{"id":1237,"date":"2021-01-15T22:29:46","date_gmt":"2021-01-15T20:29:46","guid":{"rendered":"http:\/\/journals.khnu.km.ua\/vestnik\/?p=1237"},"modified":"2021-03-03T15:25:53","modified_gmt":"2021-03-03T13:25:53","slug":"%d0%bc%d0%b5%d1%82%d0%be%d0%b4-%d0%b2%d0%b8%d0%be%d0%ba%d1%80%d0%b5%d0%bc%d0%bb%d0%b5%d0%bd%d0%bd%d1%8f-%d1%84%d1%80%d0%b0%d0%b3%d0%bc%d0%b5%d0%bd%d1%82%d1%96%d0%b2-%d0%b1%d0%be%d1%82-%d0%bc%d0%b5","status":"publish","type":"post","link":"https:\/\/journals.khnu.km.ua\/vestnik\/?p=1237","title":{"rendered":"\u041c\u0435\u0442\u043e\u0434 \u0432\u0438\u043e\u043a\u0440\u0435\u043c\u043b\u0435\u043d\u043d\u044f \u0444\u0440\u0430\u0433\u043c\u0435\u043d\u0442\u0456\u0432 \u0431\u043e\u0442-\u043c\u0435\u0440\u0435\u0436 \u043d\u0430 \u043e\u0441\u043d\u043e\u0432\u0456 \u0430\u043d\u0430\u043b\u0456\u0437\u0443 \u043c\u0435\u0440\u0435\u0436\u0435\u0432\u043e\u0433\u043e \u0442\u0440\u0430\u0444\u0456\u043a\u0443"},"content":{"rendered":"<p style=\"text-align: center;\">\u041c\u0415\u0422\u041e\u0414 \u0412\u0418\u041e\u041a\u0420\u0415\u041c\u041b\u0415\u041d\u041d\u042f \u0424\u0420\u0410\u0413\u041c\u0415\u041d\u0422\u0406\u0412 \u0411\u041e\u0422-\u041c\u0415\u0420\u0415\u0416 \u041d\u0410 \u041e\u0421\u041d\u041e\u0412\u0406 \u0410\u041d\u0410\u041b\u0406\u0417\u0423 \u041c\u0415\u0420\u0415\u0416\u0415\u0412\u041e\u0413\u041e \u0422\u0420\u0410\u0424\u0406\u041a\u0423<\/p>\n<p style=\"text-align: center;\">METHOD OF DETECTING FRAGMENTS OF BOTNETS BASED ON THE ANALYSIS OF NETWORK TRAFFIC<\/p>\n<p><a href=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/24-4.pdf\"><img src=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/pdf.png\" \/><\/a> <strong>\u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: 141-149. \u041d\u043e\u043c\u0435\u0440: \u21162, 2020 (283)<\/strong><br \/>\n<strong>\u0410\u0432\u0442\u043e\u0440\u0438:<\/strong><br \/>\n\u0410.\u041e. \u041d\u0406\u0427\u0415\u041f\u041e\u0420\u0423\u041a, \u0410.\u0410. \u041d\u0406\u0427\u0415\u041f\u041e\u0420\u0423\u041a, \u042e.\u041e. \u041d\u0406\u0427\u0415\u041f\u041e\u0420\u0423\u041a, \u0410.\u0414. \u041a\u0410\u0417\u0410\u041d\u0426\u0415\u0412<br \/>\n\u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\nA.O. NICHEPORUK, A.A. NICHEPORUK, Y.O. NICHEPORUK, A.D. KAZANTSEV<br \/>\nKhmelnytskyi National University<br \/>\n<strong>DOI:<\/strong> <a href=\"https:\/\/www.doi.org\/10.31891\/2307-5732-2020-283-2-141-149\">https:\/\/www.doi.org\/10.31891\/2307-5732-2020-283-2-141-149<\/a><br \/>\n<strong>\u0420\u0435\u0446\u0435\u043d\u0437\u0456\u044f\/Peer review :<\/strong> 26.05.2020 \u0440.<br \/>\n<strong>\u041d\u0430\u0434\u0440\u0443\u043a\u043e\u0432\u0430\u043d\u0430\/Printed :<\/strong> 16.06.2020 \u0440.<\/p>\n<p style=\"text-align: center;\"><strong>\u0410\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u043c\u043e\u0432\u043e\u044e \u043e\u0440\u0438\u0433\u0456\u043d\u0430\u043b\u0443<\/strong><\/p>\n<p>\u0412 \u0440\u043e\u0431\u043e\u0442\u0456 \u0437\u0430\u043f\u0440\u043e\u043f\u043e\u043d\u043e\u0432\u0430\u043d\u043e \u043c\u0435\u0442\u043e\u0434 \u0432\u0438\u044f\u0432\u043b\u0435\u043d\u043d\u044f \u0444\u0440\u0430\u0433\u043c\u0435\u043d\u0442\u0456\u0432 \u0431\u043e\u0442-\u043c\u0435\u0440\u0435\u0436 \u043d\u0430 \u043e\u0441\u043d\u043e\u0432\u0456 \u0430\u043d\u0430\u043b\u0456\u0437\u0443 \u043c\u0435\u0440\u0435\u0436\u0435\u0432\u043e\u0433\u043e \u0442\u0440\u0430\u0444\u0456\u043a\u0443. \u041c\u0435\u0442\u043e\u0434 \u0437\u0430\u0441\u043d\u043e\u0432\u0430\u043d\u0438\u0439 \u043d\u0430 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u043d\u0456 \u0448\u043a\u0456\u0434\u043b\u0438\u0432\u043e\u0457 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0456, \u0449\u043e \u0437\u0434\u0456\u0439\u0441\u043d\u044e\u044e\u0442\u044c \u0431\u043e\u0442\u0438 \u0432 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u0456\u0439 \u043c\u0435\u0440\u0435\u0436\u0456 \u0443 \u0432\u0438\u0433\u043b\u044f\u0434\u0456 \u0437\u0432\u0430\u0436\u0435\u043d\u043e\u0433\u043e \u043e\u0440\u0456\u0454\u043d\u0442\u043e\u0432\u0430\u043d\u043e\u0433\u043e \u0433\u0440\u0430\u0444\u0443, \u0434\u0435 \u0432\u0435\u0440\u0448\u0438\u043d\u0430\u043c\u0438 \u0432\u0438\u0441\u0442\u0443\u043f\u0430\u044e\u0442\u044c \u0445\u043e\u0441\u0442\u0438 \u043c\u0435\u0440\u0435\u0436\u0456, \u0430 \u0440\u0435\u0431\u0440\u0430\u043c\u0438 \u2013 \u0437\u0432\u2019\u044f\u0437\u043a\u0438 \u043c\u0456\u0436 \u0445\u043e\u0441\u0442\u0430\u043c\u0438.\u00a0 \u0417 \u043c\u0435\u0442\u043e\u044e \u0432\u0438\u044f\u0432\u043b\u0435\u043d\u043d\u044f \u0448\u043a\u0456\u0434\u043b\u0438\u0432\u043e\u0457 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0456 \u043d\u0430 \u0445\u043e\u0441\u0442\u0456 \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u0430\u0454\u043c\u043e IDS Snort \u2013 \u043c\u0435\u0440\u0435\u0436\u0435\u0432\u0443 \u0441\u0438\u0441\u0442\u0435\u043c\u0443 \u0432\u0438\u044f\u0432\u043b\u0435\u043d\u043d\u044f \u0432\u0442\u043e\u0440\u0433\u043d\u0435\u043d\u044c, \u0449\u043e \u043f\u0440\u0430\u0446\u044e\u0454 \u0437\u0430 \u043f\u0440\u0438\u043d\u0446\u0438\u043f\u043e\u043c \u043c\u0435\u0440\u0435\u0436\u0435\u0432\u0438\u0445 \u0441\u043d\u0456\u0444\u0435\u0440\u0456\u0432. \u0412\u0441\u0456 \u0448\u043a\u0456\u0434\u043b\u0438\u0432\u0456 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0456 \u0440\u043e\u0437\u043f\u043e\u0434\u0456\u043b\u0435\u043d\u043e \u0441\u0456\u043c \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0456\u0439: \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c, \u0441\u043a\u0430\u043d\u0443\u0432\u0430\u043d\u043d\u044f, \u0441\u043f\u0430\u043c, \u043e\u0442\u0440\u0438\u043c\u0430\u043d\u043d\u044f \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457, \u0437\u0430\u0432\u0430\u043d\u0442\u0430\u0436\u0435\u043d\u043d\u044f, \u0430\u0442\u0430\u043a\u0430 \u0442\u0430 \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0456\u044f \u0456\u043d\u0448\u0456 \u0417\u0432\u2019\u044f\u0437\u043d\u0456\u0441\u0442\u044c \u0433\u0440\u0430\u0444\u0443 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0443\u0454\u0442\u044c\u0441\u044f \u043d\u0430\u044f\u0432\u043d\u0456\u0441\u0442\u044e \u0440\u0435\u0431\u0435\u0440, \u044f\u043a\u0456 \u043c\u0430\u044e\u0442\u044c \u0432\u0430\u0433\u0438.\u00a0 \u0412\u0430\u0433\u043e\u044e \u0440\u0435\u0431\u0440\u0430, \u0449\u043e \u0437&#8217;\u0454\u0434\u043d\u0443\u0454 \u0434\u0432\u0430 \u0432\u0443\u0437\u043b\u0438, \u0454 \u0456\u043c\u043e\u0432\u0456\u0440\u043d\u0456\u0441\u0442\u044c \u0442\u043e\u0433\u043e, \u0449\u043e \u0434\u0432\u0430 \u0432\u0443\u0437\u043b\u0438 \u0454 \u0447\u0430\u0441\u0442\u0438\u043d\u043e\u044e \u043e\u0434\u043d\u0456\u0454\u0457 \u0431\u043e\u0442-\u043c\u0435\u0440\u0435\u0436\u0456. \u0414\u043b\u044f \u0432\u0438\u0437\u043d\u0430\u0447\u0435\u043d\u043d\u044f \u0456\u043c\u043e\u0432\u0456\u0440\u043d\u043e\u0441\u0442\u0456 \u0442\u043e\u0433\u043e, \u0449\u043e \u0434\u0432\u0430 \u0432\u0443\u0437\u043b\u0438 \u0454 \u0447\u0430\u0441\u0442\u0438\u043d\u043e\u044e \u043e\u0434\u043d\u0456\u0454\u0457 \u0431\u043e\u0442-\u043c\u0435\u0440\u0435\u0436\u0456 \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u043e\u0432\u0443\u0454\u0442\u044c\u0441\u044f \u043f\u0440\u0430\u0432\u0438\u043b\u043e \u0411\u0430\u0439\u0454\u0441\u0430. \u041e\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044f \u0432\u0430\u0433\u0456\u0432 \u0440\u0435\u0431\u0435\u0440 \u0432\u0456\u0434\u0431\u0443\u0432\u0430\u0454\u0442\u044c\u0441\u044f \u043f\u0456\u0441\u043b\u044f \u043a\u043e\u0436\u043d\u043e\u0433\u043e \u0456\u043d\u0442\u0435\u0440\u0432\u0430\u043b\u0443 \u0447\u0430\u0441\u0443 \u0432 \u043c\u0435\u0436\u0430\u0445 \u0437\u0430\u0433\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0447\u0430\u0441\u0443 \u043c\u043e\u043d\u0456\u0442\u043e\u0440\u0438\u043d\u0433\u0443 \u0448\u043a\u0456\u0434\u043b\u0438\u0432\u043e\u0457 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0456. \u041d\u0430\u043f\u0440\u0438\u043a\u0456\u043d\u0446\u0456 \u0447\u0430\u0441\u0443 \u043c\u043e\u043d\u0456\u0442\u043e\u0440\u0438\u043d\u0433\u0443 \u0437\u0434\u0456\u0439\u0441\u043d\u044e\u0454\u0442\u044c\u0441\u044f \u0440\u043e\u0437\u0431\u0438\u0442\u0442\u044f \u043e\u0442\u0440\u0438\u043c\u0430\u043d\u043e\u0433\u043e \u0433\u0440\u0430\u0444\u0443 \u043d\u0430 \u043f\u0456\u0434\u0433\u0440\u0430\u0444\u0438, \u0449\u043e \u0432\u0456\u0434\u043f\u043e\u0432\u0456\u0434\u0430\u044e\u0442\u044c \u043e\u043a\u0440\u0435\u043c\u0438\u043c \u0431\u043e\u0442-\u043c\u0435\u0440\u0435\u0436\u0430\u043c. \u0414\u043b\u044f \u0440\u043e\u0437\u0431\u0438\u0442\u0442\u044f \u0433\u0440\u0430\u0444\u0443 \u043d\u0430 \u043f\u0456\u0434\u0433\u0440\u0430\u0444\u0438 \u0440\u043e\u0437\u0440\u043e\u0431\u043b\u0435\u043d\u0438\u0439 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c, \u0449\u043e \u0434\u043e\u0437\u0432\u043e\u043b\u044f\u0454 \u0432\u0438\u0434\u0456\u043b\u0438\u0442\u0438 \u0444\u0440\u0430\u0433\u043c\u0435\u043d\u0442\u0438 \u0440\u0456\u0437\u043d\u0438\u0445 \u0431\u043e\u0442-\u043c\u0435\u0440\u0435\u0436, \u044f\u043a\u0456 \u043f\u0440\u0438\u0441\u0443\u0442\u043d\u0456 \u0432 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u0456\u0439 \u043c\u0435\u0440\u0435\u0436\u0456. \u041f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u0438\u0439 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u043e\u0432\u0443\u0454 \u201c\u0436\u0430\u0434\u0456\u0431\u043d\u0438\u0439\u201d \u043f\u0456\u0434\u0445\u0456\u0434 \u0442\u0430\u00a0 \u0491\u0440\u0443\u043d\u0442\u0443\u0454\u0442\u044c\u0441\u044f \u043d\u0430 \u043e\u0431\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u0456 \u043c\u0430\u043a\u0441\u0438\u043c\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0432\u0438\u0433\u0440\u0430\u0448\u0443, \u044f\u043a\u0438\u0439 \u043c\u043e\u0436\u0435 \u043f\u0440\u0438\u043d\u0435\u0441\u0442\u0438 \u043f\u0435\u0440\u0435\u043d\u0435\u0441\u0435\u043d\u043d\u044f \u0431\u0443\u0434\u044c-\u044f\u043a\u043e\u0457 \u0432\u0435\u0440\u0448\u0438\u043d\u0438 \u0432 \u0442\u043e\u0439 \u0447\u0438 \u0456\u043d\u0448\u0438\u0439 \u043f\u0456\u0434\u0433\u0440\u0430\u0444 \u0440\u043e\u0437\u0431\u0438\u0442\u0442\u044f.<br \/>\n<strong>\u041a\u043b\u044e\u0447\u043e\u0432\u0456 \u0441\u043b\u043e\u0432\u0430:<\/strong> \u0431\u043e\u0442-\u043c\u0435\u0440\u0435\u0436\u0430, \u043c\u0435\u0440\u0435\u0436\u0435\u0432\u0438\u0439 \u0442\u0440\u0430\u0444\u0456\u043a, \u043e\u0440\u0456\u0454\u043d\u0442\u043e\u0432\u0430\u043d\u0438\u0439 \u0433\u0440\u0430\u0444, \u0445\u043e\u0441\u0442.<\/p>\n<p style=\"text-align: center;\"><strong>\u0420\u043e\u0437\u0448\u0438\u0440\u0435\u043d\u0430 \u0430\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u0430\u043d\u0433\u043b\u0456\u0439\u0441\u044c\u043a\u043e\u044e \u043c\u043e\u0432\u043e\u044e<\/strong><\/p>\n<p>The paper proposes a method of detecting fragments of botnets based on the analysis of network traffic. The proposed method depends primarily on the temporary relationships of malicious actions between computers on the network and does not depend on the architectures of botnets and the tools used to manage them. The method is based on the representation of malicious activity performed by bots in the local network in the form of a weighted oriented graph, where the vertices are the hosts of the network, and the edges are the connections between the hosts. In order to detect malicious activity on the host, we use IDS Snort &#8211; a network intrusion detection system that works on the principle of network sniffers. All malicious activities are divided into seven categories: control, scanning, spam, information retrieval, downloads, attacks and other categories. The connectivity of the graph is ensured by the presence of edges that have weights. The weight of the edge connecting the two nodes is the probability that the two nodes are part of the same bot network. The Bayesian rule is used to determine the probability that two nodes are part of the same bot network. The edge weights are updated after each time interval within the total time of harmful activity monitoring. At the end of the monitoring time, the obtained graph is divided into subgraphs corresponding to individual bot networks. An algorithm has been developed to divide a graph into subgraphs, which allows to select fragments of different bot networks that are present in the local network. The presented algorithm uses a &#8220;greedy&#8221; approach and is based on the calculation of the maximum gain that can bring the transfer of any vertex in a subgraph of the partition. To verifying the effectiveness of the proposed method, a number of experiments were performed, which included determining the fact of the presence of a botnet on a local computer network.<br \/>\n<strong>Keywords:<\/strong> botnet, network traffic, oriented graph, host.<\/p>\n<p style=\"text-align: center;\"><strong>References<\/strong><\/p>\n<ol>\n<li>Kapre A., Padmavathi B. Behaviour based botnet detection with traffic analysis and flow interavals using PSO and SVM. International Conference on Intelligent Computing and Control Systems: Proceedings (Madurai, India, 15-16 June 2017). Madurai, 2017. P. 718\u2013722.<\/li>\n<li>Jaikumar P., Kak A.C.A graph-theoretic framework for isolating botnets in a network. Security and Communication Networks. 2012. Vol. 5. No. 6. P. 2605\u20132623.<\/li>\n<li>Li S.H., Kao Y.C., Zhang Z.C., Chuang Y.P., Yen D.C. A Network Behavior-Based Botnet Detection Mechanism Using PSO and K-means. ACM Transactions on Management Information Systems. 2015. Vol. 6. Issue 1. 3\u201312.<\/li>\n<li>Stevanovic M., Pedersen J. M. An analysis of network traffic classification for botnet detection. Cyber Situational Awareness, Data Analytics and Assessment: Proceedings (London, UK, June 8\u20139 2015). London, 2015. P.\u00a01\u20138.<\/li>\n<li>Chen S.C., Chen Y.R., Tzeng W.G. Effective Botnet Detection Through Neural Networks on Convolutional Features. The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications. 12th IEEE International Conference On Big Data Science And Engineering: Proceedings (New York, NY, USA, 1\u20133 August 2018 ). New York, 2018. 372\u2013378.<\/li>\n<li>Thangapandiyan M., Anand P. M. An efficient botnet detection system for P2P botnet. International Conference on Wireless Communications, Signal Processing and Networking: Proceedings (Chennai, India, May 23-25). Chennai,2016. P. 1217\u20131221.<\/li>\n<li>Zhang C., Green R. Communication security in internet of thing:preventive measure and avoid ddos attack over iot network. Proceedings of the 18th Symposium on Communications &amp; Networking. Societyfor Computer Simulation International, 2015, P. 8\u20131<\/li>\n<li>IDS Snort. URL: https:\/\/www.snort.org\/<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>\u041c\u0415\u0422\u041e\u0414 \u0412\u0418\u041e\u041a\u0420\u0415\u041c\u041b\u0415\u041d\u041d\u042f \u0424\u0420\u0410\u0413\u041c\u0415\u041d\u0422\u0406\u0412 \u0411\u041e\u0422-\u041c\u0415\u0420\u0415\u0416 \u041d\u0410 \u041e\u0421\u041d\u041e\u0412\u0406 \u0410\u041d\u0410\u041b\u0406\u0417\u0423 \u041c\u0415\u0420\u0415\u0416\u0415\u0412\u041e\u0413\u041e \u0422\u0420\u0410\u0424\u0406\u041a\u0423 METHOD OF DETECTING FRAGMENTS OF BOTNETS BASED ON THE ANALYSIS OF NETWORK TRAFFIC \u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: 141-149. \u041d\u043e\u043c\u0435\u0440: \u21162, 2020 (283) \u0410\u0432\u0442\u043e\u0440\u0438: \u0410.\u041e. \u041d\u0406\u0427\u0415\u041f\u041e\u0420\u0423\u041a, \u0410.\u0410. \u041d\u0406\u0427\u0415\u041f\u041e\u0420\u0423\u041a, \u042e.\u041e. \u041d\u0406\u0427\u0415\u041f\u041e\u0420\u0423\u041a, \u0410.\u0414. \u041a\u0410\u0417\u0410\u041d\u0426\u0415\u0412 \u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442 A.O. NICHEPORUK, A.A. NICHEPORUK, Y.O. NICHEPORUK, A.D. KAZANTSEV Khmelnytskyi National University DOI: https:\/\/www.doi.org\/10.31891\/2307-5732-2020-283-2-141-149 \u0420\u0435\u0446\u0435\u043d\u0437\u0456\u044f\/Peer review [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[15],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/1237"}],"collection":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1237"}],"version-history":[{"count":3,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/1237\/revisions"}],"predecessor-version":[{"id":4014,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/1237\/revisions\/4014"}],"wp:attachment":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1237"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1237"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1237"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}