{"id":2287,"date":"2021-01-18T19:56:58","date_gmt":"2021-01-18T17:56:58","guid":{"rendered":"http:\/\/journals.khnu.km.ua\/vestnik\/?p=2287"},"modified":"2021-02-16T13:13:50","modified_gmt":"2021-02-16T11:13:50","slug":"%d0%bc%d0%b5%d1%82%d0%be%d0%b4-%d0%b2%d0%b8%d1%8f%d0%b2%d0%bb%d0%b5%d0%bd%d0%bd%d1%8f-%d0%ba%d1%96%d0%b1%d0%b5%d1%80%d0%b7%d0%b0%d0%b3%d1%80%d0%be%d0%b7-%d1%82%d0%b0-%d1%88%d0%bf%d0%b7-%d0%b4%d0%bb","status":"publish","type":"post","link":"https:\/\/journals.khnu.km.ua\/vestnik\/?p=2287","title":{"rendered":"\u041c\u0435\u0442\u043e\u0434 \u0432\u0438\u044f\u0432\u043b\u0435\u043d\u043d\u044f \u043a\u0456\u0431\u0435\u0440\u0437\u0430\u0433\u0440\u043e\u0437 \u0442\u0430 \u0448\u043f\u0437 \u0434\u043b\u044f \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u0436\u0438\u0432\u0443\u0447\u043e\u0441\u0442\u0456 \u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u043d\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u0432 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u0438\u0445 \u043c\u0435\u0440\u0435\u0436\u0430\u0445 \u043d\u0430 \u043e\u0441\u043d\u043e\u0432\u0456 \u0441\u0430\u043c\u043e \u0430\u0434\u0430\u043f\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0456"},"content":{"rendered":"<p><!--more--><\/p>\n<p style=\"text-align: center;\">\u041c\u0415\u0422\u041e\u0414 \u0412\u0418\u042f\u0412\u041b\u0415\u041d\u041d\u042f \u041a\u0406\u0411\u0415\u0420\u0417\u0410\u0413\u0420\u041e\u0417 \u0422\u0410 \u0428\u041f\u0417 \u0414\u041b\u042f \u0417\u0410\u0411\u0415\u0417\u041f\u0415\u0427\u0415\u041d\u041d\u042f \u0416\u0418\u0412\u0423\u0427\u041e\u0421\u0422\u0406 \u041a\u041e\u041c\u041f\u2019\u042e\u0422\u0415\u0420\u041d\u0418\u0425 \u0421\u0418\u0421\u0422\u0415\u041c \u00a0\u0412 \u041a\u041e\u0420\u041f\u041e\u0420\u0410\u0422\u0418\u0412\u041d\u0418\u0425 \u041c\u0415\u0420\u0415\u0416\u0410\u0425 \u041d\u0410 \u041e\u0421\u041d\u041e\u0412\u0406 \u0421\u0410\u041c\u041e\u0410\u0414\u0410\u041f\u0422\u0418\u0412\u041d\u041e\u0421\u0422\u0406<\/p>\n<p style=\"text-align: center;\">\n<p style=\"text-align: center;\">METHOD FOR CYBER THREATS AND MALWARE DETECTION TO ENSURE THE COMPUTER SYSTEMS RESILIENCE OF IN CORPORATE NETWORKS BASED ON SELF-ADAPTIVITY<\/p>\n<p style=\"text-align: center;\">\n<p><a href=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/9-12.pdf\"><img src=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/pdf.png\"><\/a><br \/>\n<strong>\u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: 39-43. \u041d\u043e\u043c\u0435\u0440: \u21164, 2020 (287)<\/strong><\/p>\n<p><strong>\u0410\u0432\u0442\u043e\u0440\u0438:<\/strong><br \/>\n\u0421.\u041c. \u041b\u0418\u0421\u0415\u041d\u041a\u041e, \u0422.\u041c. \u041a\u0418\u0421\u0406\u041b\u042c, \u042e.\u041e. \u041d\u0406\u0427\u0415\u041f\u041e\u0420\u0423\u041a, \u0410.\u0412. \u0413\u041e\u0420\u041e\u0428\u041a\u041e<br \/>\n\u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<\/p>\n<p>S. LYSENKO, T. KYSIL, Y. NICHEPORUK, A. GOROSHKO<br \/>\nKhmelnytskyi National University<\/p>\n<p>&nbsp;<br \/>\n<strong>DOI:<\/strong> <a href=\"https:\/\/www.doi.org\/10.31891\/2307-5732-2020-287-4-39-43\">https:\/\/www.doi.org\/10.31891\/2307-5732-2020-287-4-39-43<\/a><br \/>\n&nbsp;<\/p>\n<p><strong>\u0420\u0435\u0446\u0435\u043d\u0437\u0456\u044f\/Peer review : <\/strong>17.10.2020 \u0440.<br \/>\n<strong>\u041d\u0430\u0434\u0440\u0443\u043a\u043e\u0432\u0430\u043d\u0430\/Printed : <\/strong>04.11.2020 \u0440.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\"><strong>\u0410\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u043c\u043e\u0432\u043e\u044e \u043e\u0440\u0438\u0433\u0456\u043d\u0430\u043b\u0443<\/strong><\/p>\n<p>\u00a0 \u00a0 \u00a0\u0412 \u0440\u043e\u0431\u043e\u0442\u0456 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u043e \u043c\u0435\u0442\u043e\u0434 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u0436\u0438\u0432\u0443\u0447\u043e\u0441\u0442\u0456 \u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u043d\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u0432 \u0443\u043c\u043e\u0432\u0430\u0445 \u043a\u0456\u0431\u0435\u0440\u0437\u0430\u0433\u0440\u043e\u0437 \u043d\u0430 \u043e\u0441\u043d\u043e\u0432\u0456 \u0441\u0430\u043c\u043e\u0430\u0434\u0430\u043f\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0456, \u044f\u043a\u0438\u0439 \u0434\u043e\u0437\u0432\u043e\u043b\u044f\u0454 \u0437\u0434\u0456\u0439\u0441\u043d\u044e\u0432\u0430\u0442\u0438 \u0430\u0434\u0430\u043f\u0442\u0438\u0432\u043d\u0435 \u0440\u0435\u043a\u043e\u043d\u0444\u0456\u0433\u0443\u0440\u0443\u0432\u0430\u043d\u043d\u044f \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0456\u0432 \u041a\u0421 \u0448\u043b\u044f\u0445\u043e\u043c \u0441\u0446\u0435\u043d\u0430\u0440\u0456\u0457\u0432 \u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u0442\u0430 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0443\u0454 \u0437\u0434\u0430\u0442\u043d\u0456\u0441\u0442\u044c \u0441\u0438\u0441\u0442\u0435\u043c\u0438 \u0434\u043e \u0441\u0442\u0456\u0439\u043a\u043e\u0433\u043e \u0457\u0457 \u0444\u0443\u043d\u043a\u0446\u0456\u043e\u043d\u0443\u0432\u0430\u043d\u043d\u044f \u0432 \u0441\u0438\u0442\u0443\u0430\u0446\u0456\u0457 \u043d\u0430\u044f\u0432\u043d\u043e\u0441\u0442\u0456 \u043a\u0456\u0431\u0435\u0440\u0430\u0442\u0430\u043a. \u0416\u0438\u0432\u0443\u0447\u0456\u0441\u0442\u044c \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0443\u0454\u0442\u044c\u0441\u044f \u0430\u0434\u0430\u043f\u0442\u0438\u0432\u043d\u0438\u043c \u0432\u0456\u0434\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044f\u043c \u043c\u0435\u0440\u0435\u0436\u0456. \u0426\u044f \u0440\u0435\u043a\u043e\u043d\u0441\u0442\u0440\u0443\u043a\u0446\u0456\u044f \u043f\u0440\u043e\u0432\u043e\u0434\u0438\u0442\u044c\u0441\u044f \u043d\u0430 \u043e\u0441\u043d\u043e\u0432\u0456 \u0441\u0446\u0435\u043d\u0430\u0440\u0456\u044e \u0431\u0435\u0437\u043f\u0435\u043a\u0438, \u043f\u0440\u0438\u0439\u043d\u044f\u0442\u043e\u0433\u043e \u043d\u0430 \u043e\u0441\u043d\u043e\u0432\u0456 \u0430\u043d\u0430\u043b\u0456\u0437\u0443 \u0440\u0430\u043d\u0456\u0448\u0435 \u0437\u0456\u0431\u0440\u0430\u043d\u0438\u0445 \u043e\u0437\u043d\u0430\u043a, \u043f\u0440\u0438\u0442\u0430\u043c\u0430\u043d\u043d\u0438\u0445 \u043a\u0456\u0431\u0435\u0440\u0430\u0442\u0430\u043a\u0430\u043c. \u041e\u0437\u043d\u0430\u043a\u0438 \u0430\u0442\u0430\u043a \u0444\u043e\u0440\u043c\u0443\u044e\u0442\u044c\u0441\u044f \u044f\u043a \u0432\u0435\u043a\u0442\u043e\u0440\u0438 \u043e\u0437\u043d\u0430\u043a \u0456 \u043f\u0456\u0434\u043b\u044f\u0433\u0430\u044e\u0442\u044c \u043a\u043b\u0430\u0441\u0438\u0444\u0456\u043a\u0430\u0446\u0456\u0457. \u0420\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u043e\u043c \u043a\u043b\u0430\u0441\u0438\u0444\u0456\u043a\u0430\u0446\u0456\u0457 \u0454 \u0432\u0456\u0434\u043d\u0435\u0441\u0435\u043d\u043d\u044f \u043e\u0431\u2019\u0454\u043a\u0442\u0443 \u043a\u043b\u0430\u0441\u0438\u0444\u0456\u043a\u0430\u0446\u0456\u0457 \u0434\u043e \u0432\u0456\u0434\u043f\u043e\u0432\u0456\u0434\u043d\u043e\u0433\u043e \u043a\u043b\u0430\u0441\u0443, \u044f\u043a\u0438\u0439 \u0432\u0456\u0434\u043f\u043e\u0432\u0456\u0434\u0430\u0454 \u043f\u0435\u0432\u043d\u0456\u0439 \u043a\u0456\u0431\u0435\u0440\u0430\u0442\u0430\u0446\u0456. \u041c\u0435\u0442\u043e\u044e \u043c\u0435\u0442\u043e\u0434\u0443 \u0454 \u0432\u0438\u0431\u0456\u0440 \u043d\u0435\u043e\u0431\u0445\u0456\u0434\u043d\u043e\u0433\u043e \u0441\u0446\u0435\u043d\u0430\u0440\u0456\u044e \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u043c\u0435\u0440\u0435\u0436\u0435\u0432\u043e\u0457 \u0440\u0435\u043a\u043e\u043d\u0441\u0442\u0440\u0443\u043a\u0446\u0456\u0457 \u0432\u0456\u0434\u043f\u043e\u0432\u0456\u0434\u043d\u043e \u0434\u043e \u043a\u0456\u0431\u0435\u0440\u0430\u0442\u0430\u043a. \u0415\u043a\u0441\u043f\u0435\u0440\u0438\u043c\u0435\u043d\u0442\u0430\u043b\u044c\u043d\u0456 \u0434\u043e\u0441\u043b\u0456\u0434\u0436\u0435\u043d\u043d\u044f \u0441\u0432\u0456\u0434\u0447\u0430\u0442\u044c \u043f\u0440\u043e \u0432\u0438\u0441\u043e\u043a\u0443 \u0434\u043e\u0441\u0442\u043e\u0432\u0456\u0440\u043d\u0456\u0441\u0442\u044c \u0437\u0430\u043f\u0440\u043e\u043f\u043e\u043d\u043e\u0432\u0430\u043d\u043e\u0433\u043e \u043c\u0435\u0442\u043e\u0434\u0443, \u0437\u043e\u043a\u0440\u0435\u043c\u0430 \u0434\u043e\u0441\u0442\u043e\u0432\u0456\u0440\u043d\u0456\u0441\u0442\u044c \u0432\u0438\u044f\u0432\u043b\u0435\u043d\u043d\u044f \u043a\u0456\u0431\u0435\u0440\u0430\u0442\u0430\u043a \u0434\u043e 99% \u0442\u0430 \u0437\u0434\u0430\u0442\u043d\u043e\u0441\u0442\u0456 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u0436\u0438\u0432\u0443\u0447\u043e\u0441\u0442\u0456 \u041a\u0421 \u0432 \u0441\u0438\u0442\u0443\u0430\u0446\u0456\u0457 \u043a\u0456\u0431\u0435\u0440\u0430\u0442\u0430\u043a \u0437 \u0440\u0456\u0432\u043d\u0435\u043c \u0434\u043e 70%.<br \/>\n<strong>\u041a\u043b\u044e\u0447\u043e\u0432\u0456 \u0441\u043b\u043e\u0432\u0430:<\/strong> \u0448\u043a\u0456\u0434\u043b\u0438\u0432\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u0435 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f, \u0436\u0438\u0432\u0443\u0447\u0456\u0441\u0442\u044c, \u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u043d\u0456 \u0441\u0438\u0441\u0442\u0435\u043c\u0438, \u0434\u043e\u0441\u0442\u043e\u0432\u0456\u0440\u043d\u0456\u0441\u0442\u044c \u0432\u0438\u044f\u0432\u043b\u0435\u043d\u043d\u044f, \u043a\u0456\u0431\u0435\u0440\u0430\u0442\u0430\u043a\u0430, \u043c\u0435\u0440\u0435\u0436\u043d\u0438\u0439 \u0442\u0440\u0430\u0444\u0456\u043a.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\"><strong>\u0420\u043e\u0437\u0448\u0438\u0440\u0435\u043d\u0430 \u0430\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u0430\u043d\u0433\u043b\u0456\u0439\u0441\u044c\u043a\u043e\u044e \u043c\u043e\u0432\u043e\u044e<\/strong><\/p>\n<p>\u00a0 \u00a0 \u00a0The paper presents a method for cyber threats and malware detection to ensure the computer systems resilience of in corporate networks based on self-adaptivity. The resilience is ensured by the adaptive reconfiguration of the network. Answer the question how the network has to be reconfigured is received by the means of the cluster analysis of the cyberattacks\u2019 features, which are observed in the network and network hosts. In order to choose the needed security scenarios, the proposed method uses SVM approach. The objects of classification are the feature vectors, which contain the set of the demonstrations, which may indicate the appearance of cyber threats on the in corporate networks. The purpose of the technique is to choose the network and network hosts\u2019 reconfiguration scenarios according to the cyber-attacks, performed by the botnets. The learning stage of the method consists of the following steps: a knowledge formation about the features that may indicate the cyberattacks performed by the botnet; presentation the knowledge about the cyberattacks as the set of feature vectors; a labeled data creation of the feature vectors of the cyberattacks based on knowledge. The monitoring stage of the method consists of the following steps: gathering of the inbound and outbound network traffic; gathering of the information about the hosts\u2019 network activity and reports of the hosts\u2019 antiviruses; construction of the feature vector, based on the information obtained from the network and hosts; implementation of\u00a0 the semi-supervised fuzzy c-means clustering for the choice of the security scenarios; implementation of the security scenarios for the corporate area network\u2019s infrastructure. Usage of the developed system makes it possible to detect known and unknown multi vector cyberattacks performed by the botnets. Experimental results demonstrated that the implemented principals of proposed technique into show the ability to ensure the resilient network functioning in the situation of the cyberattacks by botnets at the rate at about 70%.<br \/>\n<strong>Keywords:<\/strong> malware, computer systems, resilience, detection efficiency, network traffic, cyberattack.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\"><strong>References<\/strong><\/p>\n<ol>\n<li>McAfee Mobile Threat Report Q1, 2020. URL: https:\/\/www.mcafee.com\/content\/dam\/cons umer\/en-us\/docs\/2020-Mobile-Threat-Report.pdf. \u2013 9.12.2019\u0440. (date of access: 10.07.2020).<\/li>\n<li>2020 State of Malware Report. URL: https:\/\/resources.malwarebytes.com\/files\/2020\/0 2\/2020_State-of-Malware-Report.pdf (date of access: 10.07.2020).<\/li>\n<li>Jun C., Chi C. Design of complex event-processing IDS in internet of things. In Sixth International Conference on Measuring Technology and Mechatronics Automation (ICMTMA) (January 2014). 2014. P. 226\u2013229.<\/li>\n<li>Lee P. A., Clark L., Bushnell R., Poovendran A passivity framework for modeling and mitigating wormhole attacks on networked control systems, IEEE Trans. Autom. Control. 2014. Vol. 59. No. 12. Pp. 3224\u20133237.<\/li>\n<li>Zhang J., Blum R.S., Lu X., Conus D. Asymptotically optimum distributed es- timation in the presence of attacks, IEEE Trans. Signal Process. 2015. Vol. 63. No. 5. P. 1086\u20131101.<\/li>\n<li>Pongle P., Chavan G. Real time intrusion and wormhole attack detection in internet of things. International Journal of Computers and Applications. 2015. Vol. 121. No. 9.<\/li>\n<li>Cervantes C., Poplade D., Nogueira M., Santos A. Detection of sinkhole attacks for supporting secure routing on 6lowpan for internet of things. In IFIP\/IEEE International Symposium on Integrated Network Management (IM)(May, 2015). 2015. P. 606\u2013611.<\/li>\n<li>An R., Feng H., Liu Q., Li L. Three elliptic curve cryptography-based RFID authentication protocols for Internet of Things. In International Conference on Broadband and Wireless Computing, Communication and Applications. Springer International Publishing (November 2016). 2016. P. 857\u2013878.<\/li>\n<li>Sun H., Wang X., Buyya R., Su J. CloudEyes: Cloud\u2010based malware detection with reversible sketch for resource\u2010constrained internet of things (IoT) devices. Software, Practice &amp; Experience. 2017. Vol. 47. No. 3. P.\u00a0421\u2013441. doi:10.1002\/spe.2420<\/li>\n<li>Arrington B., Barnett L., Rufus R., Esterline A. Behavioral Modeling Intrusion Detection System (BMIDS) Using Internet of Things (IoT) Behavior-Based Anomaly Detection via Immunity-Inspired Algorithms. In 25th International Conference on Computer Communication and Networks (ICCCN) (August 2016). 2016. P. 1\u20136.<\/li>\n<li>Hodo E., Bellekens X., Hamilton A., Dubouilh P.L., Iorkyase E., Tachtatzis C., Atkinson R. Threat analysis of iot networks using artificial neural network intrusion detection system. In International Symposium on Networks, Computers and Communications (ISNCC)(May 2016). 2016. P. 1\u20136.<\/li>\n<li>Le A., Loo J., Chai K. K., Aiash M.A. Specification-Based IDS for Detecting Attacks on RPL- Based Network Topology. Information. 2016. Vol. 7. No. 2. p. 25. doi:10.3390\/info7020025<\/li>\n<li>Lysenko S., Bobrovnikova K., Savenko O., Kryshchuk A. BotGRABBER: SVM-Based Self-Adaptive System for the Network Resilience Against the Botnets\u2019 Cyberattacks. Communications in Computer and Information Science, ISSN: 1865-0929. 2019. P. 127\u2013143.<\/li>\n<li>Lysenko S., Savenko O., Bobrovnikova K., Kryshchuk A. Self-adaptive system for the corporate area network resilience in the presence of botnet cyberattacks. Communications in Computer and Information Science, ISSN: 1865-0929. 2018. P. 385\u2013401.<\/li>\n<li>Weston J., Mukherjee S., Chapelle O., Pontil , Poggio T. Vapnik Feature selection for SVMs. In: Advances in neural information processing systems. 2001. P. 668\u2013674.<\/li>\n<li>Hofmann T., Scholkopf B., Smola A. J. Kernel methods in machine learning. The annals of statistics. 2008. P. 1171\u20131220.<\/li>\n<li>Foody G.M., Mathur A. A relative evaluation of multiclass image classification by support vector machines. IEEE Transactions on geoscience and remote sensing. 2004. Vol. 42. No. 6. P. 1335\u20131343.<\/li>\n<li>Sergii Lysenko, Pomorova Oksana, Savenko Oleg, Kryshchuk Andrii, Bobrovnikova Kira. DNS-based Anti-evasion Technique for Botnets Detection. The IEEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications: Proceedings (Warsaw, Poland, September 24-26, 2015). Warsaw, 2015. Vol. 1. P. 453\u2013458.<\/li>\n<li>Lysenko S.M. Metody vyiavlennia bot-merezh v kompiuternykh systemakh \/ S.M. Lysenko, K.Iu. Bobrovnikova, V.S. Kharchenko \/\/ Suchasni informatsiini systemy. \u2013 2019. \u2013 T. 3. \u2116 4. \u2013 S. 87\u201395.<\/li>\n<li>Canadian Institute for Cybersecurity. Botnet dataset. URL: https:\/\/www.unb.ca\/cic\/datasets\/botnet.html (date of access: 10.07.2020).<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[23],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/2287"}],"collection":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2287"}],"version-history":[{"count":3,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/2287\/revisions"}],"predecessor-version":[{"id":3748,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/2287\/revisions\/3748"}],"wp:attachment":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2287"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2287"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2287"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}