cybersecurity

Hybrid Behavioural Analysis Method for Early Detection of Anomalous Activity in Web Applications

The research introduces a hybrid behavioural analysis technique for early detection of anomalous user behavior observed on web applications. This strategy involves statistical probability modeling and sequence- based deep learning to design interpretable and robust anomaly detection. A probability baseline has been obtained as a probabilistic basis using KDE (Kernel Density Estimation) and longitudinal time series patterns are sampled using an LSTM network. The hybrid anomaly score combines these two models to dynamically analyze behavioural deviations.

Analysis and Improvement of Information Security Technologies in Distributed and Asymmetric Systems

The article discusses modern information security technologies in distributed and asymmetric systems, as well as problems arising from their implementation in the context of growing cyber threats. An analysis of cryptographic methods, authentication systems, access control, and intrusion detection has been provided. Particular attention has been paid to the limitations of existing technologies and promising areas for their improvement, in particular the use of machine learning methods, block chain technologies, and the Zero Trust concept.

Hybridizing Large Language Models and Markov Processes: a New Paradigm for Autonomous Penetration Testing

The article explores a hybrid framework for autonomous penetration testing that integrates Large Language Models (LLMs) with Markov decision processes (MDP/POMDP) and reinforcement learning (RL). Conventional penetration testing is increasingly insufficient for modern, complex cyber threats. LLMs are utilized for high-level strategic planning, generating potential attack paths, while MDP/POMDP models combined with RL execute low-level actions under uncertainty. A feedback loop allows outcomes to refine strategies in dynamic and partially observable environments.

Legal Support of Information Security in the Field of Personal Data Protection

The article examines current issues related to the legal aspects of personal data protection in the context of ensuring information security amid the digitalization of society. It argues that personal data are among the most vulnerable assets in today’s information environment, and that improper processing or leaks can lead to significant violations of human rights and freedoms, undermine trust in state institutions, and create threats to national security.

Problems of Legal Regulation of the Information Sphere in the Conditions of Global Digitalization: Theoretical, Legal and Industry-related Aspects of the Application of Information Technologies and Artificial Intelligence Technologies

The article systematically examines some problematic issues of legal regulation of public relations in the global information space, in particular, concerning the provision of information security and cybersecurity in the information sphere in the conditions of global digitalization of society, especially concerning the use of information technologies and artificial intelligence technologies.

Features of Teaching Information Disciplines: Integration of Knowledge About the Security of Information Systems and Complexes

The article discusses current challenges and conceptual approaches to teaching information disciplines with the integration of knowledge about the security of information systems and complexes in higher education. Given the rapid development of digital technologies, cloud services, automated control systems, and the growth of cyber threats, in particular hybrid influence, the problem of forming a holistic vision among students of both the principles of building information systems and their effective protection is becoming particularly important.

Anomalies Detection and Traffic Monitoring System in Computer Networks

The paper addresses the problem of anomaly detection in network traffic and proposes a comprehensive solution to enhance the level of cybersecurity for organizations of various scales. A comparative analysis of existing monitoring and anomaly detection systems has been carried out, including both open-source solutions and commercial products.

Overview of Microservice Architecture and Analysis of Typical Vulnerabilities

The article examines the security of microservice architectures in the context of common vulnerabilities that arise in distributed systems. The authors analyze the essence of the microservice approach, which, despite its advantages in scalability and flexibility, introduces new challenges in the field of cybersecurity. The main focus is on issues of access management, network configuration, and data protection during transmission between services, which can create additional attack vectors.

Research Into the Possibility of Integrating the Compartmentalization Method Into the Protection of Information in Open Sources

The article examines the integration of the compartmentalization method as a fundamental cybersecurity principle in the strategy of protecting information in open sources, in particular to counter OSINT technologies. The authors emphasize that modern cyber threats, enhanced by the massive use of open sources, create risks of leakage of personal data and confidential information, especially through social networks and other platforms where the human factor is a key element of vulnerability.

On Some Approaches to Intelligent Counteracting Cyberattacks Within Microservice Architecture

An approach to counteracting cyberattacks based on state machines within a microservice architecture is suggested. It focuses on intelligent analysis of actual and possible intrusions. The approach is devised for applications with a microservice architecture deployed on the Kubernetes platform. For purposes of the study, a special dataset has been developed. We have reproduced selected common vulnerabilities and exposures reported in 2024 and collected network traffic of intrusion cyberattacks based on them.