This paper presents the result of the study of network intrusion detection using machine learning algorithms. The creation and training of such algorithms is seriously limited by the small number of actual datasets available for public access. The CSE-CIC-IDS2018 data set, used in research, includes 7 subsets of different attack scenarios. Each subset is labeled using a few subtypes of a given attack or normal behavior. That is why the problem of network attack detection has been considered a multiclassification problem. Some of the most popular classifiers will be tested on the chosen data set. Classification algorithms are developed using a standard Python programming environment and the specialized machine learning library Scikit-learn. In the paper, a comparative analysis of the results was performed based on the the application of Random Forest, XGBoost, LR, and MLP classifiers.
Effective use of Big Data can significantly support the development of smart cities and the new digital economy. The aim of the article is a multi-criteria evaluation of IT systems in terms of Big Data processing, taking into account the support for the development of smart cities. The article includes theoretical and empirical research. The adopted criteria for assessing the architecture of IT systems relate to barriers to the implementation of the digital economy in smart cities and the guidelines of international data strategies. The evaluation covered, among other things, cybersecurity and the effectiveness of organizing, storing, and producing new information. The research results allowed us to identify the key factors of Big Data processing efficiency. Based on the research results, an effective model of Big Data processing in organizations was developed. In particular, various data models were analyzed as one of the main elements of software architecture of information systems. The research also focused on data processing techniques such as data warehousing, machine learning, and distributed computing. The efficiency factors of IT systems identified in the research reduce barriers to developing global data strategies and smart cities.
The essence of administrative and legal regulation of the activities of the subjects of the national cybersecurity system of Ukraine has been established, which consists in building an effective system for ensuring cybersecurity and requires from the state bodies of Ukraine a clear legal definition of the principles of state policy in this area and an advanced response to dynamic changes taking place in the world in the field of cybersecurity. The classifier of threats to the security of information resources has been improved, which, in contrast to the existing ones, is based on a synergetic model of threats, which allows to classify threats by security components, types of services, and hierarchy levels of the infrastructure of automated systems, to assess the synergy and hybridity of threats to information security, cybersecurity, information security, and the likelihood of their impact on the security of information resources. It has been proved that the choice of specific means and ways of ensuring the cybersecurity of Ukraine is conditioned by the need to take timely measures adequate to the nature and scale of real and potential cybernetic threats to the vital interests of a person and citizen, society and the state. The purpose of the cybersecurity system of Ukraine has been clarified. The task of the cybersecurity system is to create the necessary conditions in cyberspace, under which it is possible to achieve national goals and realize the interests, tasks, and goals of its elements.
The paper provides an assessment of Poland’s efforts to address security threats over the last decade. The analysis is limited to energy security, environment protection, cybersecurity and information threats. Governmental strategies, policies and plans are confronted with the assessments of the Supreme Audit Office, academia and think tanks. The paper identifies common challenges related to development and implementation of the state’s response to traditional and emerging threats. It also discusses observed trade-offs and consequences of both actions and hesitance to act.
Today the world energy market is in great transition and the demand of clean energy such as liquefied natural gas (LNG). Increase of natural gas production and supply causes drawback of onshore infrastructure and many environmental restrictions. As solution, offshore large-scale terminals especially Floating Storage and Regasification Unit (FSRU) type is becoming commercially competitive and effective alternative for the areas where onshore gas supply infrastructure is not feasible. LNG production consumes around 850 kJ/kg of LNG energy and it is just dumped into seawater or in the atmosphere despite reusing as extra energy source. In this paper, we review the cold energy economy as well as current status of LNG cold energy utilization technologies. Moreover, current and emerging cybersecurity trends after LNG cold energy implementation at FSRU are proposed and discussed to broaden the perspectives of the researchers in the community and industry experts. Finally, the review concluded with a practical recommendation of implementation of LNG Cold Energy Hub concept for future energy systems.
The methodological foundations of the formation of analytical support for public administration of cybersecurity have been improved. Based on a combination of hierarchical and non-hierarchical clustering methods using the IBM SPSS Statistics package, the country’s regions have been grouped into four clusters, which is the basis for adjusting the priorities of the state cybersecurity policy, a well-grounded approach when choosing means and instruments of influence at the regional level. In modern doctrine and practice of international law, the issues of qualification of cyber warfare remain controversial. There are approaches to justify the application of international humanitarian and criminal law. The most justified, in our opinion, is the qualification of cyber warfare as a violation of the UNO Charter and the use of force, and in some cases – the crime of aggression. The substantive rules of the institution of international cooperation in the fight against cybercrime determine the special principles of this kind of cooperation, the criminalization of certain types of illegal acts, as well as institutional mechanisms and capacity building. The system of international combating cybercrime is based on the principles of technical neutrality, multi-stakeholderism (public-private partnerships), as well as the equivalence of human rights online and offline. In the future, cybercrime will be associated with the use of innovative technologies. As it has been established by the example of the Internet of things, the latest technology, as a general rule, is included in the scope of existing international agreements on cybercrime, but there is no special regulation for them. We propose formal consolidation of the provision on “emergent technologies” in the texts of international legal acts in the field of combating cybercrime. First of all, this concerns the future UNO Convention on the fight against cybercrime, which should also provide for an additional body, such as the T-CY Committee under the Council of Europe Convention, which will provide clarification on the application of the agreement in specific changed circumstances.
The authors have investigated the features of legal support for cybersecurity in some of the leading countries of the world, have established the organizational basis for its support, as well as the main aspects of NATO and the EU’s activities and standards in this area. In particular, the essence of the concept of cybersecurity is determined by referring to the views of both foreign scientists and Ukrainian scientists, and fixing this definition in normative documents of international importance (international standard ISO/IEC 27032:2012). Actual strategic goals in the direction of ensuring cybersecurity in countries such as France, the UK, the United States, as well as the settlement of these issues at the legislative level in Ukraine are highlighted. It has been established which state bodies operate in the indicated countries, whose powers include ensuring cybersecurity. Attention is paid to the settlement of cybersecurity and cyber protection issues at the international level, in particular at the EU and NATO levels. Particular attention is paid to NATO standards – TEMPEST. The content of the norms of the current legislation of Ukraine in the field of ensuring cybersecurity and the nature of the priority tasks of the National Cyber Security Coordination Center under the National Security and Defense Council of Ukraine are disclosed, which are normatively enshrined in the relevant Regulation. The features of the regulatory and organizational support of cybersecurity in some leading countries of the world and in Ukraine are structured.
The article is devoted to the study of cybersecurity as a component of the national security of the state. It has been established that the development of information and telecommunication technologies testifies to the progress of society but also determines the security risks of their use. In particular, this refers to a cyberattack and other cyberthreats. It has been determined that cybersecurity should be understood as the protection of the vital interests of a person and citizen, society and the state when using cyberspace. An important role in ensuring such a security is played by the cyberthreat protection mechanism, which provides for the development and adoption of a cybersecurity strategy, the creation of a national cybersecurity system, strengthening of the security and defense sector’s capabilities to effectively combat military cyberthreats, cyberterrorism, and ensuring cyberprotection of state electronic information resources and information infrastructure. The existence of the Cybersecurity Strategy of Ukraine and other acts as the legal basis for countering cyberthreats has been noted. In turn, the national cybersecurity system provides for the activities of the Ministry of Defense of Ukraine, the State Service for Special Communications and Information Protection of Ukraine, the Security Service of Ukraine, the National Police of Ukraine, the National Bank of Ukraine, and intelligence agencies. In turn, in France, Finland, Germany, the central place in the cybersecurity system belongs to the National Cybersecurity Agency, the National Cybersecurity Center, and the Cyberdefense Center, respectively. Despite Ukraine’s significant steps towards increasing cybersecurity in the state, there is no public-private cooperation in this area. Due to this, authorized entities should establish cooperation with the non-state sector and establish effective institutional and legal instruments for such cooperation. At the same time, the issue of public-private cooperation in the field of cybersecurity is relevant for all states of the world in view of the global nature of existing cyberthreats.
The protection of state security by the legal standards of the criminal law is one of the key, the legally protected interests including the cybersecurity in the sectors of critical infrastructure transport (road, air transport, ship, and rail), electronic communications, energy, information and communication technologies, post, industry, water and atmosphere, health. Today’s empirical empowerment confirms that the security is a significant multidimensional factor of the quality of society and citizen’s life, which we have to systematically examine, forecast and ensure. The contribution presents the defined security interests of the state in the framework of new strategic documents of the Slovak Republic in the comparison with the current standards of the criminal law for the protection of state security within the material and non-material components of the defence potential of the state.
This article discusses the Ukrainian legislation on cybersecurity. The necessity of developing an efficient cybersecurity system was raised by the hybrid war conducted by Russia over the last few years, in which many critical infrastructure objects have been destroyed with serious consequences not only for the end consumers but also for the security of the state. Consequently, Ukraine has begun issuing a number of laws aiming at strengthening its cyber defense capabilities by establishing an efficient national cybersecurity system. The analysis has clearly shown that although important steps have already been taken in this direction, much still remains to be done to protect the Ukrainian critical infrastructure.