INTELLIGENT CYBER THREATS RECOGNITION SYSTEMS AS A COMPONENT OF THE INFORMATION SECURITY SYSTEM IN TRANSPORT

Authors

  • Lakhno Valeriy National University of Life and Environmental Sciences of Ukraine image/svg+xml
  • Kasatkin Dmytro National University of Life and Environmental Sciences of Ukraine image/svg+xml

Keywords:

transport, automated control systems, cyber security, threat recognition, intelligent systems

Abstract

The transport industry, in particular the railway transport (RT), is increasingly using computerized systems for management, which makes it vulnerable to cyber attacks. Intelligent threat recognition systems are becoming important for the protection of information and cyber security in transport. Ensuring cyber security for information systems and automated control systems in transport is an important task for ensuring the national security of Ukraine. This makes it possible to prevent possible cyber attacks, preserve the confidentiality of information, ensure the reliable operation of the transport system and preserve the safety of citizens. The development and implementation of effective cyber security measures are necessary steps to ensure the stability and reliability of transport systems and the preservation of national security in Ukraine. This article describes the method of intelligent recognition of threats for information systems of transport management (on the example of railway transport – TZ). The method is based on discrete procedures and the use of logical functions and fuzzy sets.

References

1. Lakhno, V. A., Petrov, O. S., Hrabariev, A. V., Ivanchenko, Y. V., & Beketova, G. S. (2016). Improving of information transport security under the conditions of destructive influence on the information-communication system. Journal of Theoretical and Applied Information Technology, 89(2), 352–361.

2. Lakhno, V., Mohylnyi, H., Donchenko, V., Smahina, O., & Pyroh, M. (2016). A model developed for teaching an adaptive system of recognising cyberattacks among nonuniform queries in information systems. Eastern-European Journal of Enterprise Technologies, 4(9), 27–36. https://doi.org/10.15587/1729-4061.2016.73315

3. Lakhno, V. (2016). Creation of the adaptive cyber threat detection system on the basis of fuzzy feature clustering. Eastern-European Journal of Enterprise Technologies, 2(9), 18–25. https://doi.org/10.15587/1729-4061.2016.66015

Published

2024-11-08

Issue

Section

All articles from the issue