Digital Network Content for Protection against Inappropriate Information Open
Currently, the Internet and social networks as a medium for the distribution of digital network content are becoming one of the most important threats to personal, public and state information security. There is a need to protect the indiv…
View article: Selection of countermeasures against propagation of harmful information via Internet
Selection of countermeasures against propagation of harmful information via Internet Open
Today, Internet allows accessing and propagation various information. Some of this information can be undesired for particular user or even harmful. While there are quite a large number of systems to respond to unwanted and harmful informa…
View article: NETWORK APPLICATION-LAYER PROTOCOL CLASSIFICATION BASED ON FUZZY DATA AND NEURAL NETWORK PROCESSING
NETWORK APPLICATION-LAYER PROTOCOL CLASSIFICATION BASED ON FUZZY DATA AND NEURAL NETWORK PROCESSING Open
A technique of network packet classification on the application layer is proposed. It is based on fuzzy data processing and artificial neural networks to define the network packet belongingness to one of the known network protocols. In the…
View article: An Approach to Detecting Cyber Attacks against Smart Power Grids Based on the Analysis of Network Traffic Self-Similarity
An Approach to Detecting Cyber Attacks against Smart Power Grids Based on the Analysis of Network Traffic Self-Similarity Open
The paper discusses an approach for detecting cyber attacks against smart power supply networks, based on identifying anomalies in network traffic by assessing its self-similarity property. Methods for identifying long-term dependence in f…
View article: Increasing the Sensitivity of the Method of Early Detection of Cyber-Attacks in Telecommunication Networks Based on Traffic Analysis by Extreme Filtering
Increasing the Sensitivity of the Method of Early Detection of Cyber-Attacks in Telecommunication Networks Based on Traffic Analysis by Extreme Filtering Open
The paper proposes a method for improving the accuracy of early detection of cyber attacks with a small impact, in which the mathematical expectation is a fraction of the total, and the pulse repetition period is quite long. Early detectio…
View article: Model and method for diagnosing computer incidents in information and communication systems based on deep machine learning
Model and method for diagnosing computer incidents in information and communication systems based on deep machine learning Open
Introduction: Models and methods for diagnosing computer incidents recorded in information and communication systems are the most important components in mathematical support of information security systems. The main requirement for the di…
View article: Method of Early Detection of Cyber-Attacks on Telecommunication Networks Based on Traffic Analysis by Extreme Filtering
Method of Early Detection of Cyber-Attacks on Telecommunication Networks Based on Traffic Analysis by Extreme Filtering Open
The paper suggests a method of early detection of cyber-attacks by using DDoS attacks as an example) using the method of extreme filtering in a mode close real time. The process of decomposition of the total signal (additive superposition …
View article: A role-base approach and a genetic algorithm for VLAN design in large critical infrastructures
A role-base approach and a genetic algorithm for VLAN design in large critical infrastructures Open
The use of the virtual local area networks (VLAN) technology is a well-known method of restricting access to network elements in heterogeneous network infrastructures, including critical infrastructures. The essence of the VLAN usage is to…
View article: The Technique of Multi-aspect Evaluation and Categorization of Malicious Information Objects on the Internet
The Technique of Multi-aspect Evaluation and Categorization of Malicious Information Objects on the Internet Open
Under the influence of rapid development in the sphere of information technologies, rises the challenge related to detection of malicious information sources on the Internet. To solve this we can use machine learning methods as one of the …
View article: Genetic algorithms for role mining in critical infrastructure data spaces
Genetic algorithms for role mining in critical infrastructure data spaces Open
In the paper, a Role Mining problem, which is the cornerstone for creating Role-Based Access Control (RBAC) systems, is transferred to the domain of data spaces. RBAC is the most widespread model of access control in different multi-user i…
View article: Architecture of the Parallel Big Data Processing System for Security Monitoring of Internet of Things Networks
Architecture of the Parallel Big Data Processing System for Security Monitoring of Internet of Things Networks Open
D O I 10.
View article: Dynamic Method of Searching Anthropogenic Objects in Use of Seabed with Autonomous Underwater Vehicles
Dynamic Method of Searching Anthropogenic Objects in Use of Seabed with Autonomous Underwater Vehicles Open
The dynamic method of searching anthropogenic objects in seabed with au-tonomous underwater vehicles use is offered. Unlike a static method where all devices with onboard are buried and attached to a bottom simultaneously and after end …