кібербезпека

Hybrid Behavioural Analysis Method for Early Detection of Anomalous Activity in Web Applications

The research introduces a hybrid behavioural analysis technique for early detection of anomalous user behavior observed on web applications. This strategy involves statistical probability modeling and sequence- based deep learning to design interpretable and robust anomaly detection. A probability baseline has been obtained as a probabilistic basis using KDE (Kernel Density Estimation) and longitudinal time series patterns are sampled using an LSTM network. The hybrid anomaly score combines these two models to dynamically analyze behavioural deviations.

Analysis and Improvement of Information Security Technologies in Distributed and Asymmetric Systems

The article discusses modern information security technologies in distributed and asymmetric systems, as well as problems arising from their implementation in the context of growing cyber threats. An analysis of cryptographic methods, authentication systems, access control, and intrusion detection has been provided. Particular attention has been paid to the limitations of existing technologies and promising areas for their improvement, in particular the use of machine learning methods, block chain technologies, and the Zero Trust concept.

Hybridizing Large Language Models and Markov Processes: a New Paradigm for Autonomous Penetration Testing

The article explores a hybrid framework for autonomous penetration testing that integrates Large Language Models (LLMs) with Markov decision processes (MDP/POMDP) and reinforcement learning (RL). Conventional penetration testing is increasingly insufficient for modern, complex cyber threats. LLMs are utilized for high-level strategic planning, generating potential attack paths, while MDP/POMDP models combined with RL execute low-level actions under uncertainty. A feedback loop allows outcomes to refine strategies in dynamic and partially observable environments.

Anomalies Detection and Traffic Monitoring System in Computer Networks

The paper addresses the problem of anomaly detection in network traffic and proposes a comprehensive solution to enhance the level of cybersecurity for organizations of various scales. A comparative analysis of existing monitoring and anomaly detection systems has been carried out, including both open-source solutions and commercial products.

Overview of Microservice Architecture and Analysis of Typical Vulnerabilities

The article examines the security of microservice architectures in the context of common vulnerabilities that arise in distributed systems. The authors analyze the essence of the microservice approach, which, despite its advantages in scalability and flexibility, introduces new challenges in the field of cybersecurity. The main focus is on issues of access management, network configuration, and data protection during transmission between services, which can create additional attack vectors.

Research Into the Possibility of Integrating the Compartmentalization Method Into the Protection of Information in Open Sources

The article examines the integration of the compartmentalization method as a fundamental cybersecurity principle in the strategy of protecting information in open sources, in particular to counter OSINT technologies. The authors emphasize that modern cyber threats, enhanced by the massive use of open sources, create risks of leakage of personal data and confidential information, especially through social networks and other platforms where the human factor is a key element of vulnerability.

On Some Approaches to Intelligent Counteracting Cyberattacks Within Microservice Architecture

An approach to counteracting cyberattacks based on state machines within a microservice architecture is suggested. It focuses on intelligent analysis of actual and possible intrusions. The approach is devised for applications with a microservice architecture deployed on the Kubernetes platform. For purposes of the study, a special dataset has been developed. We have reproduced selected common vulnerabilities and exposures reported in 2024 and collected network traffic of intrusion cyberattacks based on them.

The Problem of Legal Security in the Information Space in the Context of the Expansion of the Use of Artificial Intelligence at the Modern Stage

The article examines the problem of organizing legal security in the information sphere. Based on the provisions of Article 17 of the Constitution of Ukraine and the Information Security Strategy, one of the most important functions of the Ukrainian state at the present stage is to ensure information security. The problem of legal security in Ukraine acquires particular relevance and importance today, during the full-scale invasion of the Russian aggressor, when his insidious aggressive actions are implemented on all fronts, including in the information space.

Information Security in the Context of National Security: Legal Mechanisms for Protecting State Information Resources

Abstract. The purpose of the article is to analyze the mechanisms of ensuring information security in
Ukraine, including legal, technical, organizational, preventive, control, and sanction components. Special
attention is paid to identifying the strengths and weaknesses of these mechanisms in the context of modern
information challenges.
The article identifies the main elements of information security mechanisms, their functions, and
interconnections. The legal mechanism provides a regulatory framework but contains outdated provisions

Electronic Voting іn Ukraine: Legal Aspects іn the Context of Technological Innovations and Prospects

The legal aspects of the organization of electronic voting (e-voting) in Ukraine in the context of technological innovations and prospects for implementation are considered. The essence and forms of e-voting as an innovative tool for the realization of citizens’ electoral rights are investigated. The main technological solutions used in the world practice are considered: Internet voting (i-voting), use of electronic terminals (DRE), biometric identification, smart card technologies and two-factor authorization.