{"id":2129,"date":"2021-01-18T19:04:48","date_gmt":"2021-01-18T17:04:48","guid":{"rendered":"http:\/\/journals.khnu.km.ua\/vestnik\/?p=2129"},"modified":"2021-04-01T11:58:07","modified_gmt":"2021-04-01T08:58:07","slug":"%d0%bc%d0%b5%d1%80%d0%b5%d0%b6%d0%bd%d0%b8%d0%b9-%d0%bc%d0%b5%d1%82%d0%be%d0%b4-%d0%b2%d0%b8%d1%8f%d0%b2%d0%bb%d0%b5%d0%bd%d0%bd%d1%8f-%d1%84%d0%b0%d0%b9%d0%bb%d0%be%d0%b2%d0%be%d0%b3%d0%be-%d0%b7","status":"publish","type":"post","link":"https:\/\/journals.khnu.km.ua\/vestnik\/?p=2129","title":{"rendered":"\u041c\u0435\u0440\u0435\u0436\u043d\u0438\u0439 \u043c\u0435\u0442\u043e\u0434 \u0432\u0438\u044f\u0432\u043b\u0435\u043d\u043d\u044f \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0433\u043e \u0437\u043b\u043e\u0432\u043c\u0438\u0441\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u043e\u0433\u043e \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u0432 \u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u043d\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u0438\u0445 \u043c\u0435\u0440\u0435\u0436"},"content":{"rendered":"<p style=\"text-align: center;\">\u041c\u0415\u0420\u0415\u0416\u041d\u0418\u0419 \u041c\u0415\u0422\u041e\u0414 \u0412\u0418\u042f\u0412\u041b\u0415\u041d\u041d\u042f \u0424\u0410\u0419\u041b\u041e\u0412\u041e\u0413\u041e \u0417\u041b\u041e\u0412\u041c\u0418\u0421\u041d\u041e\u0413\u041e \u041f\u0420\u041e\u0413\u0420\u0410\u041c\u041d\u041e\u0413\u041e \u0417\u0410\u0411\u0415\u0417\u041f\u0415\u0427\u0415\u041d\u041d\u042f \u0412 \u041a\u041e\u041c\u041f\u2019\u042e\u0422\u0415\u0420\u041d\u0418\u0425 \u0421\u0418\u0421\u0422\u0415\u041c\u0410\u0425 \u041b\u041e\u041a\u0410\u041b\u042c\u041d\u0418\u0425 \u041c\u0415\u0420\u0415\u0416<\/p>\n<p style=\"text-align: center;\">NETWORK METHOD OF DETECTION OF COMPUTER VIRUSES IN THE LOCAL NETWORK<\/p>\n<p><a href=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/24-11.pdf\"><img src=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/pdf.png\" \/><\/a> <strong>\u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: 114-121. \u041d\u043e\u043c\u0435\u0440: \u21162, 2019 (271)<\/strong><br \/>\n<strong>\u0410\u0432\u0442\u043e\u0440\u0438:<\/strong><br \/>\n\u041e. \u0421. \u0421\u0410\u0412\u0415\u041d\u041a\u041e<br \/>\n\u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\nO. S. SAVENKO<br \/>\nKhmelnytsky National University<br \/>\n<strong>DOI:<\/strong> <a href=\"https:\/\/www.doi.org\/10.31891\/2307-5732-2019-271-2-114-121\">https:\/\/www.doi.org\/10.31891\/2307-5732-2019-271-2-114-121<\/a><br \/>\n<strong>\u0420\u0435\u0446\u0435\u043d\u0437\u0456\u044f\/Peer review :<\/strong> 27.03.2019 \u0440.<br \/>\n<strong>\u041d\u0430\u0434\u0440\u0443\u043a\u043e\u0432\u0430\u043d\u0430\/Printed :<\/strong> 10.04.2019 \u0440.<\/p>\n<p style=\"text-align: center;\"><strong>\u0410\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u043c\u043e\u0432\u043e\u044e \u043e\u0440\u0438\u0433\u0456\u043d\u0430\u043b\u0443<\/strong><\/p>\n<p>\u0412 \u0440\u043e\u0431\u043e\u0442\u0456 \u0440\u043e\u0437\u0440\u043e\u0431\u043b\u0435\u043d\u043e \u043c\u0435\u0440\u0435\u0436\u043d\u0438\u0439 \u043c\u0435\u0442\u043e\u0434 \u0432\u0438\u044f\u0432\u043b\u0435\u043d\u043d\u044f \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0433\u043e \u0437\u043b\u043e\u0432\u043c\u0438\u0441\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u043e\u0433\u043e \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f. \u0412\u0456\u043d \u0431\u0430\u0437\u0443\u0454\u0442\u044c\u0441\u044f \u043d\u0430 \u0434\u0432\u043e\u0445 \u043c\u0435\u0442\u043e\u0434\u0430\u0445, \u044f\u043a\u0456 \u0437\u0434\u0456\u0439\u0441\u043d\u044e\u044e\u0442\u044c \u043f\u043e\u0431\u0443\u0434\u043e\u0432\u0443 \u043f\u043e\u0432\u0435\u0434\u0456\u043d\u043a\u043e\u0432\u043e\u0457 \u0441\u0438\u0433\u043d\u0430\u0442\u0443\u0440\u0438 \u0442\u0430 \u0457\u0457 \u043f\u043e\u0434\u0430\u043b\u044c\u0448\u0438\u0439 \u0430\u043d\u0430\u043b\u0456\u0437 \u043d\u0430 \u043d\u0430\u044f\u0432\u043d\u0456\u0441\u0442\u044c \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0433\u043e \u0437\u043b\u043e\u0432\u043c\u0438\u0441\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u043e\u0433\u043e \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u0456 \u0440\u043e\u0437\u0431\u0438\u0442\u0442\u044f \u043d\u0430 \u0431\u043b\u043e\u043a\u0438 \u0432\u0438\u043a\u043e\u043d\u0443\u0432\u0430\u043d\u043e\u0457 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u0438 \u0442\u0430 \u0434\u043e\u0441\u043b\u0456\u0434\u0436\u0435\u043d\u043d\u044f \u0457\u0457 \u043d\u0430 \u043d\u0430\u044f\u0432\u043d\u0456\u0441\u0442\u044c \u043f\u043e\u043b\u0456\u043c\u043e\u0440\u0444\u043d\u043e\u0433\u043e \u0442\u0430 \u043c\u0435\u0442\u0430\u043c\u043e\u0440\u0444\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0443 \u0432\u0456\u0440\u0443\u0441\u0443. \u041c\u0435\u0440\u0435\u0436\u043d\u0438\u0439 \u043c\u0435\u0442\u043e\u0434 \u0454 \u043e\u0441\u043d\u043e\u0432\u043e\u044e \u0434\u043b\u044f \u043e\u0440\u0433\u0430\u043d\u0456\u0437\u0430\u0446\u0456\u0457 \u0444\u0443\u043d\u043a\u0446\u0456\u043e\u043d\u0443\u0432\u0430\u043d\u043d\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u0438\u0445 \u043c\u043e\u0434\u0443\u043b\u0456\u0432 \u0440\u043e\u0437\u043f\u043e\u0434\u0456\u043b\u0435\u043d\u043e\u0457 \u0431\u0430\u0433\u0430\u0442\u043e\u0440\u0456\u0432\u043d\u0435\u0432\u043e\u0457 \u0441\u0438\u0441\u0442\u0435\u043c\u0438 \u0456 \u0434\u043e\u0437\u0432\u043e\u043b\u044f\u0454 \u043e\u0440\u0433\u0430\u043d\u0456\u0437\u0443\u0432\u0430\u0442\u0438 \u0457\u0457 \u0440\u043e\u0431\u043e\u0442\u0443 \u0442\u0430 \u0457\u0457 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442, \u0437\u043e\u043a\u0440\u0435\u043c\u0430 \u0437\u0434\u0456\u0439\u0441\u043d\u044e\u0432\u0430\u0442\u0438 \u0432\u0438\u043b\u0443\u0447\u0435\u043d\u043d\u044f \u0439\u043c\u043e\u0432\u0456\u0440\u043d\u043e \u0456\u043d\u0444\u0456\u043a\u043e\u0432\u0430\u043d\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u0438\u0445 \u043c\u043e\u0434\u0443\u043b\u0456\u0432 \u0437 \u0440\u043e\u0437\u043f\u043e\u0434\u0456\u043b\u0435\u043d\u043e\u0457 \u0431\u0430\u0433\u0430\u0442\u043e\u0440\u0456\u0432\u043d\u0435\u0432\u043e\u0457 \u0441\u0438\u0441\u0442\u0435\u043c\u0438, \u0432\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044f \u0432\u0456\u0434\u043d\u043e\u0448\u0435\u043d\u043d\u044f \u0434\u043e \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0433\u043e \u0437\u043b\u043e\u0432\u043c\u0438\u0441\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u043e\u0433\u043e \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u043d\u0430 \u043e\u0441\u043d\u043e\u0432\u0456 \u043e\u0431\u043c\u0456\u043d\u0443 \u0456 \u043e\u0431\u0440\u043e\u0431\u043a\u0438 \u0437\u043d\u0430\u043d\u044c, \u0441\u043a\u0430\u043d\u0443\u0432\u0430\u043d\u043d\u044f \u0432\u0438\u043a\u043e\u043d\u0443\u0432\u0430\u043d\u0438\u0445 \u0444\u0430\u0439\u043b\u0456\u0432 \u0441\u0442\u0432\u043e\u0440\u0435\u043d\u043d\u044f\u043c \u0434\u043b\u044f \u043d\u0438\u0445 \u043e\u043a\u0440\u0435\u043c\u0438\u0445 \u043f\u0440\u043e\u0446\u0435\u0441\u0456\u0432. \u0414\u043b\u044f \u0437\u0434\u0456\u0439\u0441\u043d\u0435\u043d\u043d\u044f \u0434\u0435\u0442\u0430\u043b\u044c\u043d\u0456\u0448\u043e\u0433\u043e \u0430\u043d\u0430\u043b\u0456\u0437\u0443 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0443 \u043d\u0430 \u043e\u0441\u043d\u043e\u0432\u0456 \u043c\u0435\u0440\u0435\u0436\u043d\u043e\u0433\u043e \u043c\u0435\u0442\u043e\u0434\u0443 \u0434\u043e \u043f\u0440\u043e\u0446\u0435\u0441\u0443 \u0432\u0438\u044f\u0432\u043b\u0435\u043d\u043d\u044f \u0437\u0430\u043b\u0443\u0447\u0430\u044e\u0442\u044c\u0441\u044f \u0456\u043d\u0448\u0456 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u0456 \u043c\u043e\u0434\u0443\u043b\u0456.<br \/>\n<strong>\u041a\u043b\u044e\u0447\u043e\u0432\u0456 \u0441\u043b\u043e\u0432\u0430:<\/strong> \u0437\u043b\u043e\u0432\u043c\u0438\u0441\u043d\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u0435 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f, \u0440\u043e\u0437\u043f\u043e\u0434\u0456\u043b\u0435\u043d\u0456 \u0441\u0438\u0441\u0442\u0435\u043c\u0438, \u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u043d\u0456 \u0441\u0438\u0441\u0442\u0435\u043c\u0438, \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u0430 \u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u043d\u0430 \u043c\u0435\u0440\u0435\u0436\u0430, \u043c\u0435\u0440\u0435\u0436\u043d\u0438\u0439 \u043c\u0435\u0442\u043e\u0434, \u043f\u043e\u043b\u0456\u043c\u043e\u0440\u0444\u043d\u0438\u0439 \u0432\u0456\u0440\u0443\u0441, \u043c\u0435\u0442\u0430\u043c\u043e\u0440\u0444\u043d\u0438\u0439 \u0432\u0456\u0440\u0443\u0441.<\/p>\n<p style=\"text-align: center;\"><strong>\u0420\u043e\u0437\u0448\u0438\u0440\u0435\u043d\u0430 \u0430\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u0430\u043d\u0433\u043b\u0456\u0439\u0441\u044c\u043a\u043e\u044e \u043c\u043e\u0432\u043e\u044e<\/strong><\/p>\n<p>The network malware detection method is developed in this work. It is based on two methods for constructing a behavioral signature and its subsequent analysis of the existence of file malware and breaking down the blocks of the executable program and examining it for the presence of a polymorphic and metamorphic virus code. The network method is the basis for organizing the functioning of the distributed module multi-level system software modules and allows it to organize its work and its component, in particular, to seize potentially infected software modules from a distributed multi-level system, to establish a relation to file malware based on the exchange and processing of knowledge, scan executable files creating separate processes for them. To implement a more detailed analysis of the code based on the network method to the detection process involved other software modules. The developed methods for detecting malicious software exploits behavioral signatures, and a representation of behavioral signatures is used to represent them in the RBS, which is pre-filled with sample types of file malware. Behavioral signatures are formed on the basis of incidence distribution and malicious file malware matrices, which are specified by the functions of API functions calls.<br \/>\n<strong>Keywords:<\/strong> Malware, Distributed Systems, Computer Systems, Local Computer Network, Network Method, Polymorphic Virus, Metamorphic Virus.<\/p>\n<p style=\"text-align: center;\"><strong>References<\/strong><\/p>\n<ol>\n<li>Ukrainska pravda. Zatrymaly khakeriv, yaki &#8220;chystyly&#8221; bankivski rakhunky i perevodyly koshty v kryptovaliutu [Elektronnyi resurs]. \u2013 Rezhym dostupu : https:\/\/www.pravda.com.ua \/news\/2019\/01\/10\/7203471\/ (data zvernennia 25.03.2019). \u2013 Nazva z ekranu.<\/li>\n<li>Ukrainska pravda. Naividomishym u Darknet resursom zapravlialy ukraintsi \u2013 Kiberpolitsiia [Elektronnyi resurs]. \u2013 Rezhym dostupu : https:\/\/www.pravda.com.ua\/news\/2019\/01\/28\/7205116\/ (data zvernennia 25.03.2019). \u2013 Nazva z ekranu.<\/li>\n<li>Fokus. Hakery cherez WordPress pytalis atakovat sajt CIK, SBU [Elektronnyj resurs]. \u2013 Rezhim dostupa : https:\/\/focus.ua\/ukraine\/422005-xakery-cherez-wordpress-pytalis-atakovat-sajt-cik&#8211;sbu.html (data ob\u00acrasheniya 25.03.2019). \u2013 Nazvanie s ekrana.<\/li>\n<li>Markowsky G. Distributed Malware Detection System Based on Decentralized Architecture in Local Area Networks \/ G. Markowsky, O. Savenko, A. Sachenko \/\/ Advances in Intelligent Systems and Computing. \u2013 2019. \u2013 Vol. 871. \u2013 P. 582\u2013598.<\/li>\n<li>Komar M. High performance adaptive system for cyber attacks detection \/ M. Komar, V. Kochan, L. Dubchak, A. Sachenko, V. Golovko, S. Bezobrazov, I. Romanets \/\/ Proceedings of the 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications. \u2013 Bucharest (Romania), 21-23 September, 2017. \u2013 Vol. 2. \u2013 P. 853\u2013858.<\/li>\n<li>Golovko V. Neural Network Artificial Immune System for Malicious Code Detection \/ V. Golovko, S. Bezobrazov\/\/ Brest State Technical University. \u2013 2015. \u2013 P. 1\u20137.<\/li>\n<li>Branitskiy A. Hybridization of computational intelligence methods for attack detection in computer networks \/ A. Branitskiy, I. Kotenko \/\/ Journal of Computational Science. \u2013 2017. \u2013 No. 23. \u2013 P. 145\u2013156.<\/li>\n<li>Wang G. A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering \/ G. Wang, J. Hao, J. Ma \/\/ Huang L. Expert Systems with Applications \/\/ An International Journal. \u2013 2010. \u2013 Vol. 37. \u2013 Issue 9. \u2013 P. 6225\u20136232.<\/li>\n<li>Savenko O.S. Formuvannia syhnatury povedinky prohram na osnovi trasuvannia API vyklykiv \/ O.S. Savenko, A.O. Nicheporuk, A.A. Nicheporuk, Yu.O. Nicheporuk \/\/ Elektrotekhnichni ta kompiuterni systemy. \u2013 2018. \u2013 \u2116 29(105). \u2013 S. 67\u201377.<\/li>\n<li>Markowsky G. The technique for metamorphic viruses detection based on its obfuscation features analysis \/ G. Markowsky, O. Savenko, S. Lysenko, A. Nicheporuk \/\/ CEUR-WS \u2013 2018. \u2013 Vol. 2104. \u2013 P. 680\u2013687.<\/li>\n<li>Savenko O.S. Arkhitektura bahatorivnevoi prohramnoi systemy vyiavlennia shkidlyvoho prohramnoho zabezpechennia v lokalnykh kompiuternykh merezhakh \/ O.S. Savenko, V.I. Hrybynchuk, M.O. Kulchytskyi \/\/ Kompiuterno-intehrovani tekhnolohii: osvita, nauka, vyrobnytstvo. \u2013 2018. \u2013 \u2116 30-31. \u2013 S. 132\u2013140.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u041c\u0415\u0420\u0415\u0416\u041d\u0418\u0419 \u041c\u0415\u0422\u041e\u0414 \u0412\u0418\u042f\u0412\u041b\u0415\u041d\u041d\u042f \u0424\u0410\u0419\u041b\u041e\u0412\u041e\u0413\u041e \u0417\u041b\u041e\u0412\u041c\u0418\u0421\u041d\u041e\u0413\u041e \u041f\u0420\u041e\u0413\u0420\u0410\u041c\u041d\u041e\u0413\u041e \u0417\u0410\u0411\u0415\u0417\u041f\u0415\u0427\u0415\u041d\u041d\u042f \u0412 \u041a\u041e\u041c\u041f\u2019\u042e\u0422\u0415\u0420\u041d\u0418\u0425 \u0421\u0418\u0421\u0422\u0415\u041c\u0410\u0425 \u041b\u041e\u041a\u0410\u041b\u042c\u041d\u0418\u0425 \u041c\u0415\u0420\u0415\u0416 NETWORK METHOD OF DETECTION OF COMPUTER VIRUSES IN THE LOCAL NETWORK \u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: 114-121. \u041d\u043e\u043c\u0435\u0440: \u21162, 2019 (271) \u0410\u0432\u0442\u043e\u0440\u0438: \u041e. \u0421. \u0421\u0410\u0412\u0415\u041d\u041a\u041e \u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442 O. S. SAVENKO Khmelnytsky National University DOI: https:\/\/www.doi.org\/10.31891\/2307-5732-2019-271-2-114-121 \u0420\u0435\u0446\u0435\u043d\u0437\u0456\u044f\/Peer review : 27.03.2019 \u0440. \u041d\u0430\u0434\u0440\u0443\u043a\u043e\u0432\u0430\u043d\u0430\/Printed : 10.04.2019 \u0440. \u0410\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u043c\u043e\u0432\u043e\u044e [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[22],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/2129"}],"collection":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2129"}],"version-history":[{"count":3,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/2129\/revisions"}],"predecessor-version":[{"id":5297,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/2129\/revisions\/5297"}],"wp:attachment":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2129"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2129"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2129"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}