{"id":4729,"date":"2021-03-12T14:27:22","date_gmt":"2021-03-12T12:27:22","guid":{"rendered":"http:\/\/journals.khnu.km.ua\/vestnik\/?p=4729"},"modified":"2021-03-16T12:25:24","modified_gmt":"2021-03-16T10:25:24","slug":"%d0%bf%d1%80%d0%be%d0%b5%d0%ba%d1%82%d1%83%d0%b2%d0%b0%d0%bd%d0%bd%d1%8f-%d1%82%d0%b0-%d1%80%d0%be%d0%b7%d1%80%d0%be%d0%b1%d0%bb%d0%b5%d0%bd%d0%bd%d1%8f-%d1%96%d0%bd%d1%82%d0%b5%d0%bb%d0%b5%d0%ba","status":"publish","type":"post","link":"https:\/\/journals.khnu.km.ua\/vestnik\/?p=4729","title":{"rendered":"\u041f\u0440\u043e\u0435\u043a\u0442\u0443\u0432\u0430\u043d\u043d\u044f \u0442\u0430 \u0440\u043e\u0437\u0440\u043e\u0431\u043b\u0435\u043d\u043d\u044f \u0456\u043d\u0442\u0435\u043b\u0435\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0430\u0433\u0435\u043d\u0442\u0430 \u0432\u0438\u044f\u0432\u043b\u0435\u043d\u043d\u044f \u043a\u0456\u0431\u0435\u0440\u0437\u0430\u0433\u0440\u043e\u0437 \u0442\u0430 \u0428\u041f\u0417 \u0432 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u0438\u0445 \u043c\u0435\u0440\u0435\u0436\u0430\u0445"},"content":{"rendered":"<p><!--more--><\/p>\n<p style=\"text-align: center;\">\u041f\u0420\u041e\u0415\u041a\u0422\u0423\u0412\u0410\u041d\u041d\u042f \u0422\u0410 \u0420\u041e\u0417\u0420\u041e\u0411\u041b\u0415\u041d\u041d\u042f \u0406\u041d\u0422\u0415\u041b\u0415\u041a\u0422\u0423\u0410\u041b\u042c\u041d\u041e\u0413\u041e \u0410\u0413\u0415\u041d\u0422\u0410 \u0412\u0418\u042f\u0412\u041b\u0415\u041d\u041d\u042f \u041a\u0406\u0411\u0415\u0420\u0417\u0410\u0413\u0420\u041e\u0417 \u0422\u0410 \u0428\u041f\u0417 \u0412 \u041a\u041e\u0420\u041f\u041e\u0420\u0410\u0422\u0418\u0412\u041d\u0418\u0425 \u041c\u0415\u0420\u0415\u0416\u0410\u0425<\/p>\n<p style=\"text-align: center;\">DESIGN AND DEVELOPMENT OF AN INTELLECTUAL AGENT FOR DETECTION OF CYBER THREATS AND MALWARE IN CORPORATE NETWORKS<\/p>\n<p><a href=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/03\/15-2.pdf\"> <img loading=\"lazy\" class=\"size-full wp-image-69 alignnone\" src=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/pdf.png\" alt=\"\" width=\"76\" height=\"32\" \/><\/a> <strong>\u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: 89-94. \u041d\u043e\u043c\u0435\u0440: \u21165, 2020 (289)<\/strong><br \/>\n<strong>\u0410\u0432\u0442\u043e\u0440\u0438:<\/strong><br \/>\n\u0421.\u041c. \u041b\u0418\u0421\u0415\u041d\u041a\u041e, \u0422.\u041c. \u041a\u0418\u0421\u0406\u041b\u042c, \u0420.\u0412. \u0429\u0423\u041a\u0410<br \/>\n\u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\nS. LYSENKO, T. KYSIL\u2019, R. SHCHUKA<br \/>\nKhmelnytskyi National University<br \/>\n<strong>DOI:<\/strong> <a href=\"https:\/\/www.doi.org\/10.31891\/2307-5732-2020-289-5-89-94\">https:\/\/www.doi.org\/10.31891\/2307-5732-2020-289-5-89-94<\/a><br \/>\n<strong>\u0420\u0435\u0446\u0435\u043d\u0437\u0456\u044f\/Peer review :<\/strong> 05.10.2020 \u0440.<br \/>\n<strong>\u041d\u0430\u0434\u0440\u0443\u043a\u043e\u0432\u0430\u043d\u0430\/Printed :<\/strong> 27.11.2020 \u0440.<\/p>\n<p style=\"text-align: center;\"><strong>\u0410\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u043c\u043e\u0432\u043e\u044e \u043e\u0440\u0438\u0433\u0456\u043d\u0430\u043b\u0443<\/strong><\/p>\n<p>\u0412 \u0440\u043e\u0431\u043e\u0442\u0456 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u043e \u0456\u043d\u0442\u0435\u043b\u0435\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u0438\u0439 \u0430\u0433\u0435\u043d\u0442 \u0432\u0438\u044f\u0432\u043b\u0435\u043d\u043d\u044f \u043a\u0456\u0431\u0435\u0440\u0437\u0430\u0433\u0440\u043e\u0437 \u0442\u0430 \u0428\u041f\u0417 \u0432 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u0438\u0445 \u043c\u0435\u0440\u0435\u0436\u0430\u0445, \u044f\u043a\u0438\u0439 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0454 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u0443 \u0441\u0438\u0441\u0442\u0435\u043c\u0443 \u0456\u0437 \u043c\u043e\u0436\u043b\u0438\u0432\u0456\u0441\u0442\u044e \u0432\u0438\u044f\u0432\u043b\u0435\u043d\u043d\u044f \u0432\u0456\u0434\u043e\u043c\u0438\u0445 \u0442\u0430 \u043d\u0435\u0432\u0456\u0434\u043e\u043c\u0438\u0445 \u043a\u0456\u0431\u0435\u0440\u0430\u0442\u0430\u043a, \u0428\u041f\u0417 \u043c\u0435\u0440\u0435\u0436\u043d\u043e\u0433\u043e \u0442\u0430 \u0445\u043e\u0441\u0442\u043e\u0432\u043e\u0433\u043e \u0442\u0438\u043f\u0443, \u0430 \u0442\u0430\u043a\u043e\u0436 \u0437\u0434\u0430\u0442\u043d\u0456\u0441\u0442\u044e \u043f\u0440\u043e\u0434\u0443\u043a\u0443\u0432\u0430\u0442\u0438 \u043c\u043d\u043e\u0436\u0438\u043d\u0443 \u0441\u0446\u0435\u043d\u0430\u0440\u0456\u0457\u0432 \u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u0434\u043b\u044f \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u0440\u0435\u0437\u0438\u043b\u044c\u0454\u043d\u0442\u043d\u043e\u0441\u0442\u0456 \u041a\u0421 \u0432 \u0443\u043c\u043e\u0432\u0430\u0445 \u043a\u0456\u0431\u0435\u0440\u0437\u0430\u0433\u0440\u043e\u0437. \u0420\u0435\u0437\u0438\u043b\u044c\u0454\u043d\u0442\u043d\u0456\u0441\u0442\u044c \u043c\u0435\u0440\u0435\u0436\u0456 \u0442\u0430 \u0445\u043e\u0441\u0442\u0456\u0432 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0443\u0454\u0442\u044c\u0441\u044f \u0457\u0445 \u0434\u0438\u043d\u0430\u043c\u0456\u0447\u043d\u043e\u044e \u0430\u0434\u0430\u043f\u0442\u0438\u0432\u043d\u043e\u044e \u0440\u0435\u043a\u043e\u043d\u0444\u0456\u0433\u0443\u0440\u0430\u0446\u0456\u0454\u044e \u0442\u0430 \u043c\u043d\u043e\u0436\u0438\u043d\u043e\u044e \u0437\u0430\u0445\u043e\u0434\u0456\u0432, \u0449\u043e \u0434\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0456\u043e\u043d\u0443\u0432\u0430\u0442\u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u043c \u0432 \u0443\u043c\u043e\u0432\u0430\u0445 \u0430\u0442\u0430\u043a. \u0406\u043d\u0442\u0435\u043b\u0435\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u0438\u0439 \u0430\u0433\u0435\u043d\u0442 \u0432\u0438\u044f\u0432\u043b\u0435\u043d\u043d\u044f \u043a\u0456\u0431\u0435\u0440\u0437\u0430\u0433\u0440\u043e\u0437 \u0442\u0430 \u0428\u041f\u0417 BotGRABBER &#8211; \u0446\u0435 \u043c\u0443\u043b\u044c\u0442\u0438\u0432\u0435\u043a\u0442\u043e\u0440\u043d\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u0430 \u0437\u0430\u0445\u0438\u0441\u0442\u0443, \u043e\u0441\u043a\u0456\u043b\u044c\u043a\u0438 \u0432\u043e\u043d\u0430 \u043f\u043e\u0454\u0434\u043d\u0443\u0454 \u0430\u043d\u0430\u043b\u0456\u0437 \u044f\u043a \u0432 \u043c\u0435\u0440\u0435\u0436\u0456, \u0442\u0430\u043a \u0456 \u0432 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0456 \u0445\u043e\u0441\u0442\u0456\u0432. \u041a\u043e\u043c\u0431\u0456\u043d\u043e\u0432\u0430\u043d\u0430 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u044f \u0434\u043e\u0437\u0432\u043e\u043b\u044f\u0454 \u043d\u0435 \u0442\u0456\u043b\u044c\u043a\u0438 \u0432\u0438\u044f\u0432\u043b\u044f\u0442\u0438 \u043a\u0456\u0431\u0435\u0440\u0430\u0442\u0430\u043a\u0438 \u0440\u0456\u0437\u043d\u043e\u0433\u043e \u0442\u0438\u043f\u0443, \u0430\u043b\u0435 \u0439 \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0447\u043d\u043e \u0437\u0430\u0441\u0442\u043e\u0441\u043e\u0432\u0443\u0432\u0430\u0442\u0438 \u043d\u0435\u043e\u0431\u0445\u0456\u0434\u043d\u0438\u0439 \u0441\u0446\u0435\u043d\u0430\u0440\u0456\u0439 \u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u043c\u0435\u0440\u0435\u0436\u043d\u043e\u0457 \u0440\u0435\u043a\u043e\u043d\u0444\u0456\u0433\u0443\u0440\u0430\u0446\u0456\u0457 \u0442\u0430 \u0430\u0434\u0430\u043f\u0442\u0430\u0446\u0456\u0457 \u041a\u0421 \u0432\u0456\u0434\u043f\u043e\u0432\u0456\u0434\u043d\u043e \u0434\u043e \u0442\u0438\u043f\u0443 \u0432\u0438\u044f\u0432\u043b\u0435\u043d\u043e\u0457 \u043a\u0456\u0431\u0435\u0440\u0430\u0442\u0430\u043a\u0438. \u0406\u043d\u0442\u0435\u043b\u0435\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u0438\u0439 \u0430\u0433\u0435\u043d\u0442 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0443\u0454 \u043c\u043e\u0436\u043b\u0438\u0432\u0456\u0441\u0442\u044c \u0432\u0438\u044f\u0432\u043b\u0435\u043d\u043d\u044f \u0432\u0456\u0434\u043e\u043c\u0438\u0445 \u0442\u0430 \u043d\u0435\u0432\u0456\u0434\u043e\u043c\u0438\u0445 \u043a\u0456\u0431\u0435\u0440\u0430\u0442\u0430\u043a, \u043c\u043e\u0436\u043b\u0438\u0432\u0456\u0441\u0442\u044c \u0432\u0438\u044f\u0432\u043b\u0435\u043d\u043d\u044f \u0431\u043e\u0442\u043d\u0435\u0442\u0456\u0432, \u044f\u043a\u0456 \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u043e\u0432\u0443\u044e\u0442\u044c \u043c\u0435\u0442\u043e\u0434\u0438 \u0443\u0445\u0438\u043b\u0435\u043d\u043d\u044f \u0432\u0456\u0434 DNS (\u0446\u0438\u043a\u043b\u0456\u0447\u043d\u0435 \u0432\u0456\u0434\u043e\u0431\u0440\u0430\u0436\u0435\u043d\u043d\u044f IP-\u0430\u0434\u0440\u0435\u0441\u0438, \u201c\u0434\u043e\u043c\u0435\u043d \ufb02ux\u201d, \u201c\u0448\u0432\u0438\u0434\u043a\u0438\u0439 \ufb02ux\u201d \u0442\u0430 DNS-\u0442\u0443\u043d\u0435\u043b\u044e\u0432\u0430\u043d\u043d\u044f), \u0437\u0434\u0430\u0442\u043d\u0456\u0441\u0442\u044c \u0441\u0430\u043c\u043e\u0441\u0442\u0456\u0439\u043d\u043e \u0437\u0430\u0441\u0442\u043e\u0441\u043e\u0432\u0443\u0432\u0430\u0442\u0438 \u0441\u0446\u0435\u043d\u0430\u0440\u0456\u0457 \u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u0434\u043b\u044f \u043f\u043e\u043c&#8217;\u044f\u043a\u0448\u0435\u043d\u043d\u044f \u043a\u0456\u0431\u0435\u0440\u0430\u0442\u0430\u043a, \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u0440\u0435\u0437\u0438\u043b\u044c\u0454\u043d\u0442\u043d\u043e\u0441\u0442\u0456 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u0438\u0445 \u043c\u0435\u0440\u0435\u0436 \u0432 \u0443\u043c\u043e\u0432\u0430\u0445 \u043a\u0456\u0431\u0435\u0440\u0430\u0442\u0430\u043a, \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u043c\u0443\u043b\u044c\u0442\u0438\u0432\u0435\u043a\u0442\u043e\u0440\u043d\u043e\u0433\u043e \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u0438\u0445 \u043c\u0435\u0440\u0435\u0436.<br \/>\n<strong>\u041a\u043b\u044e\u0447\u043e\u0432\u0456 \u0441\u043b\u043e\u0432\u0430:<\/strong> \u0448\u043a\u0456\u0434\u043b\u0438\u0432\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u0435 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f, \u0456\u043d\u0442\u0435\u043b\u0435\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u0438\u0439 \u0430\u0433\u0435\u043d\u0442, \u043a\u0456\u0431\u0435\u0440\u0437\u0430\u0433\u0440\u043e\u0437\u0430, \u043a\u0456\u0431\u0435\u0440\u0430\u0442\u0430\u043a\u0430, \u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u043d\u0430 \u043c\u0435\u0440\u0435\u0436\u0430, \u0441\u0446\u0435\u043d\u0430\u0440\u0456\u0439 \u0431\u0435\u0437\u043f\u0435\u043a\u0438.<\/p>\n<p style=\"text-align: center;\"><strong>\u0420\u043e\u0437\u0448\u0438\u0440\u0435\u043d\u0430 \u0430\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u0430\u043d\u0433\u043b\u0456\u0439\u0441\u044c\u043a\u043e\u044e \u043c\u043e\u0432\u043e\u044e<\/strong><\/p>\n<p>The purpose of this paper is to develop an intellectual agent for detection of cyber threats and malware in corporate networks \u2013 BotGRABBER. It provides a novel botnet detection framework with the key features given below: ability to detect the most known botnets\u2019 cyberattacks; ability to detect the botnets that use the evasion techniques (cycling of IP mapping, &#8220;domain flux&#8221;, &#8220;fast flux&#8221; and DNS-tunneling); ability to self-adaptive appliance of the security scenarios for the cyberattacks mitigation, performed by botnets;\u00a0 assuring the corporate area networks&#8217; resilience in the presence of botnets&#8217; cyberattacks; assurance of the multi vector protection for corporate area networks. The main components of the intellectual agent\u00a0 are: <span style=\"color: #737373; font-size: 1rem;\">Knowledge base. Knowledge base provides the information storage concerning to the cyberattacks performed by a botnet in the network and in the hosts. Here, each cyberattack is presented as the feature vector, which consists of functional botnets\u2019 features. To increase the efficiency of the botnet detection each stage of possible botnet\u2019s life cycle functioning (infection; initial registration or connection to C&amp;C server; performance of the malicious activity; maintenance; its functioning termination) is presented by own feature vector.<\/span><\/p>\n<ol>\n<li>Knowledge acquisition unit. Taking into account the increasing of the new ways to perform the cyberattacks proposed tool is provided by ability to update the knowledge about new botnets.<\/li>\n<li>Network monitoring unit. This unit implements the network monitoring via gathering of the inbound and outbound network traffic. Collected information is converted into the feature vectors, and is sent to the SVM-based inference engine for further data processing.<\/li>\n<li>Host monitoring unit. This unit implements the gathering the information about the hosts&#8217; network activity and reports of the hosts&#8217; antiviruses. It also converts the collected information into the feature vectors, and sends it to the SVM-based inference engine for further data processing.<\/li>\n<li>SVM-based inference engine. This component provides an ability to classify the feature vectors obtained from the network. The main task of the SVM-based inference engine is to range obtained feature vector in a class, which will indicate whether it is cyberattacks, performed by botnet. If the attack is observed, the security scenario according to detected attack in order to mitigate it is to be applied.<\/li>\n<li>Network reconfiguration unit. This unit applies produced by the SVM-based inference engine the security scenario for the CAN&#8217;s infrastructure.<\/li>\n<\/ol>\n<p><strong>Keywords:<\/strong> malware, intellectual agent, cyberattacks, cyberthreats, computer network, security scenario.<\/p>\n<p style=\"text-align: center;\"><strong>References<\/strong><\/p>\n<ol>\n<li>McAfee Mobile Threat Report Q1, 2020. URL: https:\/\/www.mcafee.com\/content\/dam\/cons umer\/en-us\/docs\/2020-Mobile-Threat-Report.pdf. \u2013 9.12.2019. (application date: 10.07.2020).<\/li>\n<li>2020 State of Malware Report. URL: https:\/\/resources.malwarebytes.com\/files\/2020\/02\/2020_State-of-Malware-Report.pdf (application date: 10.07.2020).<\/li>\n<li>Naval S., Laxmi V., Rajarajan M., et al. Employing program semantics for malware detection. IEEE Trans Inform Forens Secur. 2015. Vol.10. No.12. P. 2591\u20132604. URL: https:\/\/doi.org\/10.1109\/TIFS.2015.2469253<\/li>\n<li>Kharraz A., Arshad S., Mulliner C., et al. UNVEIL: a large-scale, automated approach to detecting ransomware. Proc 25th USENIX Security Symp, 2016. P. 757\u2013<\/li>\n<li>Poeplau S., Fratantonio Y., Bianchi A., et al. Execute this! Analyzing unsafe and malicious dynamic code loading in Android applications. Proc Network and Distributed System Security Symp, 2014. P. 23\u201326. URL: https:\/\/doi.org\/10.14722\/ndss.2014.23328<\/li>\n<li>Zhang F.W., Leach K., Stavrou A., et al. Using hardware features for increased debugging transparency. Proc IEEE Symp on Security and Privacy, 2015. P .55\u201369. URL: https:\/\/doi.org\/10.1109\/SP.2015.11<\/li>\n<li>Fratantonio Y., Bianchi A., Robertson W., et al. Triggerscope: towards detecting logic bombs in Android applications. Proc IEEE Symp on Security and Privacy, 2016. P. 377\u2013396. URL: https:\/\/doi.org\/10.1109\/SP.2016.30<\/li>\n<li>Suarez-Tangil G., Conti M., Tapiador J.E. et al. Detecting targeted smartphone malware with behavior-triggering stochastic models. Proc 19th European Symp on Research in Computer Security, 2014. P. 183\u2013201. URL: https:\/\/doi.org\/10.1007\/978-3-319-11203-9_11<\/li>\n<li>Beaucamps P., Gnaedig I., Marion J.Y. Abstraction-based malware analysis using rewriting and model checking. Proc 17th European Symp on Research in Computer Security, 2012. \u0420. 806\u2013823. URL: https:\/\/doi.org\/10.1007\/978-3-642-33167-1_46<\/li>\n<li>Yang C., Xu Z.Y., Gu G.F., et al. DroidMiner: automated mining and characterization of fine-grained malicious behaviors in Android applications. Proc 19th European Symp on Research in Computer Security, 2014. P. 163\u2013182. URL: https:\/\/doi.org\/10.1007\/978-3-319-11203-9_10.<\/li>\n<li>Canadian Institute for Cybersecurity. Botnet dataset, (accessed January 10, 2019). URL: https:\/\/www.unb.ca\/cic\/datasets\/botnet.html.<\/li>\n<li>Murphy K.P. Machine learning: a probabilistic perspective. 1 st edition. The MIT press., 2012. 1102.<\/li>\n<li>AV Comparatives laboratories. URL: http:\/\/www.av-comparatives.org. (application date: 26.01.2020).<\/li>\n<li>Virus Bulletin. URL: http:\/\/www.virusbtn.com (application date: 26.01.2020).<\/li>\n<li>Comparative antivirus testing. URL: http:\/\/www.av-comparatives.org. (application date: 26.01.2020)<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[38],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/4729"}],"collection":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4729"}],"version-history":[{"count":3,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/4729\/revisions"}],"predecessor-version":[{"id":4895,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/4729\/revisions\/4895"}],"wp:attachment":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4729"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4729"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4729"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}