{"id":12173,"date":"2022-04-20T10:41:50","date_gmt":"2022-04-20T07:41:50","guid":{"rendered":"http:\/\/journals.khnu.km.ua\/vestnik\/?p=12173"},"modified":"2022-04-20T13:18:33","modified_gmt":"2022-04-20T10:18:33","slug":"abstraktna-model-vplyviv-zlovmysnogo-programnogo-zabezpechennya-ta-metod-zabezpechennya-vidmovostijkosti-speczializovanyh-informaczijnyh-tehnologij","status":"publish","type":"post","link":"https:\/\/journals.khnu.km.ua\/vestnik\/?p=12173","title":{"rendered":"\u0410\u0431\u0441\u0442\u0440\u0430\u043a\u0442\u043d\u0430 \u043c\u043e\u0434\u0435\u043b\u044c \u0432\u043f\u043b\u0438\u0432\u0456\u0432 \u0437\u043b\u043e\u0432\u043c\u0438\u0441\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u043e\u0433\u043e \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u0442\u0430 \u043c\u0435\u0442\u043e\u0434 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u0432\u0456\u0434\u043c\u043e\u0432\u043e\u0441\u0442\u0456\u0439\u043a\u043e\u0441\u0442\u0456 \u0441\u043f\u0435\u0446\u0456\u0430\u043b\u0456\u0437\u043e\u0432\u0430\u043d\u0438\u0445 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0438\u0445 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0439"},"content":{"rendered":"<p><!--more--><\/p>\n<p style=\"text-align: center;\">\u0410\u0411\u0421\u0422\u0420\u0410\u041a\u0422\u041d\u0410 \u041c\u041e\u0414\u0415\u041b\u042c \u0412\u041f\u041b\u0418\u0412\u0406\u0412 \u0417\u041b\u041e\u0412\u041c\u0418\u0421\u041d\u041e\u0413\u041e \u041f\u0420\u041e\u0413\u0420\u0410\u041c\u041d\u041e\u0413\u041e \u0417\u0410\u0411\u0415\u0417\u041f\u0415\u0427\u0415\u041d\u041d\u042f \u0422\u0410 \u041c\u0415\u0422\u041e\u0414 \u0417\u0410\u0411\u0415\u0417\u041f\u0415\u0427\u0415\u041d\u041d\u042f \u0412\u0406\u0414\u041c\u041e\u0412\u041e\u0421\u0422\u0406\u0419\u041a\u041e\u0421\u0422\u0406 \u0421\u041f\u0415\u0426\u0406\u0410\u041b\u0406\u0417\u041e\u0412\u0410\u041d\u0418\u0425 \u0406\u041d\u0424\u041e\u0420\u041c\u0410\u0426\u0406\u0419\u041d\u0418\u0425 \u0422\u0415\u0425\u041d\u041e\u041b\u041e\u0413\u0406\u0419<\/p>\n<p style=\"text-align: center;\">ABSTRACT MODEL OF INFLUENCE OF MALICIOUS OF SOFTWARE AND METHOD OF ENSURING THE FAILURE RESISTANCE OF SPECIALIZED INFORMATION TECHNOLOGIES<\/p>\n<p><strong>\u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: 31-42. \u041d\u043e\u043c\u0435\u0440: \u2116<\/strong><strong>1<\/strong><strong>, 202<\/strong><strong>2<\/strong><strong> (<\/strong><strong>305<\/strong><strong>)\u00a0 <a href=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2022\/04\/vknu-ts-2022-n1-305-31-42.pdf\"> <img loading=\"lazy\" class=\"size-full wp-image-69 alignnone\" src=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/pdf.png\" alt=\"\" width=\"76\" height=\"32\" \/><\/a> <\/strong><br \/>\n<strong>\u00a0<\/strong><strong>\u0410\u0432\u0442\u043e\u0440\u0438:<\/strong><br \/>\n\u0421\u0422\u0415\u0426\u042e\u041a \u041c. \u0412.<br \/>\n<a href=\"https:\/\/or\u0441id.org\/0000-0003-3875-0416\">https:\/\/or\u0441id.org\/0000-0003-3875-0416<\/a><br \/>\ne-mail: <a href=\"mailto:mikstt777@gmail.com\">mikstt777@gmail.com<\/a><br \/>\n\u041a\u0410\u0428\u0422\u0410\u041b\u042c\u042f\u041d \u0410. \u0421.<br \/>\n<a href=\"https:\/\/or\u0441id.org\/0000-0002-4925-9713\">https:\/\/or\u0441id.org\/0000-0002-4925-9713<\/a><br \/>\ne-mail: <a href=\"mailto:yantonina@ukr.net\">yantonina@ukr.net<\/a><br \/>\n\u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\nMykola STETSYUK, Antonina KASHTALIAN<br \/>\nKhmelnytskyi National University<br \/>\n<strong>DOI:<\/strong> <a href=\"https:\/\/www.doi.org\/10.31891\/2307-5732-2022-305-1-31-42\">https:\/\/www.doi.org\/10.31891\/2307-5732-2022-305-1-31-42<\/a><\/p>\n<p style=\"text-align: center;\"><strong>\u0410\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u043c\u043e\u0432\u043e\u044e \u043e\u0440\u0438\u0433\u0456\u043d\u0430\u043b\u0443<\/strong><\/p>\n<p>\u0412 \u0440\u043e\u0431\u043e\u0442\u0456 \u0437\u0430\u043f\u0440\u043e\u043f\u043e\u043d\u043e\u0432\u0430\u043d\u0430 \u0430\u0431\u0441\u0442\u0440\u0430\u043a\u0442\u043d\u0430 \u043c\u043e\u0434\u0435\u043b\u044c \u0432\u043f\u043b\u0438\u0432\u0456\u0432 \u0437\u043b\u043e\u0432\u043c\u0438\u0441\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u043e\u0433\u043e \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f (\u0417\u041f\u0417) \u0434\u0430\u0454 \u0437\u043c\u043e\u0433\u0443 \u0440\u043e\u0437\u0433\u043b\u044f\u0434\u0430\u0442\u0438 \u043e\u0431\u2019\u0454\u043a\u0442\u0438 \u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u043d\u043e\u0457 \u0441\u0438\u0441\u0442\u0435\u043c\u0438, \u043d\u0430 \u044f\u043a\u0456 \u043c\u043e\u0436\u0443\u0442\u044c \u0432\u043f\u043b\u0438\u0432\u0430\u0442\u0438 \u0417\u041f\u0417 \u0442\u0430 \u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u043d\u0456 \u0430\u0442\u0430\u043a\u0438. \u0406, \u0442\u043e\u043c\u0443, \u0432\u043e\u043d\u0430 \u0431\u0443\u043b\u0430 \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u0430\u043d\u0430 \u044f\u043a \u043e\u0441\u043d\u043e\u0432\u0430 \u0434\u043b\u044f \u0440\u043e\u0437\u0440\u043e\u0431\u043b\u0435\u043d\u043e\u0433\u043e \u043d\u043e\u0432\u043e\u0433\u043e \u043c\u0435\u0442\u043e\u0434\u0443 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u0432\u0456\u0434\u043c\u043e\u0432\u043e\u0441\u0442\u0456\u0439\u043a\u043e\u0441\u0442\u0456 \u0441\u043f\u0435\u0446\u0456\u0430\u043b\u0456\u0437\u043e\u0432\u0430\u043d\u043e\u0457 \u0406\u0422 \u0432 \u0443\u043c\u043e\u0432\u0430\u0445 \u0432\u043f\u043b\u0438\u0432\u0456\u0432 \u0417\u041f\u0417 \u0442\u0430 \u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u043d\u0438\u0445 \u0430\u0442\u0430\u043a.<br \/>\n\u0412 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0456, \u0437\u0430\u0441\u0442\u043e\u0441\u0443\u0432\u0430\u043d\u043d\u044f \u0440\u043e\u0437\u0440\u043e\u0431\u043b\u0435\u043d\u043e\u0433\u043e \u043c\u0435\u0442\u043e\u0434\u0443 \u0437\u0434\u0456\u0439\u0441\u043d\u044e\u0454\u0442\u044c\u0441\u044f \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0456, \u044f\u043a\u0430 \u043c\u0430\u0454 \u043c\u0435\u0445\u0430\u043d\u0456\u0437\u043c\u0438 \u0434\u043b\u044f \u043f\u0435\u0440\u0435\u0431\u0443\u0434\u043e\u0432\u0438 \u0442\u0430 \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u043e\u0432\u0443\u0454 \u043d\u0430\u0434\u043c\u0456\u0440\u043d\u043e\u0441\u0442\u0456. \u041e\u0441\u043e\u0431\u043b\u0438\u0432\u0456\u0441\u0442\u044e \u043e\u0441\u043d\u043e\u0432\u043d\u0438\u0445 \u043a\u0440\u043e\u043a\u0456\u0432 \u0440\u043e\u0437\u0440\u043e\u0431\u043b\u0435\u043d\u043e\u0433\u043e \u043c\u0435\u0442\u043e\u0434\u0443 \u0437\u0433\u0456\u0434\u043d\u043e \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u0438\u0447\u043d\u043e\u0433\u043e \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044e \u0446\u0456\u043b\u0456\u0441\u043d\u043e\u0441\u0442\u0456 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u0438\u0445 \u0444\u0430\u0439\u043b\u0456\u0432 \u0454 \u043c\u043e\u0436\u043b\u0438\u0432\u0456\u0441\u0442\u044c \u0439\u043e\u0433\u043e \u0437\u0430\u0441\u0442\u043e\u0441\u0443\u0432\u0430\u043d\u043d\u044f \u0434\u043e \u0433\u0440\u0443\u043f\u0438 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u0438\u0445 \u0444\u0430\u0439\u043b\u0456\u0432, \u044f\u043a\u0456 \u043d\u0435 \u043c\u0430\u044e\u0442\u044c \u0441\u0442\u0430\u043b\u043e\u0457 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c\u043d\u043e\u0457 \u0441\u0443\u043c\u0438 \u0456, \u0446\u0438\u043c \u0441\u0430\u043c\u0438\u043c \u0432\u0456\u043d \u0440\u043e\u0437\u0448\u0438\u0440\u044e\u0454 \u043c\u043e\u0436\u043b\u0438\u0432\u043e\u0441\u0442\u0456 \u0432\u0456\u0434\u043e\u043c\u043e\u0433\u043e \u043c\u0435\u0442\u043e\u0434\u0443 \u0432\u0438\u044f\u0432\u043b\u0435\u043d\u043d\u044f \u0417\u041f\u0417, \u0430 \u0441\u0430\u043c\u0435 \u043c\u0435\u0442\u043e\u0434\u0443 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044e \u0446\u0456\u043b\u0456\u0441\u043d\u043e\u0441\u0442\u0456 \u043f\u0440\u043e\u0433\u0440\u0430\u043c, \u043e\u0441\u043d\u043e\u0432\u0430\u043d\u043e\u0433\u043e \u043d\u0430 \u043f\u0456\u0434\u0440\u0430\u0445\u0443\u043d\u043a\u0443 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c\u043d\u0438\u0445 \u0441\u0443\u043c. \u041f\u043e\u0440\u0456\u0432\u043d\u044f\u043d\u043e \u0437 \u0432\u0456\u0434\u043e\u043c\u0438\u043c \u0437\u0430\u0441\u0442\u043e\u0441\u0443\u0432\u0430\u043d\u043d\u044f \u0446\u044c\u043e\u0433\u043e \u043c\u0435\u0442\u043e\u0434\u0443, \u0442\u043e \u0432 \u043f\u043e\u043f\u0435\u0440\u0435\u0434\u043d\u0456\u0445 \u0440\u043e\u0431\u043e\u0442\u0430\u0445 \u0446\u0435\u0439 \u043c\u0435\u0442\u043e\u0434 \u043d\u0435 \u043c\u0456\u0433 \u0431\u0443\u0442\u0438 \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u0430\u043d\u0438\u0439 \u0434\u043b\u044f \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044e \u0446\u0456\u043b\u0456\u0441\u043d\u043e\u0441\u0442\u0456 \u043f\u0435\u0432\u043d\u043e\u0457 \u0433\u0440\u0443\u043f\u0438 \u0432\u0438\u043a\u043e\u043d\u0443\u0432\u0430\u043d\u0438\u0445 \u0444\u0430\u0439\u043b\u0456\u0432, \u044f\u043a\u0456 \u043c\u0430\u044e\u0442\u044c \u043d\u0435\u043e\u0434\u043d\u043e\u0440\u0456\u0434\u043d\u0443 \u0432\u043d\u0443\u0442\u0440\u0456\u0448\u043d\u044e \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0443. \u0414\u043e \u0446\u0456\u0454\u0457 \u0433\u0440\u0443\u043f\u0438 \u0432\u0456\u0434\u043d\u043e\u0441\u044f\u0442\u044c\u0441\u044f \u0456 \u0444\u0430\u0439\u043b\u0438 \u0442\u0438\u043f\u0443 mde, \u044f\u043a\u0456 \u043e\u0442\u0440\u0438\u043c\u0443\u044e\u0442\u044c\u0441\u044f \u043f\u0440\u0438 \u043a\u043e\u043c\u043f\u0456\u043b\u044f\u0446\u0456\u0457 \u043f\u0440\u043e\u0433\u0440\u0430\u043c, \u043d\u0430\u043f\u0438\u0441\u0430\u043d\u0438\u0445 \u0432 \u0441\u0435\u0440\u0435\u0434\u043e\u0432\u0438\u0449\u0456 MS Access. \u0407\u0445 \u043e\u0441\u043e\u0431\u043b\u0438\u0432\u0456\u0441\u0442\u044e \u0454 \u0442\u0430 \u043e\u0431\u0441\u0442\u0430\u0432\u0438\u043d\u0430, \u0449\u043e \u0432\u043e\u043d\u0438 \u043c\u0430\u044e\u0442\u044c \u0441\u043a\u043b\u0430\u0434\u043d\u0443 \u0432\u043d\u0443\u0442\u0440\u0456\u0448\u043d\u044e \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0443, \u044f\u043a\u0430 \u0432\u043a\u043b\u044e\u0447\u0430\u0454 \u0432 \u0441\u0435\u0431\u0435, \u043e\u043a\u0440\u0456\u043c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0443, \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0438, \u0449\u043e \u0454 \u0435\u043b\u0435\u043c\u0435\u043d\u0442\u0430\u043c\u0438 \u0431\u0430\u0437\u0438 \u0434\u0430\u043d\u0438\u0445, \u0442\u0430\u043a\u0456 \u044f\u043a \u0442\u0430\u0431\u043b\u0438\u0446\u0456, \u0456\u043d\u0434\u0435\u043a\u0441\u0438, \u0441\u0445\u0435\u043c\u0443 \u0440\u0435\u043b\u044f\u0446\u0456\u0439\u043d\u043e\u0457 \u0431\u0430\u0437\u0438 \u0434\u0430\u043d\u0438\u0445 \u0442\u0430 \u0456\u043d\u0448\u0456. \u0426\u0435\u0439 \u043a\u0440\u043e\u043a \u043c\u0435\u0442\u043e\u0434\u0443 \u0440\u043e\u0437\u0440\u043e\u0431\u043b\u0435\u043d\u0438\u0439 \u0434\u043b\u044f \u0439\u043e\u0433\u043e \u0437\u0430\u0441\u0442\u043e\u0441\u0443\u0432\u0430\u043d\u043d\u044f \u0432 \u0406\u0421 \u0437 \u043f\u0456\u0434\u0432\u0438\u0449\u0435\u043d\u043e\u044e \u0432\u0456\u0434\u043c\u043e\u0432\u043e\u0441\u0442\u0456\u0439\u043a\u0456\u0441\u0442\u044e \u0442\u0430 \u043f\u043e\u0441\u0438\u043b\u0435\u043d\u0438\u043c \u0437\u0430\u0445\u0438\u0441\u0442\u043e\u043c \u0432\u0456\u0434 \u0417\u041f\u0417 \u0442\u0430 \u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u043d\u0438\u0445 \u0430\u0442\u0430\u043a, \u0430 \u0441\u0430\u043c\u0435 \u0443 \u0434\u0440\u0443\u0433\u043e\u043c\u0443, \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e\u043c\u0443 \u043a\u043e\u043d\u0442\u0443\u0440\u0456 \u0437\u0430\u0445\u0438\u0441\u0442\u0443, \u0456\u043d\u0442\u0435\u0433\u0440\u043e\u0432\u0430\u043d\u043e\u043c\u0443 \u0432 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u0435 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u0441\u043f\u0435\u0446\u0456\u0430\u043b\u0456\u0437\u043e\u0432\u0430\u043d\u043e\u0457 \u0406\u0422.\u00a0 \u0426\u0435 \u0434\u0438\u043a\u0442\u0443\u0454\u0442\u044c\u0441\u044f \u0442\u0456\u0454\u044e \u043e\u0431\u0441\u0442\u0430\u0432\u0438\u043d\u043e\u044e, \u0449\u043e \u0434\u043b\u044f \u0439\u043e\u0433\u043e \u0440\u0435\u0430\u043b\u0456\u0437\u0430\u0446\u0456\u0457 \u043d\u0435\u043e\u0431\u0445\u0456\u0434\u043d\u0430 \u0441\u043f\u0435\u0446\u0456\u0444\u0438\u0447\u043d\u0430 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u044f \u043f\u0440\u043e \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u0438 \u0440\u0435\u0430\u043b\u0456\u0437\u0430\u0446\u0456\u0457 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u043e\u0433\u043e \u0444\u0430\u0439\u043b\u0430, \u044f\u043a\u0430 \u0454 \u043d\u0435\u0432\u0456\u0434\u043e\u043c\u043e\u044e \u043d\u0430 \u0437\u0430\u0433\u0430\u043b\u044c\u043d\u043e\u0441\u0438\u0441\u0442\u0435\u043c\u043d\u043e\u043c\u0443 \u0440\u0456\u0432\u043d\u0456, \u0430\u043b\u0435 \u0432\u0456\u0434\u043e\u043c\u0430 \u043d\u0430 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e\u043c\u0443, \u043e\u0441\u043a\u0456\u043b\u044c\u043a\u0438 \u0454 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0454\u044e, \u043e\u0442\u0440\u0438\u043c\u0430\u043d\u043e\u044e \u0432 \u043f\u0440\u043e\u0446\u0435\u0441\u0456 \u043f\u0440\u043e\u0435\u043a\u0442\u0443\u0432\u0430\u043d\u043d\u044f \u0442\u0430 \u0440\u0435\u0430\u043b\u0456\u0437\u0430\u0446\u0456\u0457 \u0446\u0456\u0454\u0457 \u0447\u0430\u0441\u0442\u0438\u043d\u0438 \u0441\u043f\u0435\u0446\u0456\u0430\u043b\u0456\u0437\u043e\u0432\u0430\u043d\u043e\u0457 \u0406\u0422 \u044f\u043a \u0454\u0434\u0438\u043d\u043e\u0433\u043e \u0446\u0456\u043b\u043e\u0433\u043e. \u0422\u043e\u043c\u0443, \u0440\u043e\u0437\u0448\u0438\u0440\u0435\u043d\u043e \u0441\u0444\u0435\u0440\u0443 \u0437\u0430\u0441\u0442\u043e\u0441\u0443\u0432\u0430\u043d\u043d\u044f \u043c\u0435\u0442\u043e\u0434\u0443 \u0432\u0438\u044f\u0432\u043b\u0435\u043d\u043d\u044f \u0417\u041f\u0417 \u043d\u0430 \u043e\u0441\u043d\u043e\u0432\u0456 \u043f\u0456\u0434\u0440\u0430\u0445\u0443\u043d\u043a\u0443 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c\u043d\u043e\u0457 \u0441\u0443\u043c\u0438 \u043d\u0430 \u0444\u0430\u0439\u043b\u0438 \u0437 \u043d\u0435\u0441\u0442\u0430\u043b\u0438\u043c\u0438 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c\u043d\u0438\u043c\u0438 \u0441\u0443\u043c\u0430\u043c\u0438, \u044f\u043a \u043a\u0440\u043e\u043a\u0443 \u043c\u0435\u0442\u043e\u0434\u0443 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u0432\u0456\u0434\u043c\u043e\u0432\u043e\u0441\u0442\u0456\u0439\u043a\u043e\u0441\u0442\u0456 \u0406\u0422.<br \/>\n\u0412 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0456 \u0437\u0430\u0441\u0442\u043e\u0441\u0443\u0432\u0430\u043d\u043d\u044f \u0440\u043e\u0437\u0440\u043e\u0431\u043b\u0435\u043d\u043e\u0433\u043e \u043c\u0435\u0442\u043e\u0434\u0443 \u0437\u0434\u0456\u0439\u0441\u043d\u044e\u0454\u0442\u044c\u0441\u044f \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0456, \u044f\u043a\u0430 \u043c\u0430\u0454 \u043c\u0435\u0445\u0430\u043d\u0456\u0437\u043c\u0438 \u0434\u043b\u044f \u043f\u0435\u0440\u0431\u0443\u0434\u043e\u0432\u0438 \u0442\u0430 \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u043e\u0432\u0443\u0454 \u043d\u0430\u0434\u043c\u0456\u0440\u043d\u043e\u0441\u0442\u0456. \u0414\u043b\u044f \u0434\u043e\u0441\u043b\u0456\u0434\u0436\u0435\u043d\u043d\u044f \u0440\u043e\u0437\u0440\u043e\u0431\u043b\u0435\u043d\u043e\u0433\u043e \u043c\u0435\u0442\u043e\u0434\u0443 \u0440\u043e\u0437\u0440\u043e\u0431\u043b\u0435\u043d\u043e \u043c\u0435\u0442\u043e\u0434\u0438\u043a\u0443 \u043e\u0446\u0456\u043d\u044e\u0432\u0430\u043d\u043d\u044f \u0439\u043e\u0433\u043e \u0435\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0456 \u0432 \u0447\u0430\u0441\u0442\u0438\u043d\u0456 \u043d\u0430\u0434\u043c\u0456\u0440\u043d\u043e\u0433\u0441\u0442\u0435\u0439 \u0442\u0430 \u0440\u0435\u0437\u0435\u0440\u0432\u0443\u0432\u0430\u043d\u043d\u044f. \u041f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u0456 \u0435\u043a\u0441\u043f\u0435\u0440\u0438\u043c\u0435\u043d\u0442\u0430\u043b\u044c\u043d\u0456 \u0434\u043e\u0441\u043b\u0456\u0434\u0436\u0435\u043d\u043d\u044f \u0442\u0430 \u043e\u0446\u0456\u043d\u043e\u0447\u043d\u0456 \u0440\u043e\u0437\u0440\u0430\u0445\u0443\u043d\u043a\u0438 \u043f\u0456\u0434\u0442\u0432\u0435\u0440\u0434\u0436\u0443\u044e\u0442\u044c \u0435\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u0456\u0441\u0442\u044c \u0440\u043e\u0437\u0440\u043e\u0431\u043b\u0435\u043d\u043e\u0433\u043e \u043c\u0435\u0442\u043e\u0434\u0443 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u0432\u0456\u0434\u043c\u043e\u0432\u043e\u0441\u0442\u0456\u0439\u043a\u043e\u0441\u0442\u0456 \u0406\u0422 \u0432 \u0443\u043c\u043e\u0432\u0430\u0445 \u0432\u043f\u043b\u0438\u0432\u0456\u0432 \u0417\u041f\u0417 \u0442\u0430 \u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u043d\u0438\u0445 \u0430\u0442\u0430\u043a.<br \/>\n<strong>\u041a\u043b\u044e\u0447\u043e\u0432\u0456 \u0441\u043b\u043e\u0432\u0430:<\/strong> \u043c\u0435\u0442\u043e\u0434 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u0432\u0456\u0434\u043c\u043e\u0432\u043e\u0441\u0442\u0456\u0439\u043a\u043e\u0441\u0442\u0456, \u0437\u043b\u043e\u0432\u043c\u0438\u0441\u043d\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u0435 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f, \u0441\u043f\u0435\u0446\u0456\u0430\u043b\u0456\u0437\u043e\u0432\u0430\u043d\u0456 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0456 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0457, \u043d\u0430\u0434\u043c\u0456\u0440\u043d\u043e\u0441\u0442\u0456<\/p>\n<p style=\"text-align: center;\"><strong>\u0420\u043e\u0437\u0448\u0438\u0440\u0435\u043d\u0430 \u0430\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u0430\u043d\u0433\u043b\u0456\u0439\u0441\u044c\u043a\u043e\u044e \u00a0\u043c\u043e\u0432\u043e\u044e<\/strong><\/p>\n<p>The proposed abstract model of the effects of malicious software (SDR) allows us to consider the objects of the computer system that may be affected by SDR and computer attacks. Therefore, it was used as a basis for a new method of ensuring the resilience of specialized IT in the face of SDR and computer attacks.<br \/>\nAs a result, the application of the developed method is carried out in a system that has mechanisms for restructuring and uses redundancies. A feature of the main steps of the developed method according to the parametric control of program file integrity is the possibility of its application to a group of program files that do not have a fixed checksum and thus it expands the possibilities of the known method of detecting. Compared with the known application of this method, in previous work, this method could not be used to control the integrity of a certain group of executable files that have a heterogeneous internal structure. This group includes files of type mde, which are obtained when compiling programs written in MS Access. Their feature is the fact that they have a complex internal structure, which includes, in addition to program code, structures that are elements of the database, such as tables, indexes, relational database schema and others. This step of the method is designed for application in IP with increased fault tolerance and enhanced protection against RAM and computer attacks, namely in the second, local security loop integrated into specialized IT software. This is dictated by the fact that its implementation requires specific information about the parameters of the program file, which is unknown at the system level, but known locally, as it is information obtained in the design and implementation of this part of specialized IT as a whole. Therefore, the scope of the SCR detection method based on checksum calculation for files with volatile checksums as a step of the IT fault tolerance method has been expanded.<br \/>\nAs a result, the application of the developed method is carried out in a system that has mechanisms for rebuilding and uses redundancies. To study the developed method, a method of evaluating its effectiveness in terms of redundancy and redundancy has been developed. Experimental studies and evaluation calculations confirm the effectiveness of the developed method of ensuring the resilience of IT in the face of SDR and computer attacks.<br \/>\n<strong>Keywords<\/strong>: fault tolerance method, malicious software, specialized information technologies, redundancies<\/p>\n<p style=\"text-align: center;\"><strong>\u041b\u0456\u0442\u0435\u0440\u0430\u0442\u0443\u0440\u0430<\/strong><\/p>\n<ol>\n<li>\u0426\u0430\u0440\u0435\u0433\u043e\u0440\u043e\u0434\u0446\u0435\u0432 \u0410.\u0412. \u0420\u0435\u0448\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043d\u0430\u0434\u0435\u0436\u043d\u043e\u0441\u0442\u0438 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u043e &#8211; \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u044e\u0449\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043a\u043b\u0430\u0441\u0442\u0435\u0440\u043d\u044b\u043c \u043c\u0435\u0442\u043e\u0434\u043e\u043c \/ \u0426\u0430\u0440\u0435\u0433\u043e\u0440\u043e\u0434\u0446\u0435\u0432 \u0410.\u0412., \u0421\u0430\u0432\u0435\u043b\u044c\u0435\u0432 \u0418.\u0410. \/\/ \u0412\u0435\u0441\u0442\u043d\u0438\u043a \u0420\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u043e\u0433\u043e \u0443\u043d\u0438\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442\u0430 \u0434\u0440\u0443\u0436\u0431\u044b \u043d\u0430\u0440\u043e\u0434\u043e\u0432. \u2013 \u0421\u0435\u0440\u0438\u044f: \u0418\u043d\u0436\u0435\u043d\u0435\u0440\u043d\u044b\u0435 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u044f, 2007. \u2013 C. 79-84.<\/li>\n<li>\u041c\u0438\u0445\u0435\u0435\u0432 \u0412. \u0410. \u0421\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u0439 \u0430\u043d\u0430\u043b\u0438\u0437 \u043c\u0435\u0442\u043e\u0434\u043e\u0432 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0438 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043d\u0430\u0434\u0435\u0436\u043d\u043e\u0441\u0442\u0438 \u043c\u043d\u043e\u0433\u043e\u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \/ \u041c\u0438\u0445\u0435\u0435\u0432 \u0412. \u0410. \/\/ \u0418\u0437\u0432\u0435\u0441\u0442\u0438\u044f \u042e\u0436\u043d\u043e\u0433\u043e \u0444\u0435\u0434\u0435\u0440\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0443\u043d\u0438\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442\u0430. \u0422\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u043d\u0430\u0443\u043a\u0438. \u2013 2009. \u2013 C. 24-34.<\/li>\n<li>\u041c\u0435\u0442\u043e\u0434\u044b \u0434\u043e\u0441\u0442\u0438\u0436\u0435\u043d\u0438\u044f \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u043e\u0442\u043a\u0430\u0437\u043e\u0443\u0441\u0442\u043e\u0439\u0447\u0438\u0432\u043e\u0441\u0442\u0438 [\u0415\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u0438\u0439 \u0440\u0435\u0441\u0443\u0440\u0441] \/\/ OSP \u2013 \u0413\u0438\u0434 \u043f\u043e \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u044f\u043c \u0446\u0438\u0444\u0440\u043e\u0432\u043e\u0439 \u0442\u0440\u0430\u043d\u0441\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438. \u2013 \u0420\u0435\u0436\u0438\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0443 : https:\/\/www.osp.ru\/winitpro\/2003\/12\/13029028<\/li>\n<li>\u041c\u0443\u0434\u043b\u0430 \u0411.\u0413. \u0413\u0430\u0440\u0430\u043d\u0442\u043e\u0437\u0434\u0430\u0442\u043d\u0456\u0441\u0442\u044c \u044f\u043a \u0444\u0443\u043d\u0434\u0430\u043c\u0435\u043d\u0442\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u0437\u0430\u0433\u0430\u043b\u044c\u043d\u044e\u044e\u0447\u0438\u0439 \u0442\u0430 \u0456\u043d\u0442\u0435\u0433\u0440\u0443\u044e\u0447\u0438\u0439 \u043f\u0456\u0434\u0445\u0456\u0434 \/ \u0411.\u0413. \u041c\u0443\u0434\u043b\u0430, \u0422.\u0406. \u0404\u0444\u0456\u043c\u043e\u0432\u0430, \u0420.\u041c. \u0420\u0443\u0434\u044c\u043a\u043e \/\/ \u041c\u0430\u0442\u0435\u043c\u0430\u0442\u0438\u0447\u043d\u0456 \u043c\u0430\u0448\u0438\u043d\u0438 \u0456 \u0441\u0438\u0441\u0442\u0435\u043c\u0438. \u2013 2010. \u2013 \u2116 2. \u2013 \u0421. 148\u2013165.<\/li>\n<li>\u041c\u0430\u0440\u0442\u0438\u0440\u043e\u0441\u044f\u043d \u0410.\u0413. \u041e\u0441\u043d\u043e\u0432\u043d\u044b\u0435 \u043c\u0435\u0442\u043e\u0434\u044b \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u043e\u0442\u043a\u0430\u0437\u043e\u0443\u0441\u0442\u043e\u0439\u0447\u0438\u0432\u043e\u0441\u0442\u0438 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0432\u044b\u0447\u0438\u0441\u043b\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u0446\u0438\u0444\u0440\u043e\u0432\u043e\u0439 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u0441\u0438\u0433\u043d\u0430\u043b\u043e\u0432 \/ \u041c\u0430\u0440\u0442\u0438\u0440\u043e\u0441\u044f\u043d \u0410.\u0413., \u041a\u0430\u043b\u043c\u044b\u043a\u043e\u0432 \u041c.\u0418. \/\/ \u0421\u043e\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u044b\u0435 \u043d\u0430\u0443\u043a\u043e\u0435\u043c\u043a\u0438\u0435 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0438. \u2013 2014. \u2013 \u2116 3. \u2013 \u0421. 62-67. URL: http:\/\/www.top-technologies.ru\/ru\/article\/view?id=34112.<\/li>\n<li>\u0413\u043e\u043b\u0443\u0431 \u0411.\u0412. \u041c\u0435\u0442\u043e\u0434\u0438\u043a\u0430 \u043e\u0446\u0435\u043d\u043a\u0438 \u0436\u0438\u0432\u0443\u0447\u0435\u0441\u0442\u0438 \u0440\u0430\u0441\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u043d\u044b\u0445 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \/ \u0411.\u0412. \u0413\u043e\u043b\u0443\u0431, \u0415.\u041c. \u041a\u0443\u0437\u043d\u0435\u0446\u043e\u0432, \u0420.\u0412. \u041c\u0430\u043a\u0441\u0438\u043c\u043e\u0432 \/\/ \u0412\u0435\u0441\u0442\u043d\u0438\u043a \u0421\u0430\u043c\u0413\u0423. \u0415\u0441\u0442\u0435\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u043d\u0430\u0443\u0447\u043d\u0430\u044f \u0441\u0435\u0440\u0438\u044f. \u2013 2014. \u2013 \u2116 7(\u04268). \u2013 \u0421. 221\u2013232.<\/li>\n<li>\u0411\u043e\u0440\u043e\u0432\u0441\u044c\u043a\u0430 \u0422.\u041c. \u041c\u043e\u0434\u0435\u043b\u0456 \u0435\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0456 \u0456 \u0436\u0438\u0432\u0443\u0447\u043e\u0441\u0442\u0456 \u0442\u0435\u0445\u043d\u0456\u0447\u043d\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c. \/ \u0411\u043e\u0440\u043e\u0432\u0441\u044c\u043a\u0430 \u0422.\u041c., \u0425\u043e\u043c\u0438\u043d \u0404.\u041f., \u0421\u0435\u0432\u0435\u0440\u0456\u043b\u043e\u0432 \u041f.\u0412. \/\/ \u0412\u0456\u0441\u043d\u0438\u043a \u0412\u0456\u043d\u043d\u0438\u0446\u044c\u043a\u043e\u0433\u043e \u043f\u043e\u043b\u0456\u0442\u0435\u0445\u043d\u0456\u0447\u043d\u043e\u0433\u043e \u0456\u043d\u0441\u0442\u0438\u0442\u0443\u0442\u0443. \u2013 2011. \u2013 \u2116 1. \u2013 C. 89-95.<\/li>\n<li>Boranbayev, A., Boranbayev, S., &amp; Nurusheva, A. (2018). Development of a software system to ensure the reliability and fault tolerance in information systems based on expert estimates. <em>Advances in Intelligent Systems and Computing<\/em>, <em>869<\/em>, 924-935. https:\/\/doi.org\/10.1007\/978-3-030-01057-7_68<\/li>\n<li>Jack Dongarra, Thomas Herault1, Yves Robert Fault tolerance techniques for high-performance computing. Series: Computer Communications and Networks. 2015, IX, 320 p. 113 illus. https:\/\/www.netlib.org\/lapack\/lawnspdf\/lawn289.pdf \u0434\u0430\u0442\u0430 \u0437\u0432\u0435\u0440\u043d\u0435\u043d\u043d\u044f 23.1.22<\/li>\n<li>\u0421\u0430\u0432\u0435\u043d\u043a\u043e\u00a0\u041e.\u00a0\u0421. \u0414\u043e\u0441\u043b\u0456\u0434\u0436\u0435\u043d\u043d\u044f \u043c\u0435\u0442\u043e\u0434\u0456\u0432 \u0430\u043d\u0442\u0438\u0432\u0456\u0440\u0443\u0441\u043d\u043e\u0433\u043e \u0434\u0456\u0430\u0433\u043d\u043e\u0441\u0442\u0443\u0432\u0430\u043d\u043d\u044f \u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u043d\u0438\u0445 \u043c\u0435\u0440\u0435\u0436 \/ \u041e.\u00a0\u0421.\u00a0\u0421\u0430\u0432\u0435\u043d\u043a\u043e, \u0421.\u00a0\u041c.\u00a0\u041b\u0438\u0441\u0435\u043d\u043a\u043e \/\/ \u0412\u0456\u0441\u043d\u0438\u043a \u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u043e\u0433\u043e \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442\u0443. \u0422\u0435\u0445\u043d\u0456\u0447\u043d\u0456 \u043d\u0430\u0443\u043a\u0438. \u2013 2007. \u2013 \u2116 2, \u0442.\u00a02. \u2013 \u0421.\u00a0120\u2013126.<\/li>\n<li>\u0421\u0430\u0432\u0435\u043d\u043a\u043e \u041e.\u0421. \u0414\u043e\u0441\u043b\u0456\u0434\u0436\u0435\u043d\u043d\u044f \u0442\u0430 \u0430\u043d\u0430\u043b\u0456\u0437 \u0431\u043b\u043e\u043a\u0443\u0432\u0430\u043d\u043d\u044f \u043f\u0440\u043e\u0446\u0435\u0441\u0456\u0432 \u0432 \u043a\u043e\u043c\u043f&#8217;\u044e\u0442\u0435\u0440\u043d\u0456\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0456 \/ \u041e.\u0421. \u0421\u0430\u0432\u0435\u043d\u043a\u043e, \u042e.\u041f. \u041a\u043b\u044c\u043e\u0446, \u0421.\u0412. \u041c\u043e\u0441\u0442\u043e\u0432\u0438\u0439 \/\/ \u0412\u0456\u0441\u043d\u0438\u043a \u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u043e\u0433\u043e \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442\u0443. \u2013 2007. \u2013 \u2116 3, \u0422\u043e\u043c 1. \u2013 \u0421. 248-251.<\/li>\n<li>\u0421\u0430\u0432\u0435\u043d\u043a\u043e \u041e.\u0421. \u041e\u0446\u0456\u043d\u043a\u0438 \u0435\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0456 \u0442\u0430 \u0434\u043e\u0441\u0442\u043e\u0432\u0456\u0440\u043d\u043e\u0441\u0442\u0456 \u0440\u043e\u0437\u043f\u043e\u0434\u0456\u043b\u0435\u043d\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u0432\u0438\u044f\u0432\u043b\u0435\u043d\u043d\u044f \u0437\u043b\u043e\u0432\u043c\u0438\u0441\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u043e\u0433\u043e \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u0432 \u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u043d\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u0438\u0445 \u043c\u0435\u0440\u0435\u0436\u0430\u0445 \/ \u0421\u0430\u0432\u0435\u043d\u043a\u043e \u041e.\u0421., \u041d\u0456\u0447\u0435\u043f\u043e\u0440\u0443\u043a \u0410.\u041e., \u041f\u0430\u044e\u043a \u0412.\u041f. \/\/ \u041a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u043d\u043e-\u0456\u043d\u0442\u0435\u0433\u0440\u043e\u0432\u0430\u043d\u0456 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0457: \u043e\u0441\u0432\u0456\u0442\u0430, \u043d\u0430\u0443\u043a\u0430, \u0432\u0438\u0440\u043e\u0431\u043d\u0438\u0446\u0442\u0432\u043e \u2013 \u2116 36. \u2013 2019. \u2013\u00a0\u0421. 134-139.<\/li>\n<li>Lysenko\u00a0S. Information technology for botnets detection based on their behaviour in the corporate area network \/ S.\u00a0Lysenko, O.\u00a0Savenko, K.\u00a0Bobrovnikova, A.\u00a0Kryshchuk, B. Savenko \/\/ Communications in Computer and Information Science, ISSN:\u00a01865\u20130929. \u2013 2017. \u2013 Vol. 718. \u2013 P.\u00a0166\u2013181.<\/li>\n<li>Pomorova O. Multi-Agent Based Approach for Botnet Detection in a Corporate Area Network Using Fuzzy Logic \/ Oksana Pomorova, Oleg Savenko, Sergii Lysenko, and Andrii Kryshchuk \/\/ Communications in Computer and Information Science<em>. \u2013<\/em> 2013. \u2013 Vol. \u2013 P. 243-254, ISSN: 1865-0929.<\/li>\n<\/ol>\n<p style=\"text-align: center;\"><strong>References<\/strong><\/p>\n<ol>\n<li>V. Tsaregorodtsev, I.A. Savelyev, Solving the problem of increasing the reliability of information-control systems by the cluster method. Bulletin of the Peoples&#8217; Friendship University of Russia. Series: Engineering Research, 2007, pp.79-84.<\/li>\n<li>A. Mikheev. System analysis of methods for ensuring and improving the reliability of a multifunctional information system. Bulletin of the Southern Federal University. Technical Sciences, 2009, pp. 24-34.<\/li>\n<li>Methods for achieving high fault tolerance. OSP &#8211; Guide to Digital Transformation Technologies. URL: https:\/\/www.osp.ru\/winitpro\/2003\/12\/13029028<\/li>\n<li>Mudla B.G. Guarantee capacity as a fundamental generalizing and integrating approach \/ B.G. Mudla, T.I. Yefimova, RM Rudko \/\/ Mathematical Machines and Systems. &#8211; 2010. &#8211; \u2116 2. &#8211; P. 148 &#8211; 165.<\/li>\n<li>Martirosyan A.G., Kalmykov M.I. Basic methods for ensuring fault tolerance of specialized computing devices for digital signal processing \/\/ Modern science-intensive technologies. &#8211; 2014. &#8211; \u2116 3. &#8211; P. 62-67; URL: http:\/\/www.top-technologies.ru\/ru\/article\/view?id=34112.<\/li>\n<li>Golub B.V. Methodology for assessing the survivability of distributed information systems \/ B.V. Golub, E.M. Kuznetsov, R.V. Maksimov \/\/ Bulletin of SamGU. Natural Science Series. &#8211; 2014. &#8211; \u2116 7 (Ts8). \u2013 S. 221\u2013232.<\/li>\n<li>Borovska T.M. Models of efficiency and survivability of technical systems. Borovska T.M., Khomin E.P., Severilov P.V. \/\/ Bulletin of the Vinnitsa Polytechnic Institute. 2011. \u21161, pp. 89-95.<\/li>\n<li>Boranbayev, A., Boranbayev, S., &amp; Nurusheva, A. (2018). Development of a software system to ensure the reliability and fault tolerance in information systems based on expert estimates. <em>Advances in Intelligent Systems and Computing<\/em><em>, <\/em><em>869<\/em><em>,<\/em> 924-935. https:\/\/doi.org\/10.1007\/978-3-030-01057-7_68<\/li>\n<li>Jack Dongarra, Thomas Herault1, Yves Robert Fault tolerance techniques for high-performance computing. Series: Computer Communications and Networks \/\/ 2015, IX, 320 p. 113 illus. https:\/\/www.netlib.org\/lapack\/lawnspdf\/lawn289.pdf \u0434\u0430\u0442\u0430 \u0437\u0432\u0435\u0440\u043d\u0435\u043d\u043d\u044f 23.1.22<\/li>\n<li>Savenko O.S Research of methods of antiviral diagnostics of computer networks \/ O.S Savenko, S.M Lysenko \/\/ Herald of Khmelnytskyi National University. Technical sciences. &#8211; 2007. &#8211; \u2116 2, v. 2. &#8211; P. 120\u2013126.<\/li>\n<li>Savenko O.S., Klots Y.P, Mostoviy S.V. Research and analysis of process blocking in a computer system \/\/ Herald of Khmelnytskyi National University. Technical sciences. &#8211; 2007. &#8211; \u2116 3, Volume 1.- P.248-251.<\/li>\n<li>Savenko O.S., Nicheporuk A.O., Paiuk V.P. Estimates of efficiency and reliability of distributed malware detection systems in computer systems of local networks \/\/ Computer-integrated technologies: education, science, production, \u211636, 2019. &#8211; P.134-139.<\/li>\n<li>Lysenko\u00a0S. Information technology for botnets detection based on their behaviour in the corporate area network \/ S.\u00a0Lysenko, O.\u00a0Savenko, K.\u00a0Bobrovnikova, A.\u00a0Kryshchuk, B. Savenko \/\/ Communications in Computer and Information Science, ISSN:\u00a01865\u20130929. \u2013 2017. \u2013 Vol. 718. \u2013 Pp.\u00a0166\u2013181.<\/li>\n<li>Pomorova O. Multi-Agent Based Approach for Botnet Detection in a Corporate Area Network Using Fuzzy Logic \/ Oksana Pomorova, Oleg Savenko, Sergii Lysenko, and Andrii Kryshchuk \/\/ Communications in Computer and Information Science<em>. \u2013<\/em> \u2013 Vol. 370. &#8211; PP.243-254, ISSN: 1865-0929.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[62],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/12173"}],"collection":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=12173"}],"version-history":[{"count":2,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/12173\/revisions"}],"predecessor-version":[{"id":12197,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/12173\/revisions\/12197"}],"wp:attachment":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=12173"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=12173"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=12173"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}