Volodymyr Vasylenko

Work place: State University of Telecommunications, Kiev, 03110, Ukraine

E-mail: oknelisavvova172@gmail.com

Website:

Research Interests: Information Security, Multimedia Information System, Data Compression, Data Structures and Algorithms, Data Structures, Information Theory, Information-Theoretic Security

Biography

Volodymyr Vasylenko received his B.E. degree in 2013, his M.E. degree in 2014, and his Ph.D. degree in 2017. All degrees received from the State University of Telecommunications (SUT), Kiev, Ukraine.

From 2013 to 2014 he was a laboratory assistant in SUT. From 2014-2017 he was lecturer and an assistant Professor with the SUT. Since 2017, he is associate professor with the Department of Computer Science.

His current research interests include software-defined networking, servers&storages technologies, information security, data centers solutions. He has 15 publications in Ukrainian and international journals and conferences.

Author Articles
Method for Determination of Cyber Threats Based on Machine Learning for Real-Time Information System

By Volodymyr Tolubko Viktor Vyshnivskyi Vadym Mukhin Halyna Haidur Nadiia Dovzhenko Oleh Ilin Volodymyr Vasylenko

DOI: https://doi.org/10.5815/ijisa.2018.08.02, Pub. Date: 8 Aug. 2018

This work is about the definition of cyber threats in the information system. The cyber threats lead to significant loss of network resources and cause the system disability as a whole. Detecting countermeasures in certain threats can reduce the impact on the system by changing the topology of the network in advance. Consequently, the interruption of a cyberattack forces the intruders to seek for alternative ways to damage the system. The most important task in the information system work is the state of network equipment monitoring. Also it’s the support of the network infrastructure in working order.
The purpose of the work is to develop a method for detecting cyber threats for the information system. The system can independently detect cyber threats and develop countermeasures against them. The main feature of the counteractions is to protect network nodes from compromising.
To ensure the functional stability, the most important issues are providing safety metrics. This technique allows to increase the functional stability of the system, which works in real time.

[...] Read more.
Other Articles