security

Enhancing host intrusion detection systems for Linux based network operating systems

This paper proposes an enhanced model of Host Intrusion Detection Systems (HIDS) adapted for Linux- based Network Operating Systems (NOS), specifically SONiC. The SONiC architecture has been analyzed to identify intrusion-sensitive components, including telemetry data, container logs, and inter-container communications. A machine learning-based HIDS profile has been introduced to detect anomalies within containerized services and network modules. Signature-based, anomaly-based, and hybrid-based detection approaches have been classified with consideration of NOS-specific traits.

“PESCO 4”: the Role of Member States’ Ambitions in the Implementation of Defence and Security Projects of the European Union

The article clarifies the options for cooperation of 26 EU Member States within the framework of PESCO, which combine and develop their capabilities, which they would be unable to develop and implement separately. It is about developing defence capabilities, investment coordination, increasing operational readiness, operational interoperability and stability of their armed forces, and cooperation in various projects. It is emphasized on the various PESCO projects such as cyber, unmanned systems, chemical, biological, radiological and nuclear surveillance and medical services.

Methods and Means of Analyzing Application Security via Distributed Tracing

The article describes methods and means of digital security that are utilizing distributed tracing to detect, investigate, and prevent security incidents. The described methods and means are applicable to solutions of any scale – from large enterprises to pet projects; of any domain – healthcare, banking, government, retail, etc. The article takes a comprehensive approach to digital security including identification, alerting, prevention, investigation, and audit of existing security incidents.

Application of machine learning algorithms to enhance blockchain network security

This paper embarks on a detailed examination of the inherent security challenges faced by blockchain networks, including fraudulent transactions, double-spending, and 51% attacks, among others.  Using recent advancements in ML, it presents a novel methodology for real-time anomaly detection, predictive threat modeling, and adaptive security protocols that leverage data-driven insights to fortify the blockchain against both known and emerging threats.  By analyzing case studies and empirical data, this study illustrates the effectiveness of ML techniques in enhancing the

Study of the grain market of Ukraine in the conditions of war

The purpose of the study is to investigate the state and tender development of the Ukrainian grain market in terms of unlocking the export potential of the Ukrainian grain industry, given the need to restore logistics supply chains for export-oriented grain flows in the face of blocked land and water transport corridors. The objectives of the study were:

BLOCKCHAIN AND BIOMETRICS: CHALLENGES AND SOLUTIONS

Blockchain technology has garnered significant attention in recent years due to its ability to revolutionize conventional processes by providing faster, more secure, and cost-effective solutions. This study explores the symbiotic relationship between blockchain and biometrics, investigating how these technologies can mutually reinforce each other. The research makes a dual contribution: firstly, it comprehensively analyses blockchain and biometrics, highlighting their convergence's potential advantages and obstacles.

Управління екологічною безпекою міста

Розглянуто проблеми екологічної безпеки міста як складової безпеки життєдіяльності міста. Проаналізовано причин виникнення небезпек і можливі варіанти їх ліквідації за допомогою управлінських дій. Запропоновано концептуальну схему управління міською екобезпекою і структуру управлінського органу, алгоритм управління екобезпекою.

Aerial vehicles detection system based on analysis of sound signals

The article presents a modern aircraft detection system based on the analysis of sound signals, developed using neural networks and sound analysis algorithms. During the development of the system, the latest technologies were used, such as acoustic sensors, single-board microcomputers and external devices for processing and storing information received from the environment, which ensures fast and accurate detection of aircraft in the air.

On international environmental security: modern dimensions and principles of implementation

The article describes the current problems of international environmental security in the context of the systematic manifestation of the principles of its implementation, which justifies the need to consolidate the efforts of interstate environmental measures on the basis of sustainable and balanced development. The article examines prerequisites for the formation of the global environmental safety as an integral part of international relations and politics against the background of the long-term ecological crisis.

An assessment of the effect of touting on Nigerian seaport operations: a case study of Apapa port

In Nigeria, touting has been a challenge in the port, as it causes loss and diversion of cargo. Therefore, this study examined the effect of touting on the operational performance of the Apapa port. Specifically, a self-administered questionnaire was distributed to determine the extent of the touting on service delivery, security measures on operational quality dependability, pilfering on operations output safety, touting influencing elements on operational reliability, and touting activities on overall performance.