<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Analysis of the Use of Information Resources of the Aggressor Country by the University Educational Process Participants in 2021-2023</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Dmytro Tarasov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Maria Komova</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Lviv Polytechnic National University</institution>
          ,
          <addr-line>Stepana Bandery Srt. 12, Lviv, 79013</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>An analysis of the activity of the use of the aggressor country's information resources by university educational process participants in 2021-2023 was carried out. Changes in the use of various resources before and after Russia's large-scale military attack on Ukraine are determined. Threats of using Russian information resources and data exchange systems are analyzed using Telegram as an example.</p>
      </abstract>
      <kwd-group>
        <kwd>1 website traffic analysis</kwd>
        <kwd>traffic sources</kwd>
        <kwd>Russian aggression</kwd>
        <kwd>traffic sources</kwd>
        <kwd>referrals</kwd>
        <kwd>information security</kwd>
        <kwd>university E-Learning System</kwd>
        <kwd>Telegram</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>The VNS system on the Moodle platform is actively used throughout the academic year 2021-2023.
VNS (https://vns.lpnu.ua/) users are all teachers and students of the Lviv Polytechnic National
University. The total number of VNS users exceeds 30,000.</p>
      <p>Google Analytics was used to obtain information about visits to the VNS website, count the number
of user sessions, and analyze the sources of transitions [14. 23]. Google Analytics statistics do not
include traffic from robots, crawlers, and other technical traffic to the VNS website.</p>
      <p>
        For comparison, the indicator of the share of the number of sessions [2, 11] to the total number of
users’ sessions and the change of these indicators during three periods was used:
1. “I semester”. Academic year 2021/22 Fall semester (before the full-scale invasion of 2022).
Sample behavior of VNS users before a full-scale intrusion.
2. “II semester”. Corresponding autu
        <xref ref-type="bibr" rid="ref7">mn term academic year 2022</xref>
        /23 (6 months after the
fullscale invasion of 2022).
3. “III semester”. Spring Se
        <xref ref-type="bibr" rid="ref7">mester academic year 2022</xref>
        /23 (11 months after full-scale invasion).
For the convenience of analysis, the visitors' transitions sources were grouped into:
 direct transfer (or no established transfer source);
 browser hijackers (or search plugins);
 group work and communication tools;
 tools for education and performing (distribution) of assignments;
 translation tools;
 educational, scientific sites;
 portal ukr.net;
 email;
 search engines (except Russian);
 websites of the university and divisions;
 social networks;
 Russian Internet resources;
 resources controlled by Russia – the Telegram messenger;
 other sites.
      </p>
      <p>For further analysis, it is important to determine the means of communication used by users and the
information resources from which users go to VNS.</p>
      <p>More than 57% of user transitions to the VNS website do not have information about the external
source of the transition (references). Most of them are direct transitions or transitions with missing
information about the source.</p>
      <p>Other options for hiding information about the source of transitions are:
 determining that source is a Proxy address, VPN, browser manufacturer's site, local network
address, etc.;
 identification that source is a Browser hijacker or it`s search engines;
 identification that source is a technical address related to cyber attacks.</p>
      <p>The distribution of unknown and hidden sources is shown in Table 1.</p>
    </sec>
    <sec id="sec-2">
      <title>Use of various sources by VNS users</title>
      <p>Let's consider the sources of transitions to the VNS website from identified sites, means of
communication (mail systems, messengers, social networks, etc.), and means of e-learning and group
work.</p>
      <p>The diagram (Fig. 2.) shows the shares of the number of VNS users sessions for which the transition
sources were various sites during three semesters. Search engines, direct links, local network addresses,
etc. are excluded from the data in Fig. 2.</p>
      <p>More than 61% of the sessions in Fig. 2. started after the transition from university sites, more than
13% from the Telegram messenger controlled by Russian representatives, 8.67% from e-mail services,
and 1.85% from Russian sites and systems excluding Telegram.</p>
      <p>
        The diagram (Fig. 3.) compares the number of sessions with defined user transitions during
particular semesters o
        <xref ref-type="bibr" rid="ref1">f 2021</xref>
        -2023 (excluded transitions from the university website and university
divisions).
      </p>
      <p>Taking into account the transitions of the university website and university divisions, the dynamics
of changes in the frequency of various transitions sources use over three semesters is presented in
Table 3.
5,23</p>
      <p>Resources
controlled by
Russia (Telegram)</p>
      <p>Websites of
teachers and
students</p>
    </sec>
    <sec id="sec-3">
      <title>3. Popular Russian resources and services are identified</title>
      <p>While the usage of Russian sites in Ukraine is gradualy decreasing, the growth of Telegram use is a
reason to concern about.</p>
      <p>The following sources are attributed to Telegram resources in the received transition data:
transitions from mobile clients, desktop version of Telegram, and web version;
transitions from unofficial and alternative clients;
transitions from the telegra.ph blog platform developed for Telegram.</p>
      <p>The following domains were used to identify transitions:
 “web.tlgrm.app”
 “web.telegram.org”
 “telegra.ph”
 “webz.telegram.org”
 “т.online”
 “телеграм.онлайн”
 “webogram.ru”
Other Russian sites and means of communication identified in the study include:
 Yandex search engine and portal resources (yandex search sites from UA, RU and other
national domains);
 Yandex email system;
 Email and sites of the domain *.mail.ru;
 Site top-page.ru;
 Vkontakte social network (website vk.com).</p>
      <p>The study also found a small number of transitions from other sites in the RU and SU domains.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Risks of using Telegram</title>
      <p>The study found that Telegram is the most popular communication service for sharing links to
educational materials among university students and teachers. Even university corporate services
(Email and MS Teams) are not used as actively as Telegram for exchanging links to educational
materials and VNS resources.</p>
      <p>Telegram's popularity increased after the Russian attack in 2022. Unfortunately, this popularity is a
general trend in Ukraine.</p>
      <p>The Telegram owner and team are formally independent of the government and the Russian
Federation and call themselves an independent international company. Researchers of Telegram's
development history and financing point to Telegram's dependence on Russian funding. The studies
also provide information on Telegram's possible cooperation with security organizations of the Russian
Federation (Federal Security Service, FSB, Federal Service for Supervision of Communications,
Information Technology and Mass Media, Roskomnadzor) [17. 19, 25].</p>
      <p>Telegram provides additional means of authenticating users and obtaining their biometric and
passport data [6].</p>
      <p>Security components of cryptographic protection and the MTProto protocol are discussed in [3, 6].
Researchers consider custom-designed encryption protocol MTProto to be a theoretical
vulnerability [16].</p>
      <p>System problems with data security in Telegram are presented in works [7, 20,24].
General issues of personal data protection of Telegram users are considered in [2, 4, 15].</p>
      <p>The problem for Ukraine is the spread of fake news and propaganda of violence against Ukrainians
in Telegram. Since 2014, Telegram has been regularly accused of promoting propaganda and
information manipulation, influencing Ukrainian politics [8, 26].</p>
      <p>The set of technical problems with the security of the Telegram platform and the facts given in the
literature about the concealment of Telegram's connections with the authorities of the aggressor country
indicate a risk for users of the university and Ukraine.</p>
      <p>The habit of using Telegram at the university further increases the risks for the personal data of
university graduates and the possibility of their manipulation by the aggressor country.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusions</title>
      <p>Russia's major aggression against Ukraine in February 2022 caused systemic social and technical
communication problems. Due to hostilities, forced migration, lack of electricity, and access to the
Internet, university students and teachers have changed information sources (communication
platforms). It is confirmed by change of the ways students access the educational materials (VNS
website).</p>
      <p>Analysis of the collected data shows the following trends after the full-scale invasion of Russia on
February 24, 2022:
 a significant change in the popularity of means of communication and typical Internet services
by users of the VNS;
 decrease of transitions from e-mail by 2.6 times (possibly due to competition with Telegram);
 growth in the use of educational tools by 2-3 times;
 growth of transitions from university sites by 6-6.2 times;
 a significant increase in the use of Telegram by 12-15 times;
 reduction of switching from other Russian services by 7.3 times.</p>
      <p>Positive trends are an increase in the use of university resources, teachers, or specialized
communication systems in which classes are held. Also, the good news is the decrease in the use of
Russian sites and services as search engines and means of exchanging links or information.</p>
      <p>A negative trend is a significant increase in the use of Telegram services in Ukraine and the
educational environment. The Telegram platform is considered as system with significant risks for user
information and flaws in encryption algorithms. Telegram is also accused of having ties with the
authorities of the aggressor country and concealing funding.</p>
    </sec>
    <sec id="sec-6">
      <title>6. References</title>
      <p>
        [1] A. Andrukhiv, D. Tarasov, M. Sokil, The system of information providing of educational
process in university, in: Proceedings of the 13th International Conference on Modern Problems
of Radio Engineering, Telecommunications and Computer Science (TCSET), Lviv, Ukraine,
2016, pp. 828-830, doi: 10.1109/TCSET.2016.7452197.
[2] A. Peleschyshyn, R. Korzh, O. Trach, M. Tsiutsiura, Building of Information Activity
Management System of Higher Educational Establishment in the Social Environments of the
Internet, in; 2019 3rd International Conference on Advanced Information and Communications
Technolo
        <xref ref-type="bibr" rid="ref2">gies (AICT), 2019</xref>
        , pp. 58-61.
[3] B. Cogliati, J. Ethan, A. Jha, Subverting Telegram’s End-to-End Encryption, ToSC 1 (2023)
5–40.
[4] C. Bogos, R. Mocanu, E. Simion, A security analysis comparison between Signal, WhatsApp
and Telegra
        <xref ref-type="bibr" rid="ref8">m, Cryptology ePrint Archive, 2023</xref>
        , URL: https://eprint.iacr.org/2023/071.
[5] C. Rodríguez, R. Rodríguez, G. Moure, C. L. Pérez, Personalization of Moodle with the
integration of most used Web technologies in higher education, ITECKNE 16(1) ( 2019).
[6] D. Canellis, Telegram Passport is already drawing fire for not being secure enough, 2018. URL:
https://thenextweb.com/news/telegram-passport-passwords-crack.
[7] D. Manish, Telegram, stop calling Cloud Chats encrypted, let alone heavily encrypted, 2023.
      </p>
      <p>URL:
https://nixsanctuary.com/dear-telegram-stop-calling-cloud-chats-encrypted-let-aloneheavily-encrypted/.
[8] D. Plakhta, Telegram as a tool for political influence and manipulation, TV and Radio</p>
      <p>
        Journalism 19 (2020) 88–94. doi: http://dx.doi.org/10.30970/
        <xref ref-type="bibr" rid="ref12">trj.2020</xref>
        .19.2955.
[9] D. Tarasov, Determining the parameters of botfarm participants' profiles in social networks
[Vyznachennya parametriv profiliv uchasnykiv botoferm u sotsialʹnykh merezhakh], in:
Proceedings of the 11th International Acade
        <xref ref-type="bibr" rid="ref7">mic Conference ICS-2022</xref>
        , Lviv, 2022, pp.
174175.
[10]
[11]
[12]
[13]
[17]
[18]
[19]
[20]
[15]
[16]
[14]
[21]
[22]
[23]
      </p>
      <p>
        D. Tarasov, O. Peleschyshyn, Experience in solving the problems of overloading the
distance learning system during quarantine [Dosvid vyrishennya problem perenavantazhennya
systemy dystantsiynoho navchannya pid chas karantynu], in: Proceedings of the 10th
International Academic Con
        <xref ref-type="bibr" rid="ref1">ference ICS-2021</xref>
        , Lviv, 2021, pp. 118-119. [in Ukrainian]
      </p>
      <p>D. Tarasov, Z. Koval, M. Klymash, Efficiency evaluation of using social networks
application in the university e-learning system, CEUR Workshop Proceedings 2392 (2019)
1222.</p>
      <p>
        T. von Arx, G. Kenneth, G. Paterson, On the cryptographic fragility of the Telegram
ecosyste
        <xref ref-type="bibr" rid="ref8">m, in: Proceedings of the 2023</xref>
        ACM Asia Conference on Computer and
Co
        <xref ref-type="bibr" rid="ref8">mmunications Security, 2023</xref>
        , pp. 328-341.
      </p>
      <p>
        Tokar.ua, Cooperation with the FSB and servers in Russia - What's wrong with
Telegra
        <xref ref-type="bibr" rid="ref8">m (ENG sub.), 2023</xref>
        . URL: https://www.youtube.com/watch?v=0V67ADwFsPw.
      </p>
      <p>Y. Vinnichuk, How did a network of anonymous Telegram channels appear in Ukraine
[Yak v Ukraini ziavylasia sitka anonimnykh Telegram-kanaliv Dzherelo:
https://biz.censor.net/r3151221], 2019, URL: https://biz.censor.net.ua/resonance/3151221/
yak_v_ukran_zyavilasya_stka_anonmnih_ telegramkanalv. [in Ukrainian].</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <given-names>F.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <article-title>Sustainable Education through E-Learning:</article-title>
          <source>The Case Study of iLearn2.0, Sustainability</source>
          <volume>13</volume>
          (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <given-names>G.</given-names>
            <surname>Badea</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Popescu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Sterbini</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Temperini, Integrating Enhanced Peer Assessment Features in Moodle Learning Management System</article-title>
          , in: M.
          <string-name>
            <surname>Chang</surname>
          </string-name>
          et al. (Eds.),
          <source>Foundations and Trends in Smart Learning. Lecture Notes in Educational Technology</source>
          . Springer, Singapore,
          <year>2019</year>
          . https://doi.org/10.1007/
          <fpage>978</fpage>
          -981-13-6908-7_
          <fpage>19</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <given-names>I.</given-names>
            <surname>Domazet</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Simović</surname>
          </string-name>
          ,
          <article-title>The use of Google Analytics for measuring website performance of non-formal education institution</article-title>
          ,
          <source>in: Handbook of Research on Social and Organizational Dynamics in the Digital Era</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>483</fpage>
          -
          <lpage>498</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <given-names>J.</given-names>
            <surname>Deep</surname>
          </string-name>
          , Telegram Security: Is Telegram safe?
          <source>Why Crypto companies use Telegram</source>
          ,
          <year>2022</year>
          . URL: https://www.leapxpert.
          <article-title>com/telegram-security-is-telegram-safe-why-cryptocompanies-use-telegram/.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <given-names>J.</given-names>
            <surname>Leyden</surname>
          </string-name>
          ,
          <article-title>Multiple encryption flaws uncovered in Telegram messaging protocol</article-title>
          ,
          <year>2021</year>
          . URL: https://portswigger.net/daily-swig/
          <article-title>multiple-encryption-flaws-uncovered-intelegram-messaging-protocol.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <given-names>K.</given-names>
            <surname>Korsun</surname>
          </string-name>
          ,
          <article-title>Are Telegram and the Kremlin friends or just allies? [Telehram i kremlʹ - druzi chy prosto soyuznyky</article-title>
          ?],
          <year>2023</year>
          . URL: https://enigma.ua/articles/telegram
          <article-title>-i-kreml-druzichi-prosto-soyuzniki</article-title>
          . [in Ukrainian]
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <given-names>M.</given-names>
            <surname>Mujiono</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Fatimah</surname>
          </string-name>
          ,
          <article-title>Moodle integration intervention in EFL virtual classroom and academic flow on university students' achievement in writing</article-title>
          ,
          <source>Theory and Practice in Language Studies</source>
          <volume>12</volume>
          (
          <issue>10</issue>
          ) (
          <year>2022</year>
          )
          <fpage>2182</fpage>
          -
          <lpage>2190</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <given-names>M.</given-names>
            <surname>Tait</surname>
          </string-name>
          ,
          <article-title>Russia is spying on Telegram chats in occupied Ukrainian regions</article-title>
          .
          <source>Here's how</source>
          ,
          <year>2023</year>
          . URL: https://www.pwnallthethings.com/p/russia-is
          <article-title>-spying-on-telegram-chats.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <given-names>P.</given-names>
            <surname>Fernández-Álvarez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Ricardo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Rodríguez</surname>
          </string-name>
          ,
          <article-title>Extraction and analysis of retrievable memory artifacts from Windows Telegram Desktop application</article-title>
          ,
          <source>Forensic Science International: Digital Investigation</source>
          <volume>40</volume>
          (
          <year>2022</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <string-name>
            <given-names>P.</given-names>
            <surname>Vostinar</surname>
          </string-name>
          ,
          <article-title>Interactive course for JavaScript in LMS Moodle</article-title>
          ,
          <source>Proc. ICETA</source>
          (
          <year>2019</year>
          )
          <fpage>810</fpage>
          -
          <lpage>815</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <source>Security Analysis of Telegram (Symmetric Part)</source>
          ,
          <year>2023</year>
          . URL: https://mtpsym.github.io/.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <string-name>
            <given-names>T.</given-names>
            <surname>Semerádová</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Weinlich</surname>
          </string-name>
          ,
          <article-title>Using google analytics to examine the website traffic</article-title>
          ,
          <source>in: Website Quality and Shopping Behavior: Quantitative and Qualitative Evidence</source>
          , Springer,
          <year>2020</year>
          , pp.
          <fpage>91</fpage>
          -
          <lpage>112</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>