scholarly journals MATHEMATICAL METHODS IN CYBER SECURITY: FRACTALS AND THEIR APPLICATIONS IN INFORMATION AND CYBER SECURITY

Author(s):  
Svitlana Shevchenko ◽  
Yulia Zhdanovа ◽  
Svitlana Spasiteleva ◽  
Olena Negodenko ◽  
Nataliia Mazur ◽  
...  

The article deals with the application of modern mathematical apparatus in information and cyber security namely fractal analysis. The choice of fractal modeling for the protection of information in the process of its digital processing is grounded. Based on scientific sources, the basic definitions of the research are analyzed: fractal, its dimension and basic properties used in the process of information protection. The basic types of fractals (geometric, algebraic, statistical) are presented and the most famous of them are described. The historical perspective of the development of fractal theory is conducted. Different approaches to the application of fractal theory in information and cyber security have been reviewed. Among them are: the use of fractal analysis in encryption algorithms; development of a method of protecting documents with latent elements based on fractals; modeling the security system of each automated workplace network using a set of properties that can be represented as fractals. The considered approaches to the application of fractal analysis in information and cyber security can be used in the preparation of specialists in the process of research work or diploma work.

The review article discusses the possibilities of using fractal mathematical analysis to solve scientific and applied problems of modern biology and medicine. The authors show that only such an approach, related to the section of nonlinear mechanics, allows quantifying the chaotic component of the structure and function of living systems, that is a priori important additional information and expands, in particular, the possibilities of diagnostics, differential diagnosis and prediction of the course of physiological and pathological processes. A number of examples demonstrate the specific advantages of using fractal analysis for these purposes. The conclusion can be made that the expanded use of fractal analysis methods in the research work of medical and biological specialists is promising.


Drones ◽  
2021 ◽  
Vol 6 (1) ◽  
pp. 8
Author(s):  
Elena Basan ◽  
Alexandr Basan ◽  
Alexey Nekrasov ◽  
Colin Fidge ◽  
Nikita Sushkin ◽  
...  

Here, we developed a method for detecting cyber security attacks aimed at spoofing the Global Positioning System (GPS) signal of an Unmanned Aerial Vehicle (UAV). Most methods for detecting UAV anomalies indicative of an attack use machine learning or other such methods that compare normal behavior with abnormal behavior. Such approaches require large amounts of data and significant “training” time to prepare and implement the system. Instead, we consider a new approach based on other mathematical methods for detecting UAV anomalies without the need to first collect a large amount of data and describe normal behavior patterns. Doing so can simplify the process of creating an anomaly detection system, which can further facilitate easier implementation of intrusion detection systems in UAVs. This article presents issues related to ensuring the information security of UAVs. Development of the GPS spoofing detection method for UAVs is then described, based on a preliminary study that made it possible to form a mathematical apparatus for solving the problem. We then explain the necessary analysis of parameters and methods of data normalization, and the analysis of the Kullback—Leibler divergence measure needed to detect anomalies in UAV systems.


Information ◽  
2020 ◽  
Vol 11 (2) ◽  
pp. 100
Author(s):  
Ricardo A. Calix ◽  
Sumendra B. Singh ◽  
Tingyu Chen ◽  
Dingkai Zhang ◽  
Michael Tu

The cyber security toolkit, CyberSecTK, is a simple Python library for preprocessing and feature extraction of cyber-security-related data. As the digital universe expands, more and more data need to be processed using automated approaches. In recent years, cyber security professionals have seen opportunities to use machine learning approaches to help process and analyze their data. The challenge is that cyber security experts do not have necessary trainings to apply machine learning to their problems. The goal of this library is to help bridge this gap. In particular, we propose the development of a toolkit in Python that can process the most common types of cyber security data. This will help cyber experts to implement a basic machine learning pipeline from beginning to end. This proposed research work is our first attempt to achieve this goal. The proposed toolkit is a suite of program modules, data sets, and tutorials supporting research and teaching in cyber security and defense. An example of use cases is presented and discussed. Survey results of students using some of the modules in the library are also presented.


2018 ◽  
Vol 7 (3.19) ◽  
pp. 39 ◽  
Author(s):  
Moses Adah Agana ◽  
Ruth Wario

This research work was designed to utilize multi-level cyber crime detection and control system to provide enhanced real-time evidence to cyber crime investigators to aid them in prosecuting cyber criminals. The design was based on a robust system combining user-identity, device identity, geographical location and user activities to provide evidences to uniquely identify a cyber user and detect crimes committed. The system captures the user’s facial image and biometric finger print as mandatory login parameters in addition to username and password before granting access. The system was tested and implemented in a real time cyber security website www.ganamos.org.  The results showed that it is possible to divulge the identity of cyber users and associate their activities with the devices they use, the date, time and location of operation. These can provide real-time evidences to law enforcement agencies to track down and prosecute cyber criminals. 


2018 ◽  
Vol 8 (12) ◽  
pp. 2473 ◽  
Author(s):  
Michał Paluch ◽  
Lidia Jackowska-Strumiłło

This paper presents new methods and models for forecasting stock prices and computing hybrid models, combining analytical and neural approaches. First, technical and fractal analyses are conducted and selected stock market indices calculated, such as moving averages and oscillators. Next, on the basis of these indices, an artificial neural network (ANN) provides predictions one day ahead of the closing prices of the assets. New technical analysis indicators using fractal modeling are also proposed. Three kinds of hybrid model with different degrees of fractal analysis were considered. The new hybrid modeling approach was compared to previous ANN-based prediction methods. The results showed that the hybrid model with fractal analysis outperforms other models and is more robust over longer periods of time.


Materials ◽  
2021 ◽  
Vol 14 (4) ◽  
pp. 860
Author(s):  
Qingshan Duan ◽  
Jiejie An ◽  
Hanling Mao ◽  
Dongwu Liang ◽  
Hao Li ◽  
...  

The work is intended to summarize the recent progress in the work of fractal theory in packaging material to provide important insights into applied research on fractal in packaging materials. The fractal analysis methods employed for inorganic materials such as metal alloys and ceramics, polymers, and their composites are reviewed from the aspects of fractal feature extraction and fractal dimension calculation methods. Through the fractal dimension of packaging materials and the fractal in their preparation process, the relationship between the fractal characteristic parameters and the properties of packaging materials is discussed. The fractal analysis method can qualitatively and quantitatively characterize the fractal characteristics, microstructure, and properties of a large number of various types of packaging materials. The method of using fractal theory to probe the preparation and properties of packaging materials is universal; the relationship between the properties of packaging materials and fractal dimension will be a critical trend of fractal theory in the research on properties of packaging materials.


Author(s):  
Yulia Zhdanovа ◽  
Svitlana Spasiteleva ◽  
Svitlana Shevchenko

The article deals with the problem of training modern specialists of the specialty "125 - Cyber Security". Issues of providing students with specialized and professional knowledge and skills in cryptographic protection of the information are considered. The necessity of obtaining practical knowledge on information protection with a certain amount of theoretical knowledge for future cybersecurity specialists has been substantiated. Through the analysis of literature and the use of own experience, the essence and structure of the concept of "competence on cryptographic protection of the information" have been determined. Formation of these competencies have been carried out within the framework of interdisciplinary links of educational disciplines, namely: "Applied Cryptology", "Secure Programming". The list of requirements for professionally significant characteristics of a cybersecurity specialist in the field of cryptographic protection of information has been determined. An overview of cryptographic libraries has been conducted and the main criteria for selecting the cryptographic service and the programming environment have been determined. The article demonstrates the need to use modern cryptographic .Net Framework services and the Microsoft Visual Studio application development environment to provide students with the knowledge and practical skills of information protection. The model of formation and development of competences on cryptographic protection of the information for students of the specialty “125-Cyber Security” has been developed and the ways of its realization at Borys Grinchenko Kyiv University have been offered. In the course of the research it was determined that in the programming of cryptographic protection mechanisms, practical skills of using cryptographic algorithms in the processing and transmission of data have been effectively formed. It is proved that the definition of the volume of theoretical knowledge and practical skills, taking into account the interdisciplinary connections of educational disciplines, allows preparing specialists with practical skills in cryptographic protection of the information. Such specialists are necessary for IT companies in the labor market.


Sign in / Sign up

Export Citation Format

Share Document