Nadiia Dovzhenko

Work place: State University of Telecommunications, Kiev, 03110, Ukraine

E-mail: nadezhdadovzhenko@gmail.com

Website:

Research Interests: Computer systems and computational processes, Computer Networks, Network Architecture, Network Security

Biography

Nadiia Dovzhenko  received  M.E. degree in 2014 at State University of Telecommunication, Kiev, Ukraine. Then got her Ph.D. in 2018.

From 2014 to 2016 she worked on position Assistant of Department of Infocommunication in SUT. From 2016-2017 she was Senior Teacher on Department of Information and Communication technology. Since 2017, she is Associate Professor on the Department of Information and cybersecurity. Her research interests include sensors network, IoT, cybersecurity, and self-organizing networks. She has 19 publications in Ukrainian and international journals and conferences.

Author Articles
Method for Determination of Cyber Threats Based on Machine Learning for Real-Time Information System

By Volodymyr Tolubko Viktor Vyshnivskyi Vadym Mukhin Halyna Haidur Nadiia Dovzhenko Oleh Ilin Volodymyr Vasylenko

DOI: https://doi.org/10.5815/ijisa.2018.08.02, Pub. Date: 8 Aug. 2018

This work is about the definition of cyber threats in the information system. The cyber threats lead to significant loss of network resources and cause the system disability as a whole. Detecting countermeasures in certain threats can reduce the impact on the system by changing the topology of the network in advance. Consequently, the interruption of a cyberattack forces the intruders to seek for alternative ways to damage the system. The most important task in the information system work is the state of network equipment monitoring. Also it’s the support of the network infrastructure in working order.
The purpose of the work is to develop a method for detecting cyber threats for the information system. The system can independently detect cyber threats and develop countermeasures against them. The main feature of the counteractions is to protect network nodes from compromising.
To ensure the functional stability, the most important issues are providing safety metrics. This technique allows to increase the functional stability of the system, which works in real time.

[...] Read more.
Other Articles