<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Model of Information Technology for Efficient Data Processing in Cloud-based Malware Detection Systems of Critical Information Infrastructure</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Sergiy Gnatyuk</string-name>
          <email>s.gnatyuk@nau.edu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Feruza Satybaldiyeva</string-name>
          <email>feruza201200@gmail.com</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Viktoriia Sydorenko</string-name>
          <email>v.sydorenko@ukr.net</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oksana Zhyharevych</string-name>
          <email>zhyharevych.oksana@vnu.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Artem Polozhentsev</string-name>
          <email>artem.polozhencev@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Lesya Ukrainka Volyn National University</institution>
          ,
          <addr-line>13 Voli ave. Lutsk, 43025</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National Aviation University</institution>
          ,
          <addr-line>1 Liubomyra Huzara ave. Kyiv, 03058</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Satbayev University</institution>
          ,
          <addr-line>22 Satpaev str., Almaty, 050000</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>State Scientific and Research Institute of Cybersecurity Technologies and Information Protection Kyiv</institution>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>Yessenov University</institution>
          ,
          <addr-line>32 Microdistrict, Aktau, 130000</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
      </contrib-group>
      <fpage>206</fpage>
      <lpage>213</lpage>
      <abstract>
        <p>The rapid development of ICT caused significant changes in the ways and means of communication between people using network technologies. Creating, storing, distributing, and sharing information is becoming increasingly easy and accessible. Today, one of the most promising technologies for storing information and providing effective online services is the use of cloud systems. Using this technology to protect computer systems from cyberattacks can bring many advantages compared to traditional protection schemes. However, the rapid evolution of malicious software and the diversification of its types leads to a significant increase in the vulnerabilities of the implementation of attacks on information resources, especially on objects of the state's critical infrastructure. Thus, there is a need to develop new methods and models for effective data processing in cloud-based malware detection systems. In this study, the information technology model for efficient data processing in cloud-based malware detection systems was developed, which considers the need to formulate commands for transferring control to the ICT software client. In addition, a study of the probabilistic and temporal characteristics of algorithms and programs for generating and processing metadata in a cloud-based malware detection system was conducted. This allowed for increasing the accuracy of the results of estimation of time characteristics by up to 1.7 times and jitter characteristics by up to 4.5 times.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Malware</kwd>
        <kwd>malware detection</kwd>
        <kwd>critical infrastructure</kwd>
        <kwd>critical information infrastructure</kwd>
        <kwd>cloud computing</kwd>
        <kwd>information technology</kwd>
        <kwd>model for efficient data processing</kwd>
        <kwd>ICT</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Up-to-date malware detection technologies
include sophisticated mathematical methods as
well as hardware and software complexes for data
storage, processing, transmission, computerized
control, telecommunications, etc. The constant
development of computing facilities and
automation complexes, as well as the increasing
demand for cloud-based malware (Figs. 1 and 2)
detection systems, leads to an increase in the
volume of metadata transferred to these systems.</p>
      <p>However, increasing requirements for the
accuracy of modeling and quality of technical
developments require consideration of many
objective and subjective factors (especially
important for government critical infrastructure)
that arise in the process of ICT operation. The
increasing requirements for the accuracy of
modeling and the quality of technical
developments, however, require the consideration
of many objective and subjective factors
(especially important for government critical
infrastructure) that arise in the process of ICT
operation:
• The heterogeneity of ICT, which contain
diverse components, many of which are
themselves complex, multifunctional systems.
• The multi-connected and large-scale
nature of ICT.
• The distributed nature of information and
computing resources across the global network.
• Susceptibility to various types of external
and internal intrusions (especially virus
attacks).
• Knowledge-intensive and continuous
evolution based on advanced technology and
software developments etc.</p>
      <p>Therefore, there is a problem of developing
mathematical models that most accurately
formalize the technology of ICT functioning.</p>
      <p>Especially important is the task of mathematical
description of the cloud system technology to
detect malware in the ICT, considering some basic
factors (heterogeneity, multi-connectivity, etc.).</p>
      <p>
        Today, cloud computing is one of the most
advanced technologies for storing information and
providing efficient online services. Using this
technology to protect computer systems from
cyberattacks can offer many advantages over traditional
protection schemes, such as simplicity, accessibility,
lower cost, and scalability. Malware is defined as
any malicious software that targets a computer
system to perform cyber-attacks to damage
endpoints. According to [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], protected assets can
include all desktop and laptop computers, computer
systems and networks, mobile devices, the Internet
of Things (IoT), Cyber-Physical Systems, and the
most critical assets of the nation’s critical
information infrastructure (Fig. 3).
      </p>
      <p>Let’s take a closer look at some studies on
malware detection in the cloud environment.</p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], an approach to protect IoT devices from
local computer network attacks is presented. The
authors propose a new concept of Behavior-based
Deep Learning (BDLF) embedded in the cloud
platform of the IoT environment. In this approach,
behavior graphs are first built by analyzing API
calls. Then, high-level features of the behavior
graphs are extracted using stacked autoencoders
neural networks. Experimental results show that
the proposed BDLF can learn a variety of malware
semantics and further improve the average
detection accuracy by 1.5%.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], a malware detection method is
presented which analyzes the network traffic and
software behavior. This method is based on the
classification of the sets of API calls used, the
frequencies and sequences of API calls extracted
from the control flow graphs of software
applications, and the features extracted from the
DNS traffic of the network. The results of the
experiment showed the reliability of malware
detection at the level of 97.29 to 99.42%, which
proves the ability of the method to increase the
reliability of malware detection.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], the authors proposed an energy-efficient
hosting model consisting of individual components
of Amazon cloud services to improve the
uniqueness and scalability of the model. This study
considered the establishment of key benchmarking
metrics and known antiviruses for the cloud hosting
model. According to the paper, the proposed
approach was not only successful for the hosted
detection system but also outperformed traditional
antiviruses. However, the malware detection
infrastructure and hosting model can be further
improved by integrating an intrusion detection
engine supported by the cloud environment.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], a cloud-based malware detection and
neutralization system for wireless multimedia
systems in IoT is proposed based on a dynamic
differential game. According to the proposed
model, firstly, an SVM-based malware detection
model is created by sharing data on the security
platform in the cloud. Then, the number of
malware-infected devices that can physically
infect critical nodes is calculated according to the
attributes of the Wireless Multimedia System
(WMS). Finally, the state transition between
WMS devices is described by a modified
epidemic model, and a Hamiltonian function has
been introduced to simplify the saddle-point
solution. In addition, the objective value function
and the dynamic differential game were
sequentially derived for the Nash equilibrium
between the WMS system and the malware.
      </p>
      <p>According to the paper, the results showed that the
proposed algorithm can neutralize malware
accurately and efficiently and is suitable for WMS
with limited resources.</p>
      <p>
        In the study [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], the authors proposed an
information technology for malware detection in
the cloud environment based on Machine
Learning (ML). First, they used random
simulation to get the worst-case logarithmic loss
and then used some models such as KNN, LR, etc.
      </p>
      <p>Next, they looked at the logarithmic loss of each
algorithm and determined if it was the perfect
model. Finally, they deployed the ML model with
a user interface on the AWS cloud. According to
the authors, they found a unique solution by
working with both machine learning and cloud
computing to determine the legitimacy of a file.</p>
      <p>However, this research can be improved by using
different data mining techniques to select features
or by implementing new learning models.</p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], a cloud-based malware detection
solution called TrustAV is presented. This
solution is based on a pattern-matching method to
identify contaminated data. TrustAV outsources
the processing of malware analysis to a remote
server and is offered as a cloud-based solution.
      </p>
      <p>According to the paper, TrustAV can protect the
transmission and processing of user data even in
untrusted environments. In addition, TrustAV
uses various techniques offered by Intel SGX
technology to overcome common performance
issues and limit risk. However, no real-world data
is available to evaluate the proposed TrustAV
cloud solution.</p>
      <p>
        To detect the rapidly increasing number of
malware attacks, an intelligent system based on
behavioral analysis in the cloud environment has
been proposed in [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. It creates a dataset of
malware on different virtual machines, which
effectively identifies distinctive features (Fig. 4).
      </p>
      <p>Then, samples selected based on training and
rules are provided to detection agents to separate
such software from safe samples. The authors
emphasize that the developed system can
effectively detect both known and unknown IPSs
with a high level of detection and accuracy. In
addition, the results of the proposed method
outperform those of the leading methods in the
literature. The detection results reach 99.8%,
0.4% false positive rate, and 99.7% accuracy. The
proposed system can help those who want to
develop a new malware detection system in a
cloud environment.</p>
      <p>In Table 1, the results of the analysis of malware
detection approaches in the cloud environment are
summarized by the following criteria (proposed by
authors and based in last advances in the area):
1. Clarity of formalization
2. Flexibility and versatility
3. Ability to self-learn and improve
4. Detection accuracy
5. Experimental validation.</p>
      <p>The common goal of all the above studies is to
identify malware by increasing the detection rate
while reducing the misclassification rate. In
reviewing these studies, it is clear that while each
detection method has its advantages and works
better for certain datasets in a cloud environment,
none of them can detect 100 percent of malware.
A deep learning behavioral graph approach to malware detection
Method for malware detection through analysis of network traffic and in-system
software behavior
Cloud-based energy-efficient hosting model for malware detection
A dynamic differential game-based malware detection and neutralization model for
a wireless IoT system
ML-based malware detection technology for the cloud environment
TrustAV model for detecting malware in the cloud
Malware detection system based on behavioral analysis in the cloud environment</p>
      <p>The purpose of this study is to create and
investigate a mathematical model of information
technology for efficient data processing in
cloudbased malware detection systems in critical
information infrastructure.</p>
    </sec>
    <sec id="sec-2">
      <title>3. Information Technology Structure</title>
      <p>of Cloud-based Malware Detection</p>
    </sec>
    <sec id="sec-3">
      <title>System</title>
      <p>Studies of the process of collecting, storing,
and processing metadata in cloud-based malware
detection systems have shown that the overall
structure can be represented as a diagram in
Fig. 5.</p>
      <p>Let’s closely investigate the function of each
block.</p>
      <p>The data stream from the communication
channels arrives at the telecommunications
adapter (network application), the main task of
which is to separate individual applications from
the data stream and form files (control transfer
commands) for processing in the software client,
as well as the smooth transfer of metadata to the
communication channel of the ICT.</p>
      <p>HTTP
Email
Media
P2P
IM
Control
transfer
command to
software client</p>
      <p>The adapter</p>
      <p>Files
Control Command Software client</p>
      <p>Files arneFasiullyelstiss</p>
      <p>Secure files</p>
      <p>Suspicious files
The metadata</p>
      <p>File analyzer</p>
      <p>Metadata maker</p>
      <p>Metadata transfer unit</p>
      <p>The metadata transfCeornctormolmand
Metadata analyzer (software server) Malicious software signatures
Malicious software archive</p>
      <p>The software client is a module that resides on
the client's computer and is designed to organize
the interaction between the hardware and software
components of the system, present suspicious files
to the metadata generator, and present the results
of the cloud-based malware detection system in a
convenient format (creating tables, graphs, charts,
etc.). The software client is functionally linked to
the file analyzer, which is a software package
designed to perform pre-signature and heuristic
analysis (comparison with established
benchmarks, checking the validity of values, etc.)
on the client side of the system.</p>
      <p>The metadata generator is designed to extract
special signatures from suspicious files using
modern file hashing tools. The special signatures
are transferred to the communication channel of
the ICT network via the adapter described above.
The transmission in the ICT network through
intermediate switching nodes (metadata transfer
unit) is carried out according to known protocols
and advanced methods of information traffic
management.</p>
      <p>The cloud-based metadata analyzer identifies
threats, checks the quality of the decisions made
for errors, and then looks for sources of threat
propagation. Found sources are also automatically
validated to ensure there are no false positives.
Information about newly discovered threats and
their sources is immediately added to the malware
archive and made available to all other users of the
product.</p>
      <p>Malware data is used to train the metadata
analyzer, allowing it to quickly respond to the latest
malware developments and automatically detect
active threats on users’ computers. Infection
information used for self-learning includes
signature-based and heuristic detection results.</p>
      <p>The cloud protection system collects and
processes suspicious activity data from every
member of the network, providing a powerful
expert system for analyzing cybercriminal
activity. The data needed to block an attack on a
user’s machine is shared across the cloud network,
preventing further infections.</p>
      <p>Studies have shown that the implementation of
multi-user distributed applications requires the
provision of a socket interface.</p>
      <p>
        A socket is one of the ways that computers
transfer data and share information. Sockets are
the software endpoints of a network connection.
To work with sockets, it is necessary to use a
protocol based on TCP/IP and Windows transport
layer program port. There are three main types of
sockets [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Client-side sockets initialize a
clientside connection to a server-side socket on a
remote computer. To open the connection, the
client socket must “know” the IP address of the
remote machine and the port number used by the
server socket. The client sends a connection
request to the server. Server sockets themselves
do not connect to client sockets. This task is
performed by listening sockets embedded in the
server sockets. A new client connection request is
received by the listening socket, which places it in
a queue. When the server socket is released from
its current job, it processes the request from the
queue and creates a listening socket for the new
connection. Server sockets connect to a client
socket in response to its request. The client socket
receives a description of the server socket, after
which the connection is considered established
[
        <xref ref-type="bibr" rid="ref10 ref11">10–11</xref>
        ].
      </p>
      <p>Below is a mathematical formalization of the
technology of metadata transfer and processing in
cloud-based malware detection systems, and the
main temporal characteristics of these processes.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Assessing Metadata Processing Time</title>
      <p>in a Cloud-Based Malware Detection</p>
    </sec>
    <sec id="sec-5">
      <title>Analyzer</title>
      <p>The time of metadata processing in the cloud
analyzer is defined by finding the sum of a random
number of independent random variables 1, 2 ,...
with the same distribution F and the derivative
function of moments M (s). Let N be an integer
random variable with a derivative function
A(s) =  Pi si and independent of all of the  j .
Then, the random sum of 1 + ... +  N has the
distribution described by the derivative function
of moments
 (s) = W (M (s)),
(1)
where W (s) is a derivative function which
describes the random number of metadata items
requested by the software client, M (s) and is a
derivative function of moments which describes
the random processing time per metadata item.</p>
      <p>Let’s consider the method of calculating the
processing time when the number of metadata
elements requested by the program client is
described by a uniform distribution with integer
values. The number of parameters in the task can
vary from h to l . The derivative function of the
moments of this distribution, considering that all
events are equiprobable with the value p , is equal to
M (s) = p(ehs + e(h+1)s + ... + e(l−1)s + els ) =
=
( p(ehs − e(l+1)s ))
(1 − es )
.</p>
      <p>The derivative function of this distribution is
W (s) =
( p(sh − s(l +1) ))
(1 − s)</p>
      <p>To estimate the random processing time of a
metadata item, a uniform continuous distribution
with parameters a and b must be used Then,
according to c (1)  (s) can be calculated as
  eas − ebs h  eas − ebs l +1 
   −   
 (s) = p   (a − b)s  eas −(eabs− b)s  . (2)
 1 − 
 (a − b)s </p>
      <p>By differentiating  (s) concerning s and
setting it equal to zero in the resulting expressions,
the first and second moments 1 ,  2 concerning
the origin are obtained, which correspond to the
mean ts and the variance D of the processing time
of a single metadata element transmitted at the
request of the software client:
1 = tc(po) = (s(s)) s=0 = (h + l )4(a + b) , (3)
2
 =
s=0 
J (o) = 2 − 12 = (s(2s)) s=0 −  (s(s)) (4)
(h + l )(b − a)2
= ,</p>
      <p>
        24
in the case when a metadata analyzer performs
processing of files of different, independent
information flows, the number of software client
requirements for formation, analysis, and
processing of control commands can be described
by the Poisson distribution [
        <xref ref-type="bibr" rid="ref12 ref13 ref14">12–14</xref>
        ].
      </p>
      <p>In such a case, the derivative function of the
Poisson distribution will be as follows:</p>
      <p>W (s) = e s− .</p>
      <p>Hence, the derivative function of the time
moments of the formation of control commands
and the execution of the task of the client program
is equal to the:
 − + eas −ebs 
 
 (s) = e (a−b)s  .
(5)</p>
      <p>From (5) the average execution time of the
control command generation task and its variance
can be found:
tc(pф) =
 (a + b)
2</p>
      <p>,
J (ф) =  (a2 + ab + b2 )</p>
    </sec>
    <sec id="sec-6">
      <title>5. The Model Simulation Results and</title>
    </sec>
    <sec id="sec-7">
      <title>Discussion</title>
      <p>Let’s analyze the mutual influence of the time
characteristics given in (2), (4), (6), and (7) on the
total processing time of metadata and the
formation of control commands.</p>
      <p>Fig. 6 shows graphs of the total time tcp (s)
(Graph 1) and metadata processing time tc(po) (s)
(Graph 2) (Fig. 4 a-b) as well as graphs of jitter
D(s) of total time—(Graph 1) and metadata
processing time D(o) (s) —(Graph 2) in conditions
when</p>
      <p>a = 0, 4; b = 0,7; h = 0,3; l = 1; p = 0, 3;
 =1200.</p>
      <p>The graphs show that considering the temporal
characteristics of the formation of control signals
will increase the accuracy of the results of the
evaluation of temporal characteristics to 1.7 times,
and the characteristics of jitter to 4.5 times.</p>
      <p>
        Therefore, a mathematical model of ICT was
developed and studied, which allows the
evaluation of temporal characteristics of the
processing of a metadata element and generation
of a control command. The peculiarity of the
model is that it considers the necessity of forming
control transfer commands to the ICT software
client, which generally increases the accuracy of
the mathematical modeling results in the
considered conditions [
        <xref ref-type="bibr" rid="ref15 ref16 ref17 ref18 ref19 ref20 ref21">15–21</xref>
        ].
a)
      </p>
      <p>In most cases, the probability density
distribution of the processing time for a single
metadata element and the generation of a control
command has a single mode. Formulas (2) and (6)
can be used to pre-estimate the spread of the
distribution based on the “three sigma” rule. At
the same time, the need to take into account the
factors mentioned at the beginning of the article
requires the development of more complex
models, for which the authors will use the GERT
structure graph approach in the future.</p>
      <p>This will optimize the structure of the metadata
creation, transmission, and processing system, as
well as the formation of control transfer
commands, and evaluate its performance and
scalability when increasing the volume and
complexity of the tasks to be solved.</p>
      <p>
        It can provide cybersecurity [
        <xref ref-type="bibr" rid="ref22 ref23 ref24 ref25">22–25</xref>
        ] from the
viewpoint of malware detection and prevention.
This is only one side (subdomain) of cybersecurity
[
        <xref ref-type="bibr" rid="ref26 ref27 ref28">26–28</xref>
        ].
      </p>
    </sec>
    <sec id="sec-8">
      <title>6. Conclusions</title>
      <p>The study analyzes the existing approaches to
malware detection in the cloud environment,
summarized according to the following criteria:
clarity of formalization, flexibility and versatility,
ability to self-learn and improve, detection
accuracy, and experimental validation.</p>
      <p>It is found that all the above studies are to
identify malware by increasing the detection rate
while reducing the misclassification rate. And
while each detection method has its advantages
and works better for certain datasets in a cloud
environment, none of them can detect 100% of
malware.</p>
      <p>In this study, the information technology
model for efficient data processing in cloud-based
malware detection systems was developed, which
considers the need to formulate commands for
transferring control to the ICT software client.</p>
      <p>In addition, a study of the probabilistic and
temporal characteristics of algorithms and
programs for generating and processing metadata
in a cloud-based malware detection system was
conducted. This allowed for increasing the
accuracy of the results of estimation of time
characteristics by up to 1.7 times and jitter
characteristics by up to 4.5 times.</p>
    </sec>
    <sec id="sec-9">
      <title>7. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Mid-Year Update</surname>
          </string-name>
          :
          <source>2022 SonicWall Cyber Threat Report</source>
          , 39 p.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Ö.</given-names>
            <surname>Aslan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ozkan-Okay</surname>
          </string-name>
          and
          <string-name>
            <given-names>D.</given-names>
            <surname>Gupta</surname>
          </string-name>
          ,
          <source>Intelligent Behavior-Based Malware Detection System on Cloud Computing Environment, IEEE Access 9</source>
          (
          <year>2021</year>
          ). doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2021</year>
          .3087316
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>F.</given-names>
            <surname>Xiao</surname>
          </string-name>
          , et al.,
          <source>Malware Detection Based on Deep Learning of Behavior Graphs, Math. Probls. Eng</source>
          . (
          <year>2019</year>
          ). doi:
          <volume>10</volume>
          .1155/
          <year>2019</year>
          /8195395
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>K.</given-names>
            <surname>Bobrovnikova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Denysyuk</surname>
          </string-name>
          ,
          <article-title>Method of Detecting Malicious Software by Analyzing Network Traffic and Software Behavior in Computer Systems</article-title>
          , Bull. Khmelnytskyi Natl.
          <source>Univ. 1</source>
          (
          <issue>4</issue>
          ) (
          <year>2020</year>
          )
          <fpage>7</fpage>
          -
          <lpage>11</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Q.K.A.</given-names>
            <surname>Mirza</surname>
          </string-name>
          , I. Awan,
          <string-name>
            <given-names>M.</given-names>
            <surname>Younas</surname>
          </string-name>
          ,
          <article-title>A Cloud-Based Energy Efficient Hosting Model for Malware Detection Framework</article-title>
          ,
          <source>IEEE Global Communications Conference (GLOBECOM)</source>
          ,
          <year>2018</year>
          ,
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>W.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A</given-names>
            <surname>Cloud-Assisted Malware</surname>
          </string-name>
          Detection and
          <article-title>Suppression Framework for Wireless Multimedia System in IoT Based on Dynamic Differential Game</article-title>
          , China Commun.
          <volume>15</volume>
          (
          <issue>2</issue>
          ) (
          <year>2018</year>
          )
          <fpage>209</fpage>
          -
          <lpage>223</lpage>
          . doi:
          <volume>10</volume>
          .1109/CC.
          <year>2018</year>
          .8300282
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>P.</given-names>
            <surname>Indirapriyadarsini</surname>
          </string-name>
          , et al.,
          <source>Malware Detection Using Machine Learning and Cloud Computing, Int. J. Res. Appl. Sci. Eng</source>
          . Technol.
          <volume>8</volume>
          (
          <issue>6</issue>
          ) (
          <year>2020</year>
          )
          <fpage>101</fpage>
          -
          <lpage>104</lpage>
          . doi:
          <volume>10</volume>
          .22214/ijraset.
          <year>2020</year>
          .6015
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>D.</given-names>
            <surname>Deyannis</surname>
          </string-name>
          , et al.,
          <source>TrustAV: Practical and Privacy Preserving Malware Analysis in the Cloud, 10th ACM Conference on Data and Application Security and Privacy</source>
          ,
          <year>2020</year>
          ,
          <fpage>39</fpage>
          -
          <lpage>48</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>S.</given-names>
            <surname>Mondal</surname>
          </string-name>
          , et al.,
          <source>An Improved Methodology for High Frequency Socket Performance Characterization</source>
          ,
          <source>2022 IEEE 31st Conference on Electrical Performance of Electronic Packaging and Systems (EPEPS)</source>
          , San Jose, CA, USA,
          <year>2022</year>
          ,
          <fpage>1</fpage>
          -
          <lpage>3</lpage>
          , doi:10.1109/EPEPS53828.
          <year>2022</year>
          .9947155
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>M.</given-names>
            <surname>Rokonuzzaman</surname>
          </string-name>
          , et al.,
          <article-title>Design and Implementation of an IoT-Enabled Smart Plug Socket for Home Energy Management</article-title>
          ,
          <source>2021 5th International Conference on Smart Grid and Smart Cities (ICSGSC)</source>
          , Tokyo, Japan,
          <year>2021</year>
          ,
          <fpage>50</fpage>
          -
          <lpage>54</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICSGSC52434.
          <year>2021</year>
          .9490420
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>R.C.</given-names>
            <surname>Ooi</surname>
          </string-name>
          et al.,
          <string-name>
            <surname>High Density Interconnect (HDI) Socket</surname>
            <given-names>Flow &amp; Waprage</given-names>
          </string-name>
          <string-name>
            <surname>Prediction</surname>
          </string-name>
          &amp; Characterization,
          <source>2022 IEEE 24th Electronics Packaging Technology Conference (EPTC)</source>
          , Singapore, Singapore,
          <year>2022</year>
          ,
          <fpage>632</fpage>
          -
          <lpage>638</lpage>
          . doi:
          <volume>10</volume>
          .1109/EPTC56328.
          <year>2022</year>
          .10013256
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , et al.,
          <source>Research and Analysis about the Length of Vertex-Degree Sequence of Complex Networks with Poisson Distribution</source>
          ,
          <source>2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)</source>
          , Guangzhou, China,
          <year>2017</year>
          ,
          <fpage>28</fpage>
          -
          <lpage>31</lpage>
          . doi:
          <volume>10</volume>
          .1109/CSE-EUC.
          <year>2017</year>
          .16
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>A</given-names>
            <surname>Poisson Process</surname>
          </string-name>
          <article-title>Model for Monte Carlo</article-title>
          , Perturbations, Optimization, and Statistics, MIT Press, (
          <year>2017</year>
          )
          <fpage>193</fpage>
          -
          <lpage>231</lpage>
          . doi:
          <volume>10</volume>
          .7551/mitpress/10761.003.0008
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>D.K.</given-names>
            <surname>Sharma</surname>
          </string-name>
          , et al.,
          <source>An Efficient Python Approach for Simulation of Poisson Distribution</source>
          ,
          <source>2021 7th International Conference on Advanced Computing and Communication Systems</source>
          , Coimbatore, India,
          <year>2021</year>
          ,
          <fpage>2011</fpage>
          -
          <lpage>2014</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICACCS51430.
          <year>2021</year>
          .9441895
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>O.</given-names>
            <surname>Solomentsev</surname>
          </string-name>
          , et al.,
          <source>Data Processing in Case of Radio Equipment Reliability Parameters Monitoring</source>
          ,
          <source>2018 Advances in Wireless and Optical Communications (RTUWO)</source>
          ,
          <year>2018</year>
          ,
          <fpage>219</fpage>
          -
          <lpage>222</lpage>
          . doi:
          <volume>10</volume>
          .1109/RTUWO.
          <year>2018</year>
          .8587882
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>O.C.</given-names>
            <surname>Okoro</surname>
          </string-name>
          , et al.,
          <source>Optimization of Maintenance Task Interval of Aircraft Systems, Int. J. Comput. Netw. Inf. Secur</source>
          .
          <volume>14</volume>
          (
          <issue>2</issue>
          ) (
          <year>2022</year>
          )
          <fpage>77</fpage>
          -
          <lpage>89</lpage>
          . doi:
          <volume>10</volume>
          .5815/ijcnis.
          <year>2022</year>
          .
          <volume>02</volume>
          .07
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>J.</given-names>
            <surname>Al-Azzeh</surname>
          </string-name>
          , et al.,
          <article-title>A Method of Accuracy Increment Using Segmented Regression</article-title>
          , Algorithms,
          <volume>15</volume>
          (
          <issue>10</issue>
          )
          <fpage>378</fpage>
          (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>24</lpage>
          . doi:
          <volume>10</volume>
          .3390/a15100378
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>F.</given-names>
            <surname>Kipchuk</surname>
          </string-name>
          , et al.,
          <article-title>Assessing Approaches of IT Infrastructure Audit</article-title>
          .
          <source>In 2021 IEEE 8th International Conf. on Problems of Infocom-munications, Science and Technology (PICST)</source>
          ,
          <year>2021</year>
          . doi:
          <volume>10</volume>
          .1109/picst54195.
          <year>2021</year>
          .9772181
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>V.</given-names>
            <surname>Grechaninov</surname>
          </string-name>
          , et al.,
          <article-title>Decentralized Access Demarcation System Construction in Situational Center Network</article-title>
          , Workshop on Cybersecur.
          <source>Provid. Inf. Telecommun. Syst. II</source>
          ,
          <volume>3188</volume>
          (
          <issue>2</issue>
          ), (
          <year>2022</year>
          )
          <fpage>197</fpage>
          -
          <lpage>206</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>O.</given-names>
            <surname>Solomentsev</surname>
          </string-name>
          , et al.,
          <source>Sequential Procedure of Changepoint Analysis During Operational Data Processing</source>
          ,
          <source>2020 IEEE Microwave Theory and Techniques in Wireless Communications</source>
          ,
          <year>2020</year>
          ,
          <fpage>168</fpage>
          -
          <lpage>171</lpage>
          , doi:10.1109/MTTW51045.
          <year>2020</year>
          .9245068
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>O.</given-names>
            <surname>Solomentsev</surname>
          </string-name>
          , et al.,
          <source>Data Processing Method for Deterioration Detection During Radio Equipment Operation</source>
          ,
          <source>2019 IEEE Microwave Theory and Techniques in Wireless Communications (MTTW)</source>
          ,
          <year>2019</year>
          ,
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          , doi:10.1109/MTTW.
          <year>2019</year>
          .8897232
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>V.</given-names>
            <surname>Grechaninov</surname>
          </string-name>
          , et al.,
          <source>Formation of Dependability and Cyber Protection Model in Information Systems of Situational Center, Workshop on Emerging Technology Trends on the Smart Industry and the Internet of Things</source>
          ,
          <volume>3149</volume>
          (
          <year>2022</year>
          )
          <fpage>107</fpage>
          -
          <lpage>117</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          , et al.,
          <article-title>New Secure Block Cipher for Critical Applications: Design, Implementation, Speed</article-title>
          and
          <string-name>
            <given-names>Security</given-names>
            <surname>Analysis</surname>
          </string-name>
          ,
          <source>Advances in Intelligent Systems and Computing</source>
          ,
          <volume>1126</volume>
          (
          <year>2020</year>
          )
          <fpage>93</fpage>
          -
          <lpage>104</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <surname>M. TajDini</surname>
            , V. Sokolov,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Skladannyi</surname>
          </string-name>
          ,
          <article-title>Performing Sniffing and Spoofing Attack Against ADS-B and Mode S using Software Define Radio</article-title>
          ,
          <source>International Conf. on Information and Telecommunication Technologies and Radio Electronics</source>
          ,
          <year>2021</year>
          . doi:
          <volume>10</volume>
          .1109/ukrmico52950.
          <year>2021</year>
          .9716665
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Skladannyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Hulak</surname>
          </string-name>
          ,
          <article-title>Stability Verification of Self-Organized Wireless Networks with Block Encryption</article-title>
          ,
          <source>Workshop on Cybersecurity Providing in Information and Telecommunication Systems</source>
          ,
          <volume>3137</volume>
          (
          <year>2022</year>
          )
          <fpage>227</fpage>
          -
          <lpage>237</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          ,
          <source>Critical Aviation Information Systems Cybersecurity</source>
          ,
          <article-title>Meeting Security Challenges Through Data Analytics and Decision Support, NATO Science for Peace</article-title>
          and Security Series,
          <string-name>
            <surname>D</surname>
          </string-name>
          : Information and
          <string-name>
            <given-names>Communication</given-names>
            <surname>Security</surname>
          </string-name>
          . IOS Press Ebooks,
          <volume>47</volume>
          (
          <issue>3</issue>
          ) (
          <year>2016</year>
          )
          <fpage>308</fpage>
          -
          <lpage>316</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>R.</given-names>
            <surname>Odarchenko</surname>
          </string-name>
          , et al.,
          <source>Improved Method of Routing in UAV Network, Proceedings of the 2015 IEEE 3rd International Conference on Actual Problems of Unmanned Aerial Vehicles Developments (APUAVD)</source>
          , Kyiv, Ukraine, October
          <volume>13</volume>
          -
          <issue>15</issue>
          ,
          <issue>1</issue>
          ,
          <year>2015</year>
          ,
          <fpage>294</fpage>
          -
          <lpage>297</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>B.</given-names>
            <surname>Alsulami</surname>
          </string-name>
          , et al.,
          <article-title>Lightweight behavioral malware detection for windows platforms</article-title>
          ,
          <source>12th International Conference on Malicious and Unwanted Software</source>
          , Fajardo,
          <string-name>
            <surname>PR</surname>
          </string-name>
          , USA,
          <year>2017</year>
          ,
          <fpage>75</fpage>
          -
          <lpage>81</lpage>
          . doi:
          <volume>10</volume>
          .1109/MALWARE.
          <year>2017</year>
          .
          <volume>8323959</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>