Protecting Objects of Critical Information Infrastructure from Wartime Cyber Attacks by Decentralizing the Telecommunications Network - volodymyr-sokolov/publications GitHub Wiki
Conference Paper
Pavlo Anakhov ,
Viktoriia Zhebka
,
Svitlana Popereshnyak
,
Pavlo Skladannyi
,
Volodymyr Sokolov
The environment is changed by people, both unconsciously and consciously. The engineering and economic development of the environment is complemented by actions that involve deliberate destruction. Since 2014, units of the Russian army have been carrying out illegal military and terrorist actions on the territory of Ukraine, in particular, against critical infrastructure objects. The purpose of the article is to find ways to protect critical information infrastructure objects from cyber attacks. A universal way to counter cyber attacks is to decentralize the telecommunications network. A universal way to ensure the "decentralization"of a network is its hybridization, which ensures proper scalability. The values of signal parameters in a hybrid network depend on the physical nature of the signal and the transmission medium. Based on this, it may be logical to use a hybrid telecommunications network to protect against cyber attacks, which allows the selection of a channel with parameters that do not correspond to the harmful signal for the transmission of a useful signal.
communication channel; Hybrid network; malicious signal; signal; signal transmission medium; useful signal
Neural Network; Wireless Sensor Network; Quality of Service
2023 Cybersecurity Providing in Information and Telecommunication Systems II (CPITS-II)
26 October 2023 Kyiv, Ukraine
First Online: 16 November 2023
-
ISSN: 1613-0073
-
EID: 2-s2.0-85178338434
-
DBLP: conf/cpits/AnakhovZPSS23
-
KUBG: 47365
Anakhov, P., Zhebka, V., Popereshnyak, S., Skladannyi, P., & Sokolov, V. (2023). Protecting Objects of Critical Information Infrastructure from Wartime Cyber Attacks by Decentralizing the Telecommunications Network. In Cybersecurity Providing in Information and Telecommunication Systems II (Vol. 3550, pp. 240–245).
P. Anakhov, V. Zhebka, S. Popereshnyak, P. Skladannyi, and V. Sokolov, “Protecting Objects of Critical Information Infrastructure from Wartime Cyber Attacks by Decentralizing the Telecommunications Network,” Cybersecurity Providing in Information and Telecommunication Systems II, vol. 3550, pp. 240–245, 2023.
P. Anakhov, et al., Protecting Objects of Critical Information Infrastructure from Wartime Cyber Attacks by Decentralizing the Telecommunications Network, in: Cybersecurity Providing in Information and Telecommunication Systems, vol. 3550 (2023) 240–245.