<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>System for Monitoring the Connection of USB Devices for Cybersecurity Auditing</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>National Aviation University</institution>
          ,
          <addr-line>Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>State Scientific and Research Institute of Cybersecurity Technologies and Information Protection</institution>
          ,
          <addr-line>Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Sumy National Agrarian University</institution>
          ,
          <addr-line>Sumy</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Sumy State University</institution>
          ,
          <addr-line>Sumy</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>Yessenov University</institution>
          ,
          <addr-line>Aktau</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
      </contrib-group>
      <fpage>0000</fpage>
      <lpage>0001</lpage>
      <abstract>
        <p>The paper considers the urgent task of ensuring information security by monitoring the connections of USB devices. An analysis of the available solutions was carried out, and technologies were identified that will allow the system to be implemented. The topology of the physical components of the system is developed and described. The subject area model is described by an ER diagram that contains key entities and links them. The description of model attributes is given. The system is implemented in the form of two Windows services, utilities for configuring launch options for services and a web application. The verification plan is given, according to which the system was proved to be operational. The developed system can be recommended for solving the urgent cybersecurity task of monitoring device connectivity.</p>
      </abstract>
      <kwd-group>
        <kwd>cybersecurity measures</kwd>
        <kwd>information protection</kwd>
        <kwd>connection to the USB port</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>At the present stage, information is becoming one of the most valuable and
sought-after resources, for the preservation and protection of which more and more
time and money is allocated. In this regard, a cybersecurity measure to protect
information is one of the important processes of any organization. The process of
information security management is inextricably linked with the monitoring of events in
the system. Availability, small size and increased capacity of USB drives casts great
doubt on the information security of companies. Ignoring this threat can lead to
significant material losses. By connecting to a USB port, an attacker can snatch
important information or install malware. More and more companies are investing in
firewalls, using more reliable and modern encryption algorithms, and other means and
technologies to protect data from Internet theft. However, the most common attackers
are employees of the company, who steal information about investments, project
documents, commercial offers, personal information and contact details of customers and
much more.</p>
      <p>Disconnecting USB ports is a radical security measure that will lead to significant
inconvenience and inability to connect peripherals to your computer. Determining the
list of allowed devices using a serial number is a good measure to prevent information
leakage, but not enough. The serial number of the flash drive can be changed to any,
which will allow the infringer to access important data without any obstacles.</p>
      <p>An important security measure is to monitor the connection of USB devices to
corporate computers. Centralized connection tracking is an effective way to
investigate leaks via USB devices, allowing security management or the security
administrator to respond in a timely manner and identify the device, date, time, and computer
where the incident occurred. Analysis of this data and detection of the fact of
connection of the device will help to successfully identify the attacker and take the necessary
measures.</p>
      <p>The aim of the work is to increase the efficiency of information protection systems
by developing a subsystem for monitoring the connection of USB-devices.
2</p>
      <p>Related works analysis and problem statement
One of the important tasks of modern information and / or cybersecurity systems is to
ensure promptness (timeliness) in identifying threats and risks for information objects
and processes to be protected. In order to increase efficiency in information and / or
cybersecurity management systems, components are used that record changes in the
functional state of an object or process automatically. The basis of such components
are high-quality agents (hardware or software) to collect data on the current state of
individual components of the object or process and effective agents that can analyze
the collected data and make decisions about the functional state of the object or
process as a whole. Examples of the first type of agents are in [1]. Implementation of
agents of the second type requires the involvement of machine learning technologies
[2] and pattern recognition similar to those used in intelligent decision support
systems for technological, economic, environmental, and social objects or processes.</p>
      <p>
        Large companies and corporations use Security Information and Event
Management (SIEM) technology for cybersecurity [
        <xref ref-type="bibr" rid="ref10 ref6 ref7 ref8 ref9">3-11</xref>
        ] systems based on this technology,
enable the centralized collection and analysis of security relevant information,
generated by a variety of different systems, to detect advanced threats and to improve
reaction time in case of an incident.
      </p>
      <p>
        According to [
        <xref ref-type="bibr" rid="ref10 ref6">4, 5, 7, 11</xref>
        ]:
      </p>
      <p>- Security information management (SIM) — log management and
compliance reporting.</p>
      <p>
        - Security event management (SEM) — real-time monitoring and incident
management for security-related events from networks, security devices, systems, and
applications [
        <xref ref-type="bibr" rid="ref11 ref12 ref13 ref14">12-15</xref>
        ].
      </p>
      <p>However, small companies do not have the opportunity to invest heavily in
ensuring information security on this technology and conducting training of specialists for
the quality performance of their functions in the application of the above products.
During the analysis of existing solutions, software products were identified that can
fully or partially perform the task monitoring of USB device connections: USB
Canary, USBDeview, CleverControl, Solarwinds Security Event Manager, and
AlienVault.</p>
      <p>Determine the main characteristics of the monitoring system USB connections,
which meet the needs of a small company, and determine the compliance of existing
solutions to these requirements (see Table 1).</p>
      <p>Thus, a review of existing solutions has shown that both paid and free products can
be used to monitor USB device connections. The disadvantage of free solutions is the
lack of functionality that does not meet all the needs for a full-fledged solution. Most
free solutions do not have a centralized analysis of events when connecting USB
devices to corporate computers. Paid versions contain redundant features that you have
to pay for.</p>
      <p>Therefore, it is necessary to develop a system that will:
- track connection events on corporate computers;
- provide centralized collection and storage of events for further analysis;
- have an intuitive web interface for easy viewing and analysis of events;
- provide the ability to find the right events;
- access to view events must be carried out after the authorization procedure;
- the ability to manage users of the web application and delete irrelevant
information. Access to these functions should be provided only to users with administrator
rights.</p>
      <p>- ability to recover the password;
- ability to deploy the program on the computer to be monitored.</p>
    </sec>
    <sec id="sec-2">
      <title>Modeling of the subject area</title>
      <p>For high-level design of databases ER-chart was developed. This model allows you to
describe the subject area, highlight key entities, and identify the relationships that can
be established between those entities.</p>
      <p>Figure 1 shows a database diagram that meets the requirements of the development
system. In order to avoid potential inconsistencies and redundancy of the data, the
model was reduced to the third normal form during the design.</p>
      <sec id="sec-2-1">
        <title>Description of the attribute values is given in Table 2. Table All_User Table 2 - Description of attributes</title>
      </sec>
      <sec id="sec-2-2">
        <title>USBEvent</title>
      </sec>
      <sec id="sec-2-3">
        <title>Net_info Field admin email</title>
        <p>Id
userpc
eventdate
eventtime
vid
pid
SN
typeevent
Id
ip
userpc
mac</p>
        <p>Key</p>
      </sec>
      <sec id="sec-2-4">
        <title>Content FK FK FK</title>
        <p>FK</p>
      </sec>
      <sec id="sec-2-5">
        <title>Shows the presence or absence of administrator rights</title>
      </sec>
      <sec id="sec-2-6">
        <title>Web application user email address</title>
      </sec>
      <sec id="sec-2-7">
        <title>Saves a number that uniquely identifies the entity instance, allows you to link tables</title>
      </sec>
      <sec id="sec-2-8">
        <title>Ethernet card MAC address</title>
      </sec>
      <sec id="sec-2-9">
        <title>Date of the event</title>
      </sec>
      <sec id="sec-2-10">
        <title>Time of the event</title>
      </sec>
      <sec id="sec-2-11">
        <title>USB drive manufacturer number</title>
      </sec>
      <sec id="sec-2-12">
        <title>USB drive model number</title>
      </sec>
      <sec id="sec-2-13">
        <title>The serial number</title>
      </sec>
      <sec id="sec-2-14">
        <title>Event type (connect or disconnect)</title>
      </sec>
      <sec id="sec-2-15">
        <title>Saves a number that uniquely identifies an entity instance, allows you to link tables</title>
      </sec>
      <sec id="sec-2-16">
        <title>Ethernet card MAC address</title>
      </sec>
      <sec id="sec-2-17">
        <title>Current IP address of the corporate computer</title>
      </sec>
      <sec id="sec-2-18">
        <title>MAC address of the corporate computer</title>
        <p>To display the topology of physical components of the system and the location of
software components of the system, a deployment diagram was developed (Fig. 2).
Using this diagram, you can display the location of complex information systems that
require different computing platforms and database access technologies. This makes it
possible to streamline the placement of components in the corporate network, which
determines the overall performance of the system. The need to integrate systems with
the Internet requires addressing related security issues and the availability of
information for corporate customers. The use of "client-server" technology requires the
placement of large databases in different segments of the corporate network, their
archiving, backup, and hashing, which in turn will ensure system performance. These
aspects also require visual representation to specify the software and technical
features of the implementation of distributed architectures.</p>
        <p>Hereof it is possible to allocate the basic purposes of development of the
deployment diagram:
- distribute the components of the system on physical nodes;
- show physical connections between nodes during execution;
- facilitate the system configuration process.</p>
        <p>The main component of the deployment diagram are nodes and their relationships.
Representation of nodes occurs by means of rectangular parallelepipeds with the
artifacts which are located in them. In turn nodes can contain the subnodes, presented by
rectangular parallelepipeds. A node on the deployment duagram can rearrange a
computer, a database server, network components, and other.
The diagram shows four physical nodes:
- server - a node on which the server service is located;
- client - a node over which monitoring is carried out, and on which the client
service is located. Any corporate computer can be this node;</p>
        <p>- web server - a node on which the web application is installed, the main purpose
of which is to analyze events;
- database server - a node on which the database is installed.</p>
        <p>The diagram (Fig. 3) allows you to determine the requirements for the system and
describe the functionality. It also helps to identify internal and external factors that
affect the system and need further consideration.</p>
        <p>Description of the software implementation of the system for
monitoring the connections of USB-devices</p>
        <p>To develop a system for monitoring USB device connections, the following were
selected: C # and Python programming languages, technologies for creating HTML
web interest, CSS and JavaScript, and PostgreSQL database.</p>
        <p>The part of the system that monitors USB device connection events must be
implemented as a Windows service. Services implement the .NET Framework created
by Microsoft to implement Windows. This platform allows you to run applications on
the Windows operating system written in languages such as C # or VisualBasic.</p>
        <p>
          Any monitoring system [
          <xref ref-type="bibr" rid="ref10 ref6 ref7 ref8 ref9">5, 6, 7, 8, 9, 10, 11</xref>
          ] must provide a convenient view of the
information. In our case, this function will be performed by a web application. Python
programming language is used to implement the backend. One of the needs of the
system is to store events. Hence -the need to choose a database. PostgreSQL was
chosen to implement this project. With the help of a web application, it is possible to
conveniently view and analyze events that have occurred on corporate computers. The
application backend is based on the Flask micro framework.
        </p>
        <p>The system was checked according to the plan (Table 3).</p>
        <p>TC_ID
TC1
ТС2
TC3
TC4
TC5
TC6
TC7
TC8
ТС9</p>
        <p>Table 3 - Verification plan
Verification requirements
Test the ability to register the client service and server service in
the system using the installer
Test the ability to track the connection or disconnection of USB
drives to a PC, send the received data to a server and store it in a
database
Test the ability to configure network settings for client service
and server service, the ability to run services on separate
computers, the ability to view received events using a web application
Test the ability of authorized access to the system</p>
      </sec>
      <sec id="sec-2-19">
        <title>Test the ability to reset the user password</title>
      </sec>
      <sec id="sec-2-20">
        <title>Check for shared functionality</title>
      </sec>
      <sec id="sec-2-21">
        <title>Test the ability to delete events and nodes</title>
      </sec>
      <sec id="sec-2-22">
        <title>Test the ability to search</title>
      </sec>
      <sec id="sec-2-23">
        <title>Test the ability to create and delete users</title>
        <p>Once the USB device is connected, the data is added to the database. This means
that the USB device connection event was successfully tracked, transferred to the
server, and recorded to the database (Figure 6).</p>
        <p>A convenient search allows you to track the connection with the specified
parameters (Fig. 7).</p>
        <p>Testing the program according to a defined plan proved the efficiency of the
developed system.</p>
        <p>The developed system allows you to supplement cybersecurity measures with a
convenient tool for monitoring events. The software allows you to track connection
events on corporate computers; provide centralized collection and storage of events
for further analysis; have an intuitive web interface for easy viewing and analysis of
events; provide the ability to search for the desired events.</p>
        <p>The disadvantages that will be eliminated in the future include the impossibility:
─ work with ActiveDirectory;
─ identify the user account during which the device was connected;
─ automatically determine the type and name of the company-manufacturer of the</p>
        <p>USB-device;
─ remote complete blocking of USB-devices connection;
─ creation of "white" lists of devices allowed for use in the corporate network;
─ remotely delete USB device entries from the registry of the remote computer.
6</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Conclusions</title>
      <p>The following main results were received in this paper:
─ The main tasks of modern information and/or cybersecurity systems and
technologies to ensure information protection have been considered;
─ A review of software for monitoring the connection of USB-devices revealed the
urgency of developing a system that can be used by small companies to reduce the
response time to leaks and increase the chances of establishing the identity of the
infringer.
─ The system is implemented in the form of two Windows services, utilities for
configuring settings for running services and a web application.
─ The performed efficiency test made it possible to recommend this software tool for
monitoring USB-device connections.
─ Further research will be aimed at integrating the developed monitoring system with
the information security management system, which will allow to comprehensively
solve the cybersecurity problem.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <surname>Meckl</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tecuci</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Marcu</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Boicu</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>Integrating Collaborative Cognitive Assistants Into Cybersecurity Operations Centers</article-title>
          .
          <source>In AAAI Fall Symposium: ALEC</source>
          (pp.
          <fpage>28</fpage>
          -
          <lpage>35</lpage>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <surname>Vielberth</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Pernul</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>A security information and event management pattern</article-title>
          . https://epub.uni-regensburg.de/41139/ Nicolett,
          <string-name>
            <given-names>M.</given-names>
            &amp;
            <surname>Kavanagh</surname>
          </string-name>
          ,
          <string-name>
            <surname>K. M.</surname>
          </string-name>
          (
          <year>2011</year>
          ).
          <article-title>Magic quadrant for security information and event management</article-title>
          .
          <source>Gartner RAS Core Reasearch Note (May</source>
          <year>2009</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <surname>Novikova</surname>
            ,
            <given-names>E. S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bekeneva</surname>
            ,
            <given-names>Y. A.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Shorov</surname>
            ,
            <given-names>A. V.</given-names>
          </string-name>
          (
          <year>2017</year>
          ,
          <article-title>September)</article-title>
          .
          <article-title>Towards visual analytics tasks for the security information and event management</article-title>
          .
          <source>In 2017 International Conference" Quality Management, Transport and Information Security</source>
          ,
          <string-name>
            <surname>Information Technologies</surname>
          </string-name>
          <article-title>"(IT&amp;QM</article-title>
          &amp;IS) (pp.
          <fpage>90</fpage>
          -
          <lpage>93</lpage>
          ). IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <surname>Lavrov E.</surname>
          </string-name>
          <article-title>Mathematical models for the distribution of functions between the operators of the computer-integrated flexible manufacturing systems</article-title>
          / Lavrov, E.,
          <string-name>
            <surname>Pasko</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Krivodub</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tolbatov</surname>
          </string-name>
          , A. / 2016 Modern Problems of Radio Engineering, Telecommunications and Computer Science,
          <source>Proceedings of the 13th International Conference on TCSET 2016 - Lviv-Slavske</source>
          ,
          <year>2016</year>
          . -
          <fpage>Р</fpage>
          .
          <fpage>72</fpage>
          -
          <lpage>75</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <surname>Tolbatov A</surname>
          </string-name>
          .
          <article-title>Data representing and processing in expert information system of professional activity analysis /</article-title>
          <string-name>
            <surname>Zaritskiy</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pavlenko</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tolbatov</surname>
          </string-name>
          , A. / 2016 Modern Problems of Radio Engineering, Telecommunications and Computer Science,
          <source>Proceedings of the 13th International Conference on TCSET 2016 - Lviv-Slavske</source>
          ,
          <year>2016</year>
          . -
          <fpage>Р</fpage>
          .
          <fpage>831</fpage>
          -
          <lpage>833</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          7.
          <string-name>
            <surname>Lavrov</surname>
            <given-names>E.</given-names>
          </string-name>
          <article-title>Cybersecurity of distributed information systems. The minimization of damage caused by errors of operators during group activity /</article-title>
          <string-name>
            <surname>Lavrov</surname>
          </string-name>
          , E.,
          <string-name>
            <surname>Tolbatov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pasko</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tolbatov</surname>
          </string-name>
          , V. /
          <year>2017</year>
          2nd International Conference on Advanced Information and Communication Technologies,
          <source>AICT 2017 - Proceedings - Lviv</source>
          ,
          <year>2017</year>
          . -
          <fpage>Р</fpage>
          .
          <fpage>83</fpage>
          -
          <lpage>87</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          8.
          <string-name>
            <surname>Lavrov</surname>
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tolbatov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pasko</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tolbatov</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <article-title>Ergonomic reserves for improving reliability of data processing in distributed banking systems</article-title>
          .
          <source>International Conference on Advanced Information and Communication Technologies. Lviv</source>
          ,
          <year>2017</year>
          . Р.
          <volume>79</volume>
          -
          <fpage>82</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          9.
          <string-name>
            <surname>Zaritskry</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <article-title>and et</article-title>
          . al.
          <article-title>Theoretical bases, methods and technologies of development of the professional activity analytical estimation intellectual systems</article-title>
          .
          <source>International Conference on Advanced Information and Communication Technologies</source>
          .
          <year>2017</year>
          . Р.
          <volume>101</volume>
          -
          <fpage>104</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          10.
          <string-name>
            <surname>Gnatyuk</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Barchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Azarenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Tolbatov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Obodiak</surname>
          </string-name>
          ,
          <string-name>
            <surname>V.</surname>
          </string-name>
          <article-title>Tolbatov Ergonomic Support for Decision-Making Management of the Chief Information Security Officer</article-title>
          .
          <source>1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf</source>
          <year>2019</year>
          )
          <article-title>Lviv</article-title>
          , November
          <volume>29</volume>
          ,
          <year>2019</year>
          . P.
          <volume>459</volume>
          -
          <fpage>471</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          11.
          <string-name>
            <surname>Tolbatov</surname>
            <given-names>А.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tolbatov</surname>
            <given-names>V.A.</given-names>
          </string-name>
          <article-title>Development concept modeling of business processes of modern industrial enterprises in terms of theoretical and legal approaches to the analysis information security</article-title>
          .
          <source>International scientific-technical magazine Measuring and computing devicesin technological processes</source>
          .
          <year>2017</year>
          . №1. P.
          <volume>196</volume>
          -
          <fpage>199</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          12. S. Gnatyuk,
          <source>Critical Aviation Information Systems Cybersecurity</source>
          ,
          <article-title>Meeting Security Challenges Through Data Analytics and Decision Support, NATO Science for Peace</article-title>
          and Security Series,
          <string-name>
            <surname>D</surname>
          </string-name>
          : Information and
          <string-name>
            <given-names>Communication</given-names>
            <surname>Security</surname>
          </string-name>
          . IOS Press Ebooks, Vol.
          <volume>47</volume>
          , №3, рр.
          <fpage>308</fpage>
          -
          <lpage>316</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          13.
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Okhrimenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kovtun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Gancarczyk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Karpinskyi</surname>
          </string-name>
          ,
          <article-title>Method of Algorithm Building for Modular Reducing by Irreducible Polynomial</article-title>
          ,
          <source>Proceedings of the 16th International Conference on Control, Automation and Systems</source>
          , Oct.
          <volume>16</volume>
          -
          <fpage>19</fpage>
          , Gyeongju, Korea,
          <year>2016</year>
          , рр.
          <fpage>1476</fpage>
          -
          <lpage>1479</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          14. Hu
          <string-name>
            <given-names>Z.</given-names>
            ,
            <surname>Gnatyuk</surname>
          </string-name>
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Kovtun</surname>
          </string-name>
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Seilova</surname>
          </string-name>
          <string-name>
            <surname>N.</surname>
          </string-name>
          <article-title>Method of searching birationally equivalent Edwards curves over binary fields</article-title>
          ,
          <source>Advances in Intelligent Systems and Computing</source>
          , Vol.
          <volume>754</volume>
          , pp.
          <fpage>309</fpage>
          -
          <lpage>319</lpage>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          15.
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Kinzeryavyy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Iavich</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Prysiazhnyi</surname>
          </string-name>
          , Kh. Yubuzova,
          <article-title>High-Performance Reliable Block Encryption Algorithms Secured against Linear and Differential Cryptanalytic Attacks</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          , Vol.
          <volume>2104</volume>
          , pp.
          <fpage>657</fpage>
          -
          <lpage>668</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          16.
          <string-name>
            <surname>Gnatyuk</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kinzeryavyy</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kyrychenko</surname>
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yubuzova</surname>
            <given-names>Kh.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aleksander</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Odarchenko</surname>
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Secure</surname>
          </string-name>
          <article-title>Hash Function Constructing for Future Communication Systems</article-title>
          and Networks,
          <source>Advances in Intelligent Systems and Computing</source>
          , Vol.
          <volume>902</volume>
          , pp.
          <fpage>561</fpage>
          -
          <lpage>569</lpage>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          17.
          <string-name>
            <surname>Fedushko</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shakhovska</surname>
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Syerov</given-names>
            <surname>Yu</surname>
          </string-name>
          .
          <article-title>Verifying the medical specialty from user profile of online community for health-related advices</article-title>
          .
          <source>CEUR Workshop Proceedings</source>
          . Vol.
          <volume>2255</volume>
          :
          <article-title>IDDM 2018, Lviv</article-title>
          , Ukraine,
          <source>November 28-30</source>
          ,
          <year>2018</year>
          . P.
          <volume>301</volume>
          -
          <fpage>310</fpage>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          18.
          <string-name>
            <given-names>R.</given-names>
            <surname>Odarchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Abakumova</surname>
          </string-name>
          ,
          <article-title>Security Key Indicators Assessment for Modern Cellular Networks</article-title>
          ,
          <source>Proceedings of the 2018 IEEE First International Conference on System Analysis &amp; Intelligent Computing (SAIC)</source>
          ,
          <source>Kyiv, Ukraine, October</source>
          <volume>8</volume>
          -
          <issue>12</issue>
          ,
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          19.
          <string-name>
            <given-names>Z.</given-names>
            <surname>Hassan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Odarchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Zaman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Shah</surname>
          </string-name>
          ,
          <article-title>Detection of Distributed Denial of Service Attacks Using Snort Rules in Cloud Computing &amp; Remote Control Systems</article-title>
          ,
          <source>Proceedings of the 2018 IEEE 5th International Conference on Methods and Systems of Navigation and Motion Control, October 16-18</source>
          ,
          <year>2018</year>
          . Kyiv, Ukraine, pp.
          <fpage>283</fpage>
          -
          <lpage>288</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>