=Paper= {{Paper |id=Vol-3608/paper16 |storemode=property |title=Analysis of the Use of Information Resources of the Aggressor Country by the University Educational Process Participants in 2021-2023 |pdfUrl=https://ceur-ws.org/Vol-3608/paper16.pdf |volume=Vol-3608 |authors=Dmytro Tarasov,Maria Komova |dblpUrl=https://dblp.org/rec/conf/scia2/TarasovK23 }} ==Analysis of the Use of Information Resources of the Aggressor Country by the University Educational Process Participants in 2021-2023== https://ceur-ws.org/Vol-3608/paper16.pdf
                         Analysis of the Use of Information Resources of the Aggressor
                         Country by the University Educational Process Participants in
                         2021-2023
                         Dmytro Tarasov and Maria Komova
                         Lviv Polytechnic National University, Stepana Bandery Srt. 12, Lviv, 79013, Ukraine


                                       Abstract
                                       An analysis of the activity of the use of the aggressor country’s information resources by
                                       university educational process participants in 2021-2023 was carried out. Changes in the use
                                       of various resources before and after Russia's large-scale military attack on Ukraine are
                                       determined. Threats of using Russian information resources and data exchange systems are
                                       analyzed using Telegram as an example.

                                       Keywords 1
                                       website traffic analysis, traffic sources, Russian aggression, traffic sources, referrals,
                                       information security, university E-Learning System, Telegram

                         1. Introduction
                             After Russia's large-scale military attack on Ukraine, which began on February 24, 2022, the
                         technologies of Ukrainian users' work with Internet information resources and communication services
                         have changed significantly.
                             The use of Russian news sites by users from Ukraine is decreasing, and the percentage of Ukrainian-
                         language searches in search engines and youtube.com is increasing.
                             The purpose of the work is to investigate changes in the activity of using the information resources
                         of the aggressor country (Russia) by teachers and students of the Lviv Polytechnic National University.
                         The analysis of the use of Russian resources was carried out on the example of changes in the number
                         of transitions (sessions) of visitors to the Virtual Learning Environment of the Lviv Polytechnic
                         (VNS) [1, 9, 10] from other Internet resources.

                         2. Study of the activity of the use of various resources by the VNS users
                         2.1. General information about the sources of user transitions to the VNS
                         website
                             University e-learning system is an open source learning management system, with a focus on
                         development of the cooperation between university teachers and students. It is based on using the
                         Moodle platform. Moodle [12, 13, 18] system has a wide selection of functionality commonly found in
                         e-learning platforms, course management systems, learning management systems (LMS) or virtual
                         learning environments (VLE). The basic Moodle’s advantage is that this web service provides an
                         opportunity to create efficient websites for online learning [5, 10, 21].


                         SCIA-2023: 2nd International Workshop on Social Communication and Information Activity in Digital
                         Humanities, November 9, 2023, Lviv, Ukraine
                         EMAIL: dmytro.o.tarasov@lpnu.ua (D. Tarasov); mariia.v.komova@lpnu.ua (M. Komova)
                         ORCID: 0000-0002-7143-8558 (D. Tarasov); 0000-0002-4115-3690 (M. Komova)
                                    ©️ 2023 Copyright for this paper by its authors.
                                    Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
                                    CEUR Workshop Proceedings (CEUR-WS.org)



CEUR
                  ceur-ws.org
Workshop      ISSN 1613-0073
Proceedings
   The VNS system on the Moodle platform is actively used throughout the academic year 2021-2023.
VNS (https://vns.lpnu.ua/) users are all teachers and students of the Lviv Polytechnic National
University. The total number of VNS users exceeds 30,000.
   Google Analytics was used to obtain information about visits to the VNS website, count the number
of user sessions, and analyze the sources of transitions [14. 23]. Google Analytics statistics do not
include traffic from robots, crawlers, and other technical traffic to the VNS website.
   For comparison, the indicator of the share of the number of sessions [2, 11] to the total number of
users’ sessions and the change of these indicators during three periods was used:
   1. “I semester”. Academic year 2021/22 Fall semester (before the full-scale invasion of 2022).
   Sample behavior of VNS users before a full-scale intrusion.
   2. “II semester”. Corresponding autumn term academic year 2022/23 (6 months after the full-
   scale invasion of 2022).
   3. “III semester”. Spring Semester academic year 2022/23 (11 months after full-scale invasion).
   For the convenience of analysis, the visitors' transitions sources were grouped into:
        direct transfer (or no established transfer source);
        browser hijackers (or search plugins);
        group work and communication tools;
        tools for education and performing (distribution) of assignments;
        translation tools;
        educational, scientific sites;
        portal ukr.net;
        email;
        search engines (except Russian);
        websites of the university and divisions;
        social networks;
        Russian Internet resources;
        resources controlled by Russia – the Telegram messenger;
        other sites.




Figure 1: Share of transitions to the VNS website distribution. Popular sources for 3 semesters

   For further analysis, it is important to determine the means of communication used by users and the
information resources from which users go to VNS.
   More than 57% of user transitions to the VNS website do not have information about the external
source of the transition (references). Most of them are direct transitions or transitions with missing
information about the source.
   Other options for hiding information about the source of transitions are:
      determining that source is a Proxy address, VPN, browser manufacturer's site, local network
   address, etc.;
      identification that source is a Browser hijacker or it`s search engines;
      identification that source is a technical address related to cyber attacks.
   The distribution of unknown and hidden sources is shown in Table 1.

Table 1
Various undefined transition sources (source types)
                           Source types                       Transitions, %
                              Direct                              57,07
                        Browser hijackers                         0,12
                     Local network addresses                      0,06
                            Short links                           0,02
                           Cyberattack                            0,02
                      Proxy, VPN, браузери                        0,01
                               Total                              57,30



2.2.    Use of various sources by VNS users
   Let's consider the sources of transitions to the VNS website from identified sites, means of
communication (mail systems, messengers, social networks, etc.), and means of e-learning and group
work.
   The diagram (Fig. 2.) shows the shares of the number of VNS users sessions for which the transition
sources were various sites during three semesters. Search engines, direct links, local network addresses,
etc. are excluded from the data in Fig. 2.
   More than 61% of the sessions in Fig. 2. started after the transition from university sites, more than
13% from the Telegram messenger controlled by Russian representatives, 8.67% from e-mail services,
and 1.85% from Russian sites and systems excluding Telegram.




Figure 2: Distribution of the VNS visitors sessions quantity during selected semesters for known
sources
  Detailed information on the total share of transitions from different resource types is given in
Table 2.

Table 2
Total share of transitions from different resource types
                                  Source type                         Transitions, %
                                 Site *.lpnu.ua                           3,72
                 Resources controlled by Russia (Telegram)                0,80
                                      Email                               0,52
                    Tools for education and performing                    0,39
                        (distribution) of assignments
                              Browser hijackers                            0,12
                              Russian resources                            0,11
                                Social networks                            0,11
                   Websites of the library and university                  0,08
                                 departments
                   Group work and communication tools                      0,06
                               Translation tools                           0,04
                                 Site *.ukr.net                            0,04
                    Websites of teachers and students                      0,02
                                 youtube.com                              <0,01
                                  Other sites                              0,03
                                      Total                                6,04

   The diagram (Fig. 3.) compares the number of sessions with defined user transitions during
particular semesters of 2021-2023 (excluded transitions from the university website and university
divisions).




Figure 3: Shares of the sessions quantity with defined user transitions in particular semesters
   Taking into account the transitions of the university website and university divisions, the dynamics
of changes in the frequency of various transitions sources use over three semesters is presented in
Table 3.

Table 3
The use of various transitions sources by VNS users
             Source type            I semester            II semester         III semester
            Site *.lpnu.ua              0,99                  5,90                 4,99
         Browser hijackers              0,26                  0,07                 0,02
             Cyberattack                 0                     0                   0,07
          Group work and                0,03                  0,11                 0,03
          communication
                 tools
               Tools for                0,19                 0,67                 0,36
           education and
             performing
          (distribution) of
             assignments
          Translation tools             0,03                 0,05                 0,05
              Other sites               0,06                 0,06                 0,04
            Site *.ukr.net              0,02                 0,06                 0,04
                 Email                  0,80                 0,43                 0,31
         Russian resources              0,22                 0,06                 0,03
         Russian resources              0,09                 1,35                 1,09
              - telegram
             Websites of                0,01                 0,01                 0,03
         teachers/students
          Social networks               0,11                 0,14                 0,08
                 Total                  2,81                 8,91                 7,14

   Among the popular resources of the type "Group work and communication tools" are instant
messengers, tools for sharing files, notes, URLs, messages, etc. This section does not include known
Russian resources. Examples of popular resources of the "Group work and communication tools":
       onenote
       skype
       trello
       keep google
       mindomo.com
       canva.com
       workona.com
       calendar.google.com
       getpocket.com
       wakelet.com
   The popular resources of the type "Tools for education and performing (distribution) of assignments"
include tools for video conferences, systems for conducting training, joint work with files (projects),
and distribution of educational content, tests, etc. This section does not include known Russian
resources. For example:
       Google classroom
       MS Teams
       Zoom
       youtube.com
       wps.com
        docs.google
        mubu.com
        feishu.cn
        wps.com
    Resources of type "Translation tools" include Google Translate and it’s tools embedded in websites.
    Popular resources of the type "Email" include E-Mail servers. This section does not include known
Russian resources. Example:
        Gmail
        QQ
        Ukr.net
    The Ukr.net service is mainly used by VNS visitors as a popular email postal service in Ukraine.
But *.ukr.net domain sites also provide access to file storage, news, etc.
    Popular resources of the "Social networks" type include such international social networks as:
        instagram
        facebook
        twitter
    Data in Fig. 3. and Table 3 demonstrate the change in the activity of using Internet services by users
during the 3 semesters of 2021-2023:
        gradual reduction of transitions from e-mail (shares of transitions – 0.8; 0.43; 0.31);
        gradual reduction of conversions from tools such as browser hijackers (share of conversions –
    0.26; 0.07; 0.02);
        a gradual reduction in conversions from Russian sites and systems except for Telegram (shares
    of conversions – 0.22; 0.06; 0.03);
        a significant increase in conversions from Telegram compared to the first semester (shares of
    conversions – 0.09; 1.35; 1.09);
        relative stability of the share of transitions from other classified sources, including social
    networks.
    The largest redistribution of user traffic occurs due to the increase in transitions from university
sites, and usage of Telegram and educational tools (Table 4).

Table 4
Sources with decreasing and increasing traffic for 2021-2023
         Sources with a        Difference, %           Difference, %           Sources with an
           decreasing                                                        increasing number
           number of                                                            of transitions
           transitions
                                                             4                 Site *.lpnu.ua
            Browser                -0,24
            hijackers
        Group work and               0
        communication
              tools
                                                            0,17            Tools for education
                                                                              and performing
                                                                             (distribution) of
                                                                               assignments
                                                              0,02           Translation tools
                                                              0,02             Site *.ukr.net
              Email                  -0,49
             Russian                 -0,19
            resources
                                                              1                Resources
                                                                              controlled by
                                                                            Russia (Telegram)
                                                             0,02              Websites of
                                                                              teachers and
                                                                                students
         Social networks             -0,03
           Other sites               -0,02
              Total                  -0,97                   5,23

3. Popular Russian resources and services are identified
   While the usage of Russian sites in Ukraine is gradualy decreasing, the growth of Telegram use is a
reason to concern about.
   The following sources are attributed to Telegram resources in the received transition data:
transitions from mobile clients, desktop version of Telegram, and web version;
transitions from unofficial and alternative clients;
transitions from the telegra.ph blog platform developed for Telegram.
   The following domains were used to identify transitions:
        “web.tlgrm.app”
        “web.telegram.org”
        “telegra.ph”
        “webz.telegram.org”
        “т.online”
        “телеграм.онлайн”
        “webogram.ru”
   Other Russian sites and means of communication identified in the study include:
        Yandex search engine and portal resources (yandex search sites from UA, RU and other
   national domains);
        Yandex email system;
        Email and sites of the domain *.mail.ru;
        Site top-page.ru;
        Vkontakte social network (website vk.com).
   The study also found a small number of transitions from other sites in the RU and SU domains.

4. Risks of using Telegram
   The study found that Telegram is the most popular communication service for sharing links to
educational materials among university students and teachers. Even university corporate services
(Email and MS Teams) are not used as actively as Telegram for exchanging links to educational
materials and VNS resources.
   Telegram's popularity increased after the Russian attack in 2022. Unfortunately, this popularity is a
general trend in Ukraine.
   The Telegram owner and team are formally independent of the government and the Russian
Federation and call themselves an independent international company. Researchers of Telegram's
development history and financing point to Telegram's dependence on Russian funding. The studies
also provide information on Telegram's possible cooperation with security organizations of the Russian
Federation (Federal Security Service, FSB, Federal Service for Supervision of Communications,
Information Technology and Mass Media, Roskomnadzor) [17. 19, 25].
   Telegram provides additional means of authenticating users and obtaining their biometric and
passport data [6].
    Security components of cryptographic protection and the MTProto protocol are discussed in [3, 6].
Researchers consider custom-designed encryption protocol MTProto to be a theoretical
vulnerability [16].
    System problems with data security in Telegram are presented in works [7, 20,24].
    General issues of personal data protection of Telegram users are considered in [2, 4, 15].
    The problem for Ukraine is the spread of fake news and propaganda of violence against Ukrainians
in Telegram. Since 2014, Telegram has been regularly accused of promoting propaganda and
information manipulation, influencing Ukrainian politics [8, 26].
    The set of technical problems with the security of the Telegram platform and the facts given in the
literature about the concealment of Telegram's connections with the authorities of the aggressor country
indicate a risk for users of the university and Ukraine.
    The habit of using Telegram at the university further increases the risks for the personal data of
university graduates and the possibility of their manipulation by the aggressor country.

5. Conclusions
   Russia's major aggression against Ukraine in February 2022 caused systemic social and technical
communication problems. Due to hostilities, forced migration, lack of electricity, and access to the
Internet, university students and teachers have changed information sources (communication
platforms). It is confirmed by change of the ways students access the educational materials (VNS
website).
   Analysis of the collected data shows the following trends after the full-scale invasion of Russia on
February 24, 2022:
        a significant change in the popularity of means of communication and typical Internet services
   by users of the VNS;
        decrease of transitions from e-mail by 2.6 times (possibly due to competition with Telegram);
        growth in the use of educational tools by 2-3 times;
        growth of transitions from university sites by 6-6.2 times;
        a significant increase in the use of Telegram by 12-15 times;
        reduction of switching from other Russian services by 7.3 times.
   Positive trends are an increase in the use of university resources, teachers, or specialized
communication systems in which classes are held. Also, the good news is the decrease in the use of
Russian sites and services as search engines and means of exchanging links or information.
   A negative trend is a significant increase in the use of Telegram services in Ukraine and the
educational environment. The Telegram platform is considered as system with significant risks for user
information and flaws in encryption algorithms. Telegram is also accused of having ties with the
authorities of the aggressor country and concealing funding.

6. References
    [1] A. Andrukhiv, D. Tarasov, M. Sokil, The system of information providing of educational
        process in university, in: Proceedings of the 13th International Conference on Modern Problems
        of Radio Engineering, Telecommunications and Computer Science (TCSET), Lviv, Ukraine,
        2016, pp. 828-830, doi: 10.1109/TCSET.2016.7452197.
    [2] A. Peleschyshyn, R. Korzh, O. Trach, M. Tsiutsiura, Building of Information Activity
        Management System of Higher Educational Establishment in the Social Environments of the
        Internet, in; 2019 3rd International Conference on Advanced Information and Communications
        Technologies (AICT), 2019, pp. 58-61.
    [3] B. Cogliati, J. Ethan, A. Jha, Subverting Telegram’s End-to-End Encryption, ToSC 1 (2023)
        5–40.
    [4] C. Bogos, R. Mocanu, E. Simion, A security analysis comparison between Signal, WhatsApp
        and Telegram, Cryptology ePrint Archive, 2023, URL: https://eprint.iacr.org/2023/071.
[5] C. Rodríguez, R. Rodríguez, G. Moure, C. L. Pérez, Personalization of Moodle with the
    integration of most used Web technologies in higher education, ITECKNE 16(1) ( 2019).
[6] D. Canellis, Telegram Passport is already drawing fire for not being secure enough, 2018. URL:
    https://thenextweb.com/news/telegram-passport-passwords-crack.
[7] D. Manish, Telegram, stop calling Cloud Chats encrypted, let alone heavily encrypted, 2023.
    URL: https://nixsanctuary.com/dear-telegram-stop-calling-cloud-chats-encrypted-let-alone-
    heavily-encrypted/.
[8] D. Plakhta, Telegram as a tool for political influence and manipulation, TV and Radio
    Journalism 19 (2020) 88–94. doi: http://dx.doi.org/10.30970/trj.2020.19.2955.
[9] D. Tarasov, Determining the parameters of botfarm participants' profiles in social networks
    [Vyznachennya parametriv profiliv uchasnykiv botoferm u sotsialʹnykh merezhakh], in:
    Proceedings of the 11th International Academic Conference ICS-2022, Lviv, 2022, pp. 174-
    175.
[10]         D. Tarasov, O. Peleschyshyn, Experience in solving the problems of overloading the
    distance learning system during quarantine [Dosvid vyrishennya problem perenavantazhennya
    systemy dystantsiynoho navchannya pid chas karantynu], in: Proceedings of the 10th
    International Academic Conference ICS-2021, Lviv, 2021, pp. 118-119. [in Ukrainian]
[11]         D. Tarasov, Z. Koval, M. Klymash, Efficiency evaluation of using social networks
    application in the university e-learning system, CEUR Workshop Proceedings 2392 (2019) 12-
    22.
[12]         F. Chen, Sustainable Education through E-Learning: The Case Study of iLearn2.0,
    Sustainability 13 (2021).
[13]         G. Badea, E. Popescu, A. Sterbini, M. Temperini, Integrating Enhanced Peer
    Assessment Features in Moodle Learning Management System, in: M. Chang et al. (Eds.),
    Foundations and Trends in Smart Learning. Lecture Notes in Educational Technology.
    Springer, Singapore, 2019. https://doi.org/10.1007/978-981-13-6908-7_19.
[14]         I. Domazet, V. Simović, The use of Google Analytics for measuring website
    performance of non-formal education institution, in: Handbook of Research on Social and
    Organizational Dynamics in the Digital Era, 2020, pp. 483-498.
[15]         J. Deep, Telegram Security: Is Telegram safe? Why Crypto companies use Telegram,
    2022. URL: https://www.leapxpert.com/telegram-security-is-telegram-safe-why-crypto-
    companies-use-telegram/.
[16]         J. Leyden, Multiple encryption flaws uncovered in Telegram messaging protocol,
    2021.      URL:     https://portswigger.net/daily-swig/multiple-encryption-flaws-uncovered-in-
    telegram-messaging-protocol.
[17]         K. Korsun, Are Telegram and the Kremlin friends or just allies? [Telehram i kremlʹ -
    druzi chy prosto soyuznyky?], 2023. URL: https://enigma.ua/articles/telegram-i-kreml-druzi-
    chi-prosto-soyuzniki. [in Ukrainian]
[18]         M. Mujiono, S. Fatimah, Moodle integration intervention in EFL virtual classroom and
    academic flow on university students’ achievement in writing, Theory and Practice in Language
    Studies 12(10) (2022) 2182-2190.
[19]         M. Tait, Russia is spying on Telegram chats in occupied Ukrainian regions. Here's how,
    2023. URL: https://www.pwnallthethings.com/p/russia-is-spying-on-telegram-chats.
[20]         P. Fernández-Álvarez, J. Ricardo, J. Rodríguez, Extraction and analysis of retrievable
    memory artifacts from Windows Telegram Desktop application, Forensic Science
    International: Digital Investigation 40 (2022).
[21]         P. Vostinar, Interactive course for JavaScript in LMS Moodle, Proc. ICETA (2019)
    810–815.
[22]         Security     Analysis     of     Telegram     (Symmetric      Part),   2023.     URL:
    https://mtpsym.github.io/.
[23]         T. Semerádová, P. Weinlich, Using google analytics to examine the website traffic, in:
    Website Quality and Shopping Behavior: Quantitative and Qualitative Evidence, Springer,
    2020, pp. 91-112.
[24]         T. von Arx, G. Kenneth, G. Paterson, On the cryptographic fragility of the Telegram
    ecosystem, in: Proceedings of the 2023 ACM Asia Conference on Computer and
    Communications Security, 2023, pp. 328-341.
[25]         Tokar.ua, Cooperation with the FSB and servers in Russia - What's wrong with
    Telegram (ENG sub.), 2023. URL: https://www.youtube.com/watch?v=0V67ADwFsPw.
[26]         Y. Vinnichuk, How did a network of anonymous Telegram channels appear in Ukraine
    [Yak v Ukraini ziavylasia sitka anonimnykh Telegram-kanaliv Dzherelo:
    https://biz.censor.net/r3151221], 2019, URL: https://biz.censor.net.ua/resonance/3151221/
    yak_v_ukran_zyavilasya_stka_anonmnih_ telegramkanalv. [in Ukrainian].