Protecting Objects of Critical Information Infrastructure from Wartime Cyber Attacks by Decentralizing the Telecommunications Network - volodymyr-sokolov/publications GitHub Wiki

Conference Paper

Pavlo Anakhov , Viktoriia Zhebka , Svitlana Popereshnyak , Pavlo Skladannyi , Volodymyr Sokolov

Abstract

The environment is changed by people, both unconsciously and consciously. The engineering and economic development of the environment is complemented by actions that involve deliberate destruction. Since 2014, units of the Russian army have been carrying out illegal military and terrorist actions on the territory of Ukraine, in particular, against critical infrastructure objects. The purpose of the article is to find ways to protect critical information infrastructure objects from cyber attacks. A universal way to counter cyber attacks is to decentralize the telecommunications network. A universal way to ensure the "decentralization"of a network is its hybridization, which ensures proper scalability. The values of signal parameters in a hybrid network depend on the physical nature of the signal and the transmission medium. Based on this, it may be logical to use a hybrid telecommunications network to protect against cyber attacks, which allows the selection of a channel with parameters that do not correspond to the harmful signal for the transmission of a useful signal.

Keywords

communication channel; Hybrid network; malicious signal; signal; signal transmission medium; useful signal

SciVal Topics

Neural Network; Wireless Sensor Network; Quality of Service


Publisher

SCImago Journal & Country Rank

2023 Cybersecurity Providing in Information and Telecommunication Systems II (CPITS-II)

26 October 2023 Kyiv, Ukraine

First Online: 16 November 2023


Indices


Cite

APA

Anakhov, P., Zhebka, V., Popereshnyak, S., Skladannyi, P., & Sokolov, V. (2023). Protecting Objects of Critical Information Infrastructure from Wartime Cyber Attacks by Decentralizing the Telecommunications Network. In Cybersecurity Providing in Information and Telecommunication Systems II (Vol. 3550, pp. 240–245).

IEEE

P. Anakhov, V. Zhebka, S. Popereshnyak, P. Skladannyi, and V. Sokolov, “Protecting Objects of Critical Information Infrastructure from Wartime Cyber Attacks by Decentralizing the Telecommunications Network,” Cybersecurity Providing in Information and Telecommunication Systems II, vol. 3550, pp. 240–245, 2023.

CEUR-WS

P. Anakhov, et al., Protecting Objects of Critical Information Infrastructure from Wartime Cyber Attacks by Decentralizing the Telecommunications Network, in: Cybersecurity Providing in Information and Telecommunication Systems, vol. 3550 (2023) 240–245.

⚠️ **GitHub.com Fallback** ⚠️