{"id":4648,"date":"2021-03-12T14:00:25","date_gmt":"2021-03-12T12:00:25","guid":{"rendered":"http:\/\/journals.khnu.km.ua\/vestnik\/?p=4648"},"modified":"2021-03-17T12:21:01","modified_gmt":"2021-03-17T10:21:01","slug":"%d0%b7%d0%b0%d1%81%d1%82%d0%be%d1%81%d1%83%d0%b2%d0%b0%d0%bd%d0%bd%d1%8f-%d0%b1%d0%b0%d0%b3%d0%b0%d1%82%d0%be%d1%84%d0%b0%d0%ba%d1%82%d0%be%d1%80%d0%bd%d0%be%d0%b3%d0%be-%d0%b0%d0%bd%d0%b0%d0%bb%d1%96","status":"publish","type":"post","link":"https:\/\/journals.khnu.km.ua\/vestnik\/?p=4648","title":{"rendered":"\u0417\u0430\u0441\u0442\u043e\u0441\u0443\u0432\u0430\u043d\u043d\u044f \u0431\u0430\u0433\u0430\u0442\u043e\u0444\u0430\u043a\u0442\u043e\u0440\u043d\u043e\u0433\u043e \u0430\u043d\u0430\u043b\u0456\u0437\u0443 \u0437 \u043c\u0435\u0442\u043e\u044e \u0432\u0438\u044f\u0432\u043b\u0435\u043d\u043d\u044f \u043d\u0435\u0437\u0430\u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u043e\u0432\u0430\u043d\u0438\u0445 \u0437\u0430\u043a\u043b\u0430\u0434\u043e\u043a \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u043e\u0433\u043e \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u0432 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u0438\u0445 \u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u043d\u0438\u0445 \u043c\u0435\u0440\u0435\u0436\u0430\u0445"},"content":{"rendered":"<p><!--more--><\/p>\n<p style=\"text-align: center;\">\u0417\u0410\u0421\u0422\u041e\u0421\u0423\u0412\u0410\u041d\u041d\u042f \u0411\u0410\u0413\u0410\u0422\u041e\u0424\u0410\u041a\u0422\u041e\u0420\u041d\u041e\u0413\u041e \u0410\u041d\u0410\u041b\u0406\u0417\u0423 \u0417 \u041c\u0415\u0422\u041e\u042e \u0412\u0418\u042f\u0412\u041b\u0415\u041d\u041d\u042f \u041d\u0415\u0417\u0410\u0414\u041e\u041a\u0423\u041c\u0415\u041d\u0422\u041e\u0412\u0410\u041d\u0418\u0425 \u0417\u0410\u041a\u041b\u0410\u0414\u041e\u041a \u041f\u0420\u041e\u0413\u0420\u0410\u041c\u041d\u041e\u0413\u041e \u0417\u0410\u0411\u0415\u0417\u041f\u0415\u0427\u0415\u041d\u041d\u042f \u0412 \u041b\u041e\u041a\u0410\u041b\u042c\u041d\u0418\u0425 \u041a\u041e\u041c\u041f\u2019\u042e\u0422\u0415\u0420\u041d\u0418\u0425 \u041c\u0415\u0420\u0415\u0416\u0410\u0425<\/p>\n<p style=\"text-align: center;\">APPLICATION OF MULTIFACTOR ANALYSIS FOR THE PURPOSE OF DETECTING IMPLANT IN THE SOFTWARE IN LOCAL COMPUTER NETWORKS<\/p>\n<p><a href=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/03\/47.pdf\"> <img loading=\"lazy\" class=\"size-full wp-image-69 alignnone\" src=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/pdf.png\" alt=\"\" width=\"76\" height=\"32\" \/><\/a> <strong>\u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: 280-285. \u041d\u043e\u043c\u0435\u0440: \u21165, 2020 (289)<\/strong><br \/>\n<strong>\u0410\u0432\u0442\u043e\u0440\u0438:<\/strong><br \/>\n\u0412. \u041f.\u00a0\u041f\u0410\u042e\u041a, \u041e. \u0412. \u0413\u0415\u0419\u0414\u0410\u0420\u041e\u0412\u0410, \u0412. \u0414. \u041a\u041e\u0421\u0415\u041d\u041a\u041e\u0412, \u041e. \u0421. \u0421\u0410\u0412\u0415\u041d\u041a\u041e<br \/>\n\u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\nV. PAIUK , O. \u041dE\u0406DAROVA, V. KOSENKOV, O. SAVENKO<br \/>\nKhmelnytskyi National University<br \/>\n<strong>DOI:<\/strong> <a href=\"https:\/\/www.doi.org\/10.31891\/2307-5732-2020-289-5-280-285\">https:\/\/www.doi.org\/10.31891\/2307-5732-2020-289-5-280-285<\/a><br \/>\n<strong>\u0420\u0435\u0446\u0435\u043d\u0437\u0456\u044f\/Peer review :<\/strong> 16.10.2020 \u0440.<br \/>\n<strong>\u041d\u0430\u0434\u0440\u0443\u043a\u043e\u0432\u0430\u043d\u0430\/Printed :<\/strong> 27.11.2020 \u0440.<\/p>\n<p style=\"text-align: center;\"><strong>\u0410\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u043c\u043e\u0432\u043e\u044e \u043e\u0440\u0438\u0433\u0456\u043d\u0430\u043b\u0443<\/strong><\/p>\n<p>\u0412 \u0440\u043e\u0431\u043e\u0442\u0456 \u0437\u0434\u0456\u0439\u0441\u043d\u0435\u043d\u043e \u0434\u043e\u0441\u043b\u0456\u0434\u0436\u0435\u043d\u043d\u044f \u0441\u0442\u0440\u0430\u0442\u0435\u0433\u0456\u0439 \u0437 \u0432\u0438\u044f\u0432\u043b\u0435\u043d\u043d\u044f \u0432 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u043e\u043c\u0443 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u0456 \u043d\u0435\u0437\u0430\u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u043e\u0432\u0430\u043d\u0438\u0445 \u0437\u0430\u043a\u043b\u0430\u0434\u043e\u043a, \u044f\u043a\u0456 \u043c\u043e\u0436\u0443\u0442\u044c \u0431\u0443\u0442\u0438 \u0441\u0430\u043c\u043e\u0441\u0442\u0456\u0439\u043d\u0438\u043c\u0438 \u043e\u0431\u2019\u0454\u043a\u0442\u0430\u043c\u0438 \u0430\u0431\u043e \u0447\u0430\u0441\u0442\u0438\u043d\u043e\u044e \u043f\u0435\u0432\u043d\u043e\u0433\u043e \u0437\u043b\u043e\u0432\u043c\u0438\u0441\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u043e\u0433\u043e \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f. \u041c\u0456\u0441\u0446\u0435\u043c \u0434\u043e\u0441\u043b\u0456\u0434\u0436\u0435\u043d\u043d\u044f \u0432\u0438\u0431\u0440\u0430\u043d\u043e \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u0456 \u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u043d\u0456 \u043c\u0435\u0440\u0435\u0436\u0456. \u0414\u043e\u0441\u043b\u0456\u0434\u0436\u0435\u043d\u043e \u0437\u0430\u0441\u0442\u043e\u0441\u0443\u0432\u0430\u043d\u043d\u044f \u043c\u0435\u0442\u043e\u0434\u0456\u0432 \u0431\u0430\u0433\u0430\u0442\u043e\u0444\u0430\u043a\u0442\u043e\u0440\u043d\u043e\u0433\u043e \u0430\u043d\u0430\u043b\u0456\u0437\u0443 \u0437 \u043c\u0435\u0442\u043e\u044e \u0432\u0438\u044f\u0432\u043b\u0435\u043d\u043d\u044f \u043d\u0435\u0437\u0430\u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u043e\u0432\u0430\u043d\u0438\u0445 \u0437\u0430\u043a\u043b\u0430\u0434\u043e\u043a \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u043e\u0433\u043e \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f. \u0426\u0435 \u0434\u043e\u0437\u0432\u043e\u043b\u0438\u043b\u043e \u0437\u0430\u0441\u0442\u043e\u0441\u0443\u0432\u0430\u0442\u0438 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0438 \u0434\u043e \u043d\u0435\u0437\u0430\u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u043e\u0432\u0430\u043d\u0438\u0445 \u0437\u0430\u043a\u043b\u0430\u0434\u043e\u043a \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u043e\u0433\u043e \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f, \u044f\u043a\u0456 \u0454 \u0447\u0430\u0441\u0442\u0438\u043d\u0430\u043c\u0438 \u043f\u0435\u0432\u043d\u043e\u0433\u043e \u0437\u043b\u043e\u0432\u043c\u0438\u0441\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u043e\u0433\u043e \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f, \u043e\u0442\u0440\u0438\u043c\u0430\u043d\u0456 \u0434\u043b\u044f \u043d\u044c\u043e\u0433\u043e \u0448\u043b\u044f\u0445\u043e\u043c \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u0430\u043d\u043d\u044f \u0440\u043e\u0437\u043f\u043e\u0434\u0456\u043b\u0435\u043d\u043e\u0457 \u0431\u0430\u0433\u0430\u0442\u043e\u0440\u0456\u0432\u043d\u0435\u0432\u043e\u0457 \u0441\u0438\u0441\u0442\u0435\u043c\u0438 \u0432\u0438\u044f\u0432\u043b\u0435\u043d\u043d\u044f. \u0412 \u0435\u043a\u043e\u043d\u043e\u043c\u0456\u0447\u043d\u0438\u0445 \u0434\u043e\u0441\u043b\u0456\u0434\u0436\u0435\u043d\u043d\u044f\u0445 \u0434\u043b\u044f \u0441\u043f\u0456\u0432\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u043d\u044f \u043e\u0431\u2019\u0454\u043a\u0442\u0456\u0432, \u0449\u043e \u0445\u0430\u0440\u0430\u043a\u0442\u0435\u0440\u0438\u0437\u0443\u044e\u0442\u044c\u0441\u044f \u0432\u0435\u043b\u0438\u043a\u043e\u044e \u043a\u0456\u043b\u044c\u043a\u0456\u0441\u0442\u044e \u043e\u0437\u043d\u0430\u043a, \u0437\u0430\u0441\u0442\u043e\u0441\u043e\u0432\u0443\u044e\u0442\u044c \u0442\u0430\u043a\u0441\u043e\u043d\u043e\u043c\u0456\u0447\u043d\u0438\u0439 \u043f\u043e\u043a\u0430\u0437\u043d\u0438\u043a \u0440\u0456\u0432\u043d\u044f \u0440\u043e\u0437\u0432\u0438\u0442\u043a\u0443. \u0423 \u0440\u043e\u0437\u0433\u043b\u044f\u0434\u0443\u0432\u0430\u043d\u043e\u043c\u0443 \u0432\u0438\u043f\u0430\u0434\u043a\u0443 \u0446\u0435 \u043c\u043e\u0436\u0435 \u0431\u0443\u0442\u0438 \u043f\u043e\u043a\u0430\u0437\u043d\u0438\u043a \u043d\u0430\u044f\u0432\u043d\u043e\u0441\u0442\u0456 \u043d\u0435\u0437\u0430\u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u043e\u0432\u0430\u043d\u0438\u0445 \u0437\u0430\u043a\u043b\u0430\u0434\u043e\u043a \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u043e\u0433\u043e \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u0432 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u0456\u0439 \u043c\u0435\u0440\u0435\u0436\u0456. \u0412 \u043e\u0441\u043d\u043e\u0432\u0443 \u043f\u043e\u043a\u043b\u0430\u0434\u0435\u043d\u0438\u0439 \u0442\u0430\u043a\u0441\u043e\u043d\u043e\u043c\u0435\u0442\u0440\u0438\u0447\u043d\u0438\u0439 \u043c\u0435\u0442\u043e\u0434 \u043e\u0431\u0440\u043e\u0431\u043a\u0438 \u0441\u0442\u0430\u0442\u0438\u0441\u0442\u0438\u0447\u043d\u0438\u0445 \u0434\u0430\u043d\u0438\u0445 \u0441\u043f\u043e\u0441\u0442\u0435\u0440\u0435\u0436\u0435\u043d\u044c, \u044f\u043a\u0438\u0439 \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u043e\u0432\u0443\u0454\u0442\u044c\u0441\u044f \u0432 \u0435\u043a\u043e\u043d\u043e\u043c\u0456\u0447\u043d\u0438\u0445 \u0434\u043e\u0441\u043b\u0456\u0434\u0436\u0435\u043d\u043d\u044f\u0445. \u0412 \u0440\u043e\u0437\u0433\u043b\u044f\u043d\u0443\u0442\u043e\u043c\u0443 \u0432\u0438\u043f\u0430\u0434\u043a\u0443 \u0432 \u044f\u043a\u043e\u0441\u0442\u0456 \u043e\u0431\u2019\u0454\u043a\u0442\u0456\u0432 \u0432\u0438\u0441\u0442\u0443\u043f\u0430\u044e\u0442\u044c \u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u043d\u0456 \u043c\u0435\u0440\u0435\u0436\u0456, \u0430 \u043e\u0437\u043d\u0430\u043a\u0430\u043c\u0438 \u043c\u043e\u0436\u0443\u0442\u044c \u0431\u0443\u0442\u0438 \u043d\u0430\u044f\u0432\u043d\u0456\u0441\u0442\u044c \u043c\u043e\u0434\u0443\u043b\u0456\u0432 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u043e\u0433\u043e \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f, \u044f\u043a\u0456 \u043d\u0435 \u0432\u0456\u0434\u043f\u043e\u0432\u0456\u0434\u0430\u044e\u0442\u044c \u043f\u0440\u0438\u0437\u043d\u0430\u0447\u0435\u043d\u043d\u044e \u043f\u0440\u043e\u0446\u0435\u0441\u0443; \u043d\u0430\u044f\u0432\u043d\u0456\u0441\u0442\u044c \u0435\u043b\u0435\u043c\u0435\u043d\u0442\u0456\u0432 \u043e\u043f\u0435\u0440\u0430\u0446\u0456\u0439\u043d\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c, \u044f\u043a\u0456 \u0432\u0456\u0434\u043a\u0440\u0438\u0442\u0456 \u043f\u0440\u043e\u0446\u0435\u0441\u043e\u043c, \u0449\u043e \u043d\u0435 \u0432\u0456\u0434\u043f\u043e\u0432\u0456\u0434\u0430\u044e\u0442\u044c \u043f\u0440\u0438\u0437\u043d\u0430\u0447\u0435\u043d\u043d\u044e \u043f\u0440\u043e\u0446\u0435\u0441\u0443; \u0432\u0438\u0441\u043e\u043a\u0430 \u0456\u043d\u0442\u0435\u043d\u0441\u0438\u0432\u043d\u0456\u0441\u0442\u044c \u043e\u043f\u0435\u0440\u0430\u0446\u0456\u0439 \u0432\u0432\u0435\u0434\u0435\u043d\u043d\u044f-\u0432\u0438\u0432\u0435\u0434\u0435\u043d\u043d\u044f \u0437\u0456 \u0441\u0442\u043e\u0440\u043e\u043d\u0438 \u043f\u0435\u0432\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0446\u0435\u0441\u0443 \u0442\u043e\u0449\u043e. \u0420\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442 \u043f\u043e\u043a\u0440\u0430\u0449\u0435\u043d\u043d\u044f \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0456\u0432 \u0432\u0438\u044f\u0432\u043b\u0435\u043d\u043d\u044f \u0431\u0443\u043b\u043e \u043f\u0456\u0434\u0442\u0432\u0435\u0440\u0434\u0436\u0435\u043d\u043e \u043f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u0438\u043c \u043f\u0440\u043e\u0442\u044f\u0433\u043e\u043c \u0442\u0440\u0438\u0432\u0430\u043b\u043e\u0433\u043e \u0447\u0430\u0441\u0443 \u0435\u043a\u0441\u043f\u0435\u0440\u0438\u043c\u0435\u043d\u0442\u0443 \u0437 \u0432\u0438\u044f\u0432\u043b\u0435\u043d\u043d\u044f \u043d\u0435\u0437\u0430\u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u043e\u0432\u0430\u043d\u0438\u0445 \u0437\u0430\u043a\u043b\u0430\u0434\u043e\u043a \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u043e\u0433\u043e \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f.<br \/>\n<strong>\u041a\u043b\u044e\u0447\u043e\u0432\u0456 \u0441\u043b\u043e\u0432\u0430:<\/strong> \u043d\u0435\u0437\u0430\u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u043e\u0432\u0430\u043d\u0456 \u0437\u0430\u043a\u043b\u0430\u0434\u043a\u0438, \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u0435 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f, \u0431\u0430\u0433\u0430\u0442\u043e\u0444\u0430\u043a\u0442\u043e\u0440\u043d\u0438\u0439 \u0430\u043d\u0430\u043b\u0456\u0437, \u0437\u043b\u043e\u0432\u043c\u0438\u0441\u043d\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u0435 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f, \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u0430 \u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u043d\u0430 \u043c\u0435\u0440\u0435\u0436\u0430.<\/p>\n<p style=\"text-align: center;\"><strong>\u0420\u043e\u0437\u0448\u0438\u0440\u0435\u043d\u0430 \u0430\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u0430\u043d\u0433\u043b\u0456\u0439\u0441\u044c\u043a\u043e\u044e \u043c\u043e\u0432\u043e\u044e<\/strong><\/p>\n<p>The paper investigates strategies for detecting undocumented bookmarks in software, which may be independent objects or part of certain malicious software. Local computer networks were chosen as the place of research. The difficulty of detecting such a secretly included in the software functional object, which under certain conditions is able to provide unauthorized software influence, due to the possibility of its absence for a long time. Such an object can be part of a software package that performs tasks, replace completely certain parts of the software package, replace a certain required program. As a rule, such undocumented software bookmarks allow to store the software functions declared by the manufacturer and are realized by a part of functions which are a part of a software complex. The application of multifactor analysis methods to detect undocumented software bookmarks has been studied. This allowed the results to be applied to undocumented software bookmarks that are part of certain malware obtained for it by using a distributed multi-level detection system. In economic research, a taxonomic indicator of the level of development is used to compare objects that are characterized by a large number of features. In this case, it may be an indicator of the presence of undocumented software bookmarks on the local network. It is based on the taxonomic method of processing statistical data of observations, which is used in economic research. In this case, the objects are computer networks, and the signs may be: the presence of software modules that do not meet the purpose of the process; the presence of elements of operating systems that are open to the process, which do not meet the purpose of the process; high intensity of input-output operations from a certain process, etc. The result of improved detection results was confirmed by a long-term experiment to detect undocumented software bookmarks.<br \/>\n<strong>Keywords:<\/strong> implant, software, multifactor analysis, malicious software, local computer network.<\/p>\n<p style=\"text-align: center;\"><strong>References<\/strong><\/p>\n<ol>\n<li>Savenko O.S. Research of methods of antiviral diagnostics of computer networks \/ O.S. Savenko, S.M. Lysenko \/\/ Herald of Khmelnytskyi National University. Technical sciences. \u2013 2007. \u2013 Issue 2, vol. 2. \u2013 P. 120\u2013126.<\/li>\n<li>Data Collection and Data Analysis in Honeypots and Honeynets. Pavol Sokol, Patrik Pekar\u010d\u00edk, Tom\u00e1\u0161 Bajto\u0161. URL: http:\/\/spi.unob.cz\/papers\/2015\/2015-19.pdf [Access 18.04.2020].<\/li>\n<li>Study of Internet Threats and Attach Methods Using Honeypots and Honeynets. Tomas Sochor, Matej Zuzcak &#8211; Springer International Publishing Switzerland 2014, A. Kwiecie\u00b4n, P. Gaj, and P. Stera (Eds.): CN 2014, CCIS 431, pp. 118\u2013127, 2014.<\/li>\n<li>Sochor Tomas. Attractiveness Study of Honeypots and Honeynets in Internet Threat Detection. Tomas Sochor, Matey Zuzcak \u2013 Springer International Publishing Switzerland 2015, P. Gaj at al. (Eds.): CN 2015, CCIS 522, pp. 69\u201381, 2015. DOI: 10.1007\/978-3-319-19419-6 7.<\/li>\n<li>A Survey on Honeypot Software and Data Analysis. Marcin Nawrocki, Matthias W\u00e4hlisch, Thomas C. Schmidt, Christian Keil, Jochen Sch\u00f6nfelder. arXiv:1608.06249v1 [cs.CR] 22 Aug 2016. URL: https:\/\/arxiv.org\/abs\/1608.06249 [Access 26.03.2020]<\/li>\n<li>Composite Hybrid Techniques for Defending Against Targeted Attacks. S. Sidiroglou, A.D. Keromytis. Part of the Advanced in Information Security book series (ADIS, volume 27), 2007, 213-229 pp.<\/li>\n<li>Shadow Honeypots. K.G. Anagnostakis, S. Sidiroglou, M. Polychronakis, A.D. Keromytis, P. Markatos. International Journal of Computer and Network Security, Vol. 2, No. 9, September 2010, 16 p.<\/li>\n<li>POSTER: Dragging Attackers to Honeypots for Effective Analysis of Cyber Threats. Martin Husak, Jan Vykopal. URL: https:\/\/is.muni.cz\/repo\/1188174\/POSTER-Dragging_Attackers_to_Honeypots_for_Effective_Analysis_of_Cyber_Threats.pdf [Access 30.05.2020]<\/li>\n<li>Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet. Frank Yeong-Sung Lin, Yu-Shun Wang, Ming-Yang Huang. Journal of Applied Mathematics, Vol. 2013, Article ID 518213, 11 pages. URL: https:\/\/www.hindawi.com\/journals\/jam\/2013\/518213\/ [Access 10.04.2020]<\/li>\n<li>Automatic Identification of Honeypot Server Using Machine Learning Techniques. Cheng Huang, Jiaxuan Han, Xing Zhang, Jiayong Liu. Hindawi, Security and Communication Networks Volume 2019, Article ID 2627608, 8 pages.<\/li>\n<li>Survey of Attach Projection, Prediction, and Forecasting in Cyber Security. Martin Husak, Jana Komarkova, Elias Bou-Harb, Pavel Celeda. IEEE Communication Survays &amp; Tutorials \u2013 September 2018, URL: https:\/\/www.researchgate.net\/publication\/327449459_Survey_of_Attack_Projection_Prediction_and_Forecasting_in_Cyber_Security [Access 12.05.2020]<\/li>\n<li>Honeypots and Routers: Collecting Internet Attacks. Mohssen Mohammed, Habib-ur Rehman \u2013 CRC Press, Taylor &amp; Francis Group LLC, 2016. 197p.<\/li>\n<li>A new Paradigm to Information Security. R.C. Joshi, Anjali Sardana &#8211; Science Publishers, P.O. Box 699, Enfield, NH 03748, USA, 2011. 323 p.<\/li>\n<li>Savenko O.S., Payuk V.P., Savenko B.O., Kashtalyan A.S. Models of undocumented software bookmarks in local computer networks. Measuring and computing equipment in technological processes. 2019. \u2116 2. 84\u201390.<\/li>\n<li>Savenko O.S., Klots Y.P, Mostoviy S.V. Research and analysis of process blocking in a computer system \/\/ Herald of Khmelnytskyi National University. 2007. Issue 3, Volume 1. \u2013 P. 248-251.<\/li>\n<li>Pluta V. Comparative multidimensional analysis in economic research: methods of taxonomy and factor analysis \/ Per. s pol. &#8211; M.: Statistics, 1980. \u2013 151 p.<\/li>\n<li>Igumnov B.N., Zavgorodnyaya T.P. Cybernetic bases of construction of economic systems for the enterprises. Khmelnitsky: TUP, 2000. 344p.<\/li>\n<li>Saati G., Kerno K. Analytical planning. Organization of systems: Translated from English. M.: Radio and communication, 1991. 224 p.<\/li>\n<li>Andreychikov A.V., Andreychikova O.N. Analysis, synthesis, planning solutions in economics. M.: Finance and Statistics, 2001. 368 p.<\/li>\n<li>Savenko O.S., Nicheporuk A.O., Paiuk V.P. Estimates of efficiency and reliability of distributed malware detection systems in computer systems of local networks \/\/ Computer-integrated technologies: education, science, production, \u2116 36, 2019. P. 134\u2013139.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[38],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/4648"}],"collection":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4648"}],"version-history":[{"count":4,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/4648\/revisions"}],"predecessor-version":[{"id":5028,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/4648\/revisions\/5028"}],"wp:attachment":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4648"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4648"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4648"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}