<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Methodology for local corporate network security based on a multi-level approach</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Valerii Dudykevych</string-name>
          <email>valerii.b.dudykevych@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Halyna Mykytyn</string-name>
          <email>halyna.v.mykytyn@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Taras Murak</string-name>
          <email>taras.murak.mkbst.2024@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Lviv Polytechnic National University</institution>
          ,
          <addr-line>Stepan Bandera Str.,12, Lviv, 79000</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The strategy of the EU Agency for Cybersecurity (ENISA) and Ukraine's Cybersecurity Strategy are aimed at developing and practically implementing new approaches, methodologies, and technologies in addressing cybersecurity challenges within the infrastructure of society, particularly in ensuring data confidentiality in corporate networks. An analytical review has been conducted on well-known methods and technologies for corporate network security in the following areas: secure data exchange and storage; enhancement of security models, security tools, and information protection systems; and the application of machine learning methods and neural network technologies for anomaly detection in corporate networks. A methodology for local corporate network (LCN) security based on a multi-level approach has been presented. This includes the seven-layer OSI model, the "defense-in-depth" model, and an integrated LCN security system within the "threat-security technologies" framework. This methodology is universal for diferent network topologies and enables the design of information security systems at each OSI layer in accordance with regulatory requirements. Software has been developed for cryptographic protection of information at the OSI transport network level based on the symmetric block algorithm AES-256, using the Python programming language. This is practically implemented through the OpenVPN protocol and TLS transport layer technology, ensuring a high level of information confidentiality in local corporate networks.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;corporate network</kwd>
        <kwd>security methodology</kwd>
        <kwd>multi-level approach</kwd>
        <kwd>OSI reference model</kwd>
        <kwd>"defense-in-depth" model</kwd>
        <kwd>integrated security system</kwd>
        <kwd>random and targeted threats</kwd>
        <kwd>transport layer</kwd>
        <kwd>data encryption</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Efective cooperation between Ukraine and the European Union in the field of cybersecurity, particularly
through the interaction of the State Service of Special Communications and Information Protection of
Ukraine, the National Cybersecurity Coordination Center, and the EU Agency for Cybersecurity (ENISA),
serves as a foundation for developing Ukraine-EU cyber dialogues. These eforts are specifically focused
on comprehensive counteraction to cyber threats and ensuring a high level of cyber resilience and
protection [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. A crucial aspect is the implementation of the EU NIS 2 Directive [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], which applies to
critical infrastructure companies and systems in sectors such as energy, transport, digital infrastructure,
ICT service management, environmental protection, healthcare, and space. Compliance with the
DSTU ISO/IEC 27001:2023 standard (Information Security, Cybersecurity, and Privacy Protection –
Information Security Management Systems – Requirements, ISO/IEC 27001:2022, IDT) introduces a
structured approach to cybersecurity. This helps Ukrainian companies operating in the EU market meet
the NIS 2 requirements regarding incident notification, corporate security policies, business continuity
planning, responsible partnership selection, multi-factor authentication, and cybersecurity training.
The progressive trends of the international cyberspace serve as a foundation for developing Ukraine-EU
cyber dialogues aimed at creating a universal cybersecurity platform. This platform is designed to
counter threats in the context of hybrid warfare, establish mechanisms for security implementation,
and integrate cutting-edge security technologies, including new approaches to securing local corporate
networks.
      </p>
      <p>
        In the study [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], a comprehensive security system for information networks is considered as one
of the levels of information technologies based on the "object–threat–protection" concept. Within
the framework of comprehensive corporate network security, study [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] examines network security
mechanisms and corresponding tools. Article [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] analyzes known threats and vulnerabilities in
information networks, methods of counteracting them, and proposes efective approaches to ensuring
the security of information and telecommunication networks using eficient vulnerability detection
methods. The enhancement of information protection systems in computer networks has been further
developed through the application of network firewalls such as "Fortigate" and "Cisco ASA" [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Network
security trends based on the OSI model have been explored in various works. Study [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] investigates
major attacks on the data link layer of computer networks and methods to neutralize them using Cisco
network equipment tools. Research in [
        <xref ref-type="bibr" rid="ref10 ref9">9, 10</xref>
        ] examines threats to computer networks at the physical,
data link, network, transport, and application layers, analyzing protection methods and technologies.
Study [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] provides a brief analysis of the use of machine learning methods and neural network
technologies for anomaly detection in corporate networks. Based on this analysis, a neural network-based
method utilizing LSTM and FFN architectures is proposed, along with an algorithmic and software
implementation for detecting software and technical impacts on critical infrastructure systems in the
context of cyber warfare. A comprehensive approach to the optimal selection of enterprise network
security systems, based on an objective comparison of various criteria and their impact on overall
security levels and protection reliability, is presented in [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. The authors of [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] describe the most
common Internet attack methods and other threats in modern computer networks, as well as highlight
contemporary Internet security technologies and network intrusion detection systems. In the field of
incident management and information security risk management, the work [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] examines an approach
to developing a management system that ensures the necessary control measures to prevent common
cyber threats in various infrastructure segments.
      </p>
      <p>In the realm of network security based on the Zero Trust model (CISA, Cybersecurity and
Infrastructure Security Agency), several key approaches have been proposed: A targeted trafic segmentation
method that enables analysis of interactions between applications, users, and corporate network
infrastructure, enhancing the detection of complex threats [15]; The "never trust, always verify" concept,
which requires users to confirm their credentials for every access request, whether inside or outside the
company’s network perimeter [16]. Efective security segments for computer systems and networks
include comprehensive protection of hardware and software, secure data exchange, and data storage
security through access control technologies, data encryption, and network isolation [17]. A notable
area of interest is the design of secure network architecture for manufacturing companies. Study [18]
explores the application of efective security technologies, such as firewalls and IDS, to enhance system
resilience. Modern network security trends encompass methods for detecting distributed network
attacks, software-defined networking (SDN), and machine learning techniques [ 19, 20]. In the field of
intrusion detection systems (IDS), a new approach based on a long short-term memory neural network
(p-LSTM) has been developed, reducing false alerts and improving detection reliability [21]. Security
approaches for LAN and WAN networks continue to evolve. Research has examined VPN application
scenarios in corporate WAN networks [22] and proposed the use of rfiewalls, obfuscation technologies,
and port forwarding to establish a robust security policy [23]. A novel risk assessment (RS) approach
has emerged, based on risk weighting in accordance with NIST CSF and ISA/IEC 62443 standards.
This approach modifies RS by introducing new risk metrics—risk, risk reduction, risk prioritization,
and risk reduction prioritization—to formulate a specialized probability model for assessing risks in
broadband WAN networks used in operational technology infrastructure [24]. A relevant segment in
the development of secure intellectualization of society’s infrastructure is the systemic security model
of the Internet of Things (IoT) architecture. In this model, security technologies are deployed according
to the levels of the OSI network model—physical, transport, and application—considering the impact
of potential threats [25, 26]. The efective principles embedded in the organization of pseudo-random
sequence generator structures [27], namely, the additive Fibonacci generator (AFG) and its modified
version (MAFG) with prime number moduli—ensure their eficient hardware implementation while
meeting all statistical characteristic requirements. These generators can be utilized in cryptographic
information protection devices, including ensuring the security of a local corporate network [28]. The
monograph [29] presents a methodology for analyzing the quality of the validation mechanism for
identified vulnerabilities in a corporate network, enhancing the efectiveness of security analysis. The
eficiency of conservative information security systems and their integration into corporate
environments has been thoroughly analyzed in [30], ofering a multicriterial approach to system assessment.
Furthermore, the design of secure services for authentication, authorization, and accounting has been
addressed in [31], emphasizing the importance of identity management and controlled access within
Zero Trust frameworks.</p>
      <p>The reviewed methods and network security tools serve as the foundation for developing LCN security
approaches, which are currently relevant in the context of ensuring the secure intelligentization of
various societal domains.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Problem statement</title>
      <p>Based on the conducted analysis, the objectives of this study are as follows: 1) Propose a multi-layered
security approach for local corporate networks (LCN) based on the OSI reference model and the
"defensein-depth" model; 2) Develop a comprehensive LCN security system within the framework of the "threats
– security technologies" concept; 3) Implement a software solution for cryptographic data protection
at the transport layer of the OSI model using the AES-256 symmetric block encryption algorithm in
Python. The goal of this article is to establish a security methodology for local corporate networks,
leveraging a multi-layered approach and a comprehensive security system. Based on this methodology,
a software implementation of the AES-256 encryption algorithm will be developed for OpenVPN and
TLS technology, serving as an efective mechanism for information protection and ensuring a high level
of data security at the transport layer.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Multi-layered approach in local corporate network security</title>
      <sec id="sec-3-1">
        <title>3.1. Local corporate networks in societal infrastructure domains</title>
        <p>Local corporate networks (LCNs) are widely used in various infrastructure domains of society. Their key
characteristics include short-distance data transmission and high reliability in communication. Among
the commonly adopted network topologies, hybrid topology is the most frequently implemented in
LCNs due to its numerous advantages: structural flexibility; enhanced reliability and fault tolerance;
scalability; segmentation and high security levels; eficiency and high-speed data exchange.</p>
        <p>Key Characteristics of Local Corporate Networks (LCNs):
1. Location: LCNs cover a limited geographical area to ensure communication between ofices and
branches.</p>
        <p>2. Size and Scale: They consist of a restricted number of computers and devices within a specific
organization.</p>
        <p>3. Data Transmission Speed: LCNs provide high-speed data transfer between connected devices,
enhancing operational eficiency and information exchange.</p>
        <p>4. Communication Technologies: Various technologies, such as Ethernet, Wi-Fi, and Bluetooth, are
used to establish device connectivity.</p>
        <p>5. Security: Efective protection measures are essential, including firewalls, antivirus software, and
other security tools to prevent unauthorized access and mitigate cyber threats.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Features of Local Corporate Network (LCN) usage</title>
        <p>These features include:</p>
        <p>1. Data and Resource Sharing: LCNs enable shared access to information and resources within an
organization, facilitating eficient data exchange among employees.</p>
        <p>2. Centralized Management: They allow centralized control over hardware, software, and security
policies, simplifying administration and ensuring network consistency.</p>
        <p>3. Access to Shared Services: LCNs support the use of shared services such as printers, file servers,
and other resources, promoting collaboration across departments.</p>
        <p>4. Use of Specialized Equipment: They enable the deployment of specialized hardware, including
servers and switches, to optimize network performance and ensure high productivity.</p>
        <p>5. Data Security: LCNs play a crucial role in maintaining data confidentiality and integrity through
security tools such as encryption, authentication, and activity monitoring.</p>
        <p>6. Real-Time Operation Support: They facilitate real-time data exchange for critical applications,
including production lines, security systems, and other essential infrastructure components.</p>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. Multilevel security approach for local corporate networks: basic OSI reference model and "defense in depth" model</title>
        <p>To create a comprehensive security system for local corporate networks, we will consider a multilevel
approach that involves applying the layered basic OSI reference model and the multilayered "defense in
depth" model. This approach ensures a high level of information confidentiality.</p>
      </sec>
      <sec id="sec-3-4">
        <title>3.4. Basic OSI reference model</title>
      </sec>
      <sec id="sec-3-5">
        <title>3.5. "Defense in depth" model</title>
        <p>Figure 2 presents the structure of the "Defense in Depth" model for local corporate networks [32]. The
"Defense in Depth" model ensures resilience against cyber threats based on multiple security layers:</p>
        <p>1. Network Security Plan - 1.1 Identifying communication channels within the network of the
management system; 1.2 Conducting a full audit of devices in the network; 1.3 Recording security
parameters of each device; 1.4 Creating a detailed network diagram.</p>
        <p>2. Network Partition - 2.1 Organizing the necessary infrastructure for seamless network information
transmission (servers that collect and distribute data within management systems); 2.2 Managing
software updates; 2.3 Implementing an antivirus server; 2.4 Deploying a web access server; 2.5 Setting
up a wireless access point; 2.6 Configuring remote access.</p>
        <p>3. Network Perimeter Protection - 3.1 Implementing firewalls to perform packet filtering; 3.2 Filtering
network trafic; 3.3 Using a proxy gateway.</p>
        <p>4. Network Segmentation: Benefits - 4.1 Prevents malicious trafic infiltration by limiting it to a
single network segment; 4.2 Enhances security by making network nodes invisible to unauthorized
networks; 4.3 Mitigates attacks from intruders scanning deeper network layers before selecting a target;
4.4 Prevents data leaks in case of a security breach; 4.5 Improves network performance and reduces
load.</p>
        <p>5. Enhancing Device Security - 5.1 Password management, including encryption; 5.2 Disabling unused
services; 5.3 Access control; 5.4 Network Intrusion Detection Systems (NIDS); 5.5 Strong authentication.</p>
        <p>6. Monitoring/Update - 6.1 Packet logging monitoring; 6.2 Event log monitoring; 6.3 Authentication
interception; 6.4 Using Intrusion Detection Systems (IDS).</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Comprehensive security system for local corporate networks in subject areas</title>
      <p>The comprehensive security system for a local corporate network in a specific subject area is built
based on the OSI and "Defense in Depth" models. It is deployed within the framework of the "Threats –
Security Technologies" concept.</p>
      <p>1. The OSI model: Physical.</p>
      <p>In this case the possible threats are random (electromagnetic interference, damage to cables or
connections, failure in the power supply) and targeted (physical intrusion attempts to gain access to
equipment, attacks on cables and infrastructure, temperature attacks).</p>
      <p>Security technologies with elements of “defense-in-depth” (hardware) include physical hardware
intrusion detection mechanisms, use of secure cables and connectors, and use of controlled access to
server and communication rooms
2. The OSI model: Data link.</p>
      <p>In this case the possible threats are random (noise or interference that may lead to false perception
of bits, influence of internal electrical noise band, interference in the wireless channel) and targeted
(poisoning the ARP cache, DHCP attacks (DHCP Spoofing), MAC address flooding).</p>
      <p>Security technologies with elements of “defense-in-depth” include hardware (control access to
the switch ports, IEEE 802.1X Authentication (A mechanism that requires authentication of devices
connecting to the network before gaining access), MAC Address Filtering: Restricts devices from
connecting to the network based on their MAC address) and software(Software-Based Access Control
(Using programs to configure access control policies and assign rights to interact with network ports),
Dynamic ARP Inspection Software (Use programs to detect and block invalid ARP responses and
prevent ARP attacks), Port Security Software (Port security policies on switches to restrict access to the
network)) tools.</p>
      <p>3. The OSI model: Network.</p>
      <p>Random threats are IP address leakage due to configuration errors or insuficient security, routing
table overflow due to a large number of requests, faulty network cards or ports. Targeted threats are
IP address spoofing, man-in-the-middle attack, packet snifing, Denial of Service (DoS) or Distributed
Denial of Service (DDoS), TCP hijacking (session hijacking).</p>
      <p>Security technologies with elements of “defense-in-depth” include hardware (Network Firewalls
(Specialized hardware for filtering network trafic based on predefined security rules to block unwanted
connections and protect against external threats), IPS (Intrusion Prevention Systems) (The use of
hardware accelerators to efectively detect and block intrusions at the network trafic level), use of
switches and routers that support various encryption protocols, VPNs, authentication and other security
features) and software(Firewall systems (Software for configuring packet filtering rules at the network
level to control access and block unwanted connections), IPS (Intrusion Prevention System) and IDS</p>
    </sec>
    <sec id="sec-5">
      <title>5. Cryptographic data protection at the transport layer of the OSI model in a local corporate network based on: the OpenVPN protocol, TLS technology, and the AES-256 algorithm</title>
      <p>To implement the proposed comprehensive security system for local corporate networks, we utilize
elements of the OSI reference model and the "defense-in-depth" model within the space of efective
security tools. These include the OpenVPN protocol, transport layer security (TLS) technology, and
the AES-256 symmetric block encryption algorithm, collectively ensuring a high level of information
confidentiality, data exchange speed, and connection security.</p>
      <p>Among well-known VPN protocols (OpenVPN, WireGuard, IKEv2/IPSec, L2TP/IPSec, PPTP), which
manage the creation and encryption of VPN connections, OpenVPN stands out as a universal solution. It
is compatible with all platforms and eficiently leverages AES-256, providing a high level of cryptographic
resilience when transmitting confidential data within corporate networks.</p>
      <p>TLS technology ensures security at the transport layer of the OSI model within a local corporate
network by providing user authentication, data confidentiality, and transmission integrity. The
advantages of using the AES-256 symmetric block encryption algorithm include: 1) High speed – the
algorithm operates eficiently on both hardware and software levels; 2) Reliable security – its structure is
resistant to many types of attacks, making it one of the most secure encryption algorithms; 3) Flexibility
– support for diferent key lengths allows for adjustable security levels based on specific needs. The
encryption algorithm is efectively used for: secure exchange of confidential data in corporate networks,
secure data storage, cryptographic data protection in cloud environments and on mobile devices.</p>
      <p>For the software implementation of data protection at the transport layer of the OSI model in a local
corporate network, the Python programming language was used. It features a clear syntax, a large
number of standard and third-party libraries. All of this makes the language universal.</p>
      <p>The developed program is a specialized proxy server that can handle the most sensitive data, providing
an additional layer of encryption on top of standard TLS protection. In addition to SSL, the proxy server
uses AES-256 to ensure an extra level of security for confidential data such as passwords, logins, keys,
tokens, etc.</p>
      <p>The program’s logic is as follows: the client connects to the proxy server via a standard TLS connection.
The proxy then determines whether additional encryption is required for a specific request. If needed,
the data is encrypted using AES-256 with a unique session key. The encrypted data is then transmitted
through the TLS tunnel to the target server. On the server side, a similar proxy decrypts the data before
passing it to the final application.</p>
      <p>The main structure of the program code includes the following elements:
1. Importing necessary modules:
socket – for network operations (creating a server socket). threading – for handling multiple
connections simultaneously. ssl – for establishing a secure connection via TLS. json – for processing
JSON data. logging – for event logging. base64 – for encoding/decoding data. os – for generating
random keys. cryptography.hazmat – for implementing AES-256 encryption.</p>
      <p>2. Server parameters:
PROXY_HOST = ’127.0.0.1’
PROXY_PORT = 8443
TARGET_HOST = ’127.0.0.1
TARGET_PORT = 8444</p>
      <p>The proxy server listens for connections on 127.0.0.1:8443 and forwards trafic to 127.0.0.1:8444 (acting
as an intermediary between the client and the server).</p>
      <p>3. Initializing SSL certificates to establish a secure TLS connection:
CERT_FILE = ’server.crt’
KEY_FILE = ’server.key’
4. List of sensitive data patterns that trigger additional encryption by the proxy server:
SENSITIVE_PATTERNS = [’password’, ’token’, ’credit’, ’ssn’, ’secret’, ’account’, ’personal’,
’confidential’]
5. Sensitive data encryption:</p>
      <p>The proxy server encrypts/decrypts data using AES-256 in CBC mode and exchanges the key between
the parties. The following functions are used:
def__init__(self): Generates a random key.
def encrypt(self, data): Encrypts sensitive data.
def decrypt(self, data): Decrypts data.
def get_key(self), def set_key(self, key): Handles key exchange between parties.
6. Classifying sensitive data in functions:
def__init__(self, patterns=None) - Detects sensitive data based on keywords and patterns. If
suspicious keywords are found, the data is considered sensitive and encrypted before transmission and def
is_sensitive(self, data) - Checks JSON data. If the input data is JSON, the server parses it into a flat
dictionary and verifies all keys and values against patterns from self.patterns. If JSON parsing fails, the
proxy server processes the data as plain text.</p>
      <p>7. Main server that establishes a connection between two network points and intercepts data:
def start(self): Launches the proxy server and connects the client.</p>
      <p>def handle_client(self, client_socket, client_address): Connects to the target server and creates two
threads for data transmission.</p>
      <p>def transfer_data(self, source, destination, direction, is_request): Handles data transmission and
detects sensitive information.</p>
      <p>To demonstrate the program’s functionality, a test environment was also created. It includes a client
that sends various test data and a target server that receives data transmitted through the proxy server.
The client sends both plain text and potentially sensitive data. In the proxy server logs, we can observe
information about detecting sensitive data and applying additional AES-256 encryption. Meanwhile, in
the target server logs, we can see the received data. For clarity, encrypted sensitive data is marked with
the prefix "SECURE:".</p>
      <p>As shown in Figure 3, four test connections were made, transmitting diferent types of data. During
the first and third connections, regular data was sent, while in the second and fourth connections,
typical confidential information was transmitted, such as a login, password, and a secret message. Upon
detecting sensitive data, the proxy server logs the event and applies additional encryption: client -&gt;
server: Sensitive data DETECTED, applying additional encryption; client -&gt; server: Data encrypted by
AES-256.</p>
      <p>In Figure 4, we can see the data sent by the client and what was received by the target server.
During the first and third connections, the data was received in the same form as it was sent.
During the second and fourth connections, the target server received the data in an encrypted
format, marked with the "SECURE:" prefix. For example: sent data - {"username": "user123",
"message": "Sensitive data", "password": "very_secret_password"}; received data - SECURE:
dwdncuTZQhwCemt8EkZVjyX5ih8A2R1pQdKZ3ndfXEMjRXfSS4JE3NØf+SiiEgNrQ171nEKR/B1YBZ+qAqhcQt.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusions</title>
      <p>The proposed methodology for ensuring information confidentiality in local corporate networks, which:
1) is presented as a multi-level approach based on the OSI reference model and the "defense-in-depth"
model; 2) is deployed as a comprehensive security system within the "threat – security technologies"
concept, addressing both random and targeted threats; 3) is practically implemented in the information
protection mechanism at the transport layer of the OSI model using the AES-256 algorithm in Python,
the OpenVPN protocol, and TLS technology, enabling a high level of cybersecurity resilience and
protection.</p>
    </sec>
    <sec id="sec-7">
      <title>Declaration on Generative AI</title>
      <p>The authors have not employed any Generative AI tools.
security threats, in: Lecture Notes in Electrical Engineering, Springer International Publishing,
Cham, 2021, pp. 257–271. doi:10.1007/978-3-030-92435-5_15.
[15] M. Tolkachov, et al., Development of a method for protecting information resources in a corporate
network by segmenting trafic, Eastern-European Journal of Enterprise Technologies (2024) 63–78.
doi:10.15587/1729-4061.2024.313158.
[16] R. Habash, M. Ibrahem, Zero trust security model for enterprise networks, Iraqi Journal of</p>
      <p>Information and Communication Technology 6 (2023) 68–77. doi:10.31987/ijict.6.2.223.
[17] G.-L. Zhang, Analysing computer system security and computer network security, Engineering</p>
      <p>Technology Trends 2 (2024) 11–15. doi:10.37155/2972-483X-0204-3.
[18] O. Hosam, R. Abousamra, M. Hassouna, R. Azzawi, Security analysis and planning for enterprise
networks, in: Industry 4.0 Key Technological Advances and Design Principles in Engineering,
Education, Business, and Social Applications, 1, 2024, pp. 69–100. doi:10.1201/9781003343332-5.
[19] M. Lyu, H. Gharakheili, V. Sivaraman, A survey on enterprise network security: Asset behavioral
monitoring and distributed attack detection, IEEE Access 12 (2024) 89363–89383. doi:10.48550/
arXiv.2306.16675.
[20] J. Al-Azzeh, M. A. Hadidi, R. Odarchenko, S. Gnatyuk, Z. Shevchuk, Z. Hu, Analysis of
selfsimilar trafic models in computer networks. international review on modelling and simulations,
International Journal of Computer Network and Information Security 10 (2017) 328–336. doi:10.
15866/iremos.v10i5.12009.
[21] M. Sudha, V. Mahesh Kumar Reddy, W. Deva Priya, S. Rafi, S. Subudhi, S. Jayachitra, Optimizing
intrusion detection systems using parallel metric learning, Computers and Electrical Engineering
110 (2023) 76–91. doi:10.1016/j.compeleceng.2023.108869.
[22] N. Bhagat, MPLS vs. IPsec VPN: Choosing the right network architecture for enterprise WAN,
International Journal of Scientific Research in Engineering and Management 5 (2021). doi: 10.
55041/ijsrem11326.
[23] A. Taslim, R. Uddin, N. Evan, R. Alam, Enterprise network: Security enhancement and policy
management using next-generation firewall, in: Lecture Notes on Data Engineering and
Communications Technologies, volume 66, 2021, pp. 753–769. doi:10.1007/978-981-16-0965-7_59.
[24] V. Abergos, F. Medjek, A risk assessment analysis to enhance the security of OT WAN with</p>
      <p>SD-WAN, Journal of Cybersecurity and Privacy 4 (2024) 910–937. doi:10.3390/jcp4040042.
[25] V. Dudykevych, G. Mykytyn, T. Stosyk, P. Skladannyi, Platform for the security of cyber-physical
systems and the iot in the intellectualization of society, in: CEUR Workshop Proceedings, volume
3654, 2024, pp. 449–457.
[26] Y. Averyanova, et al., UAS cyber security hazards analysis and approach to qualitative assessment,
in: S. Shukla, et al. (Eds.), Data Science and Security, volume 290 of Lecture Notes in Networks and
Systems, Springer, Singapore, 2021, pp. 258–265. doi:10.1007/978-981-16-4486-3_28.
[27] V. Maksymovych, et al., Generator of pseudorandom bit sequence with increased cryptographic
security, Metallurgical and Mining Industry: scientific and technical journal (2014) 25–29.
[28] V. Maksymovych, et al., Development of additive fibonacci generators with improved
characteristics for cybersecurity needs, Applied Sciences (Basel) 12 (2022) 15–19. doi:10.3390/
app12031519.
[29] S. Yevseiev, Y. Khokhlachova, S. Ostapov, O. Laptiev, O. Korol, S. Milevskyi, et al., Models of
socio-cyber-physical systems security, PC Technology Center, Kharkiv, 2023. doi:10.15587/
978-617-7319-72-5.
[30] V. Dudykevych, et al., A multicriterial analysis of the eficiency of conservative information
security systems, Eastern-European Journal of Enterprise Technologies (2019) 6–13. doi:10.
15587/1729-4061.2019.166349.
[31] D. Shevchuk, et al., Designing secured services for authentication, authorization, and accounting
of users, in: CEUR Workshop Proceedings, volume 3550, 2023, pp. 217–225.
[32] C. Onyagu, O. Okonkwo, G. Akawuku, J. John, Enhancing security in Internet of Things (IoT)
architecture through defense-in-depth mechanism: A comprehensive study, Newport International
Journal of Engineering and Physical Sciences 4 (2024) 17–22.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <article-title>International strategy of the EU agency for cybersecurity</article-title>
          ,
          <year>2021</year>
          . URL: https://www.enisa.europa. eu/sites/default/files/all_files/2022-02-16
          <source>%20ENISA%20International%20Strategy.pdf.</source>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <article-title>[2] Cybersecurity strategy of Ukraine (2021-2025</article-title>
          ),
          <year>2021</year>
          . URL: https://www.rnbo.gov.ua/files/2021/ STRATEGIYA%20KYBERBEZPEKI/proekt%20strategii_kyberbezpeki_Ukr.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <article-title>[3] NIS 2: Overview of the EU cybersecurity directive</article-title>
          ,
          <year>2021</year>
          . URL: https://gigacloud.ua/blog/ navchannja/nis-2
          <article-title>-ogljad-direktivi-es-pro-kiberbezpeku.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Bobalo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Dudykevych</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Mykytyn</surname>
          </string-name>
          ,
          <article-title>Information technologies for data collection: concept, methodological approaches</article-title>
          , security, Spolom, Lviv,
          <year>2024</year>
          . 148 p.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>D.</given-names>
            <surname>Chinchyk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Korobeynikova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Zakharchenko</surname>
          </string-name>
          ,
          <article-title>Methods and means of complex protection of the corporate network</article-title>
          , in: Scientific Collection «InterConf»,
          <source>with the Proceedings of the 5th International Scientific and Practical Conference «Theory and Practice of Science: Key Aspects»</source>
          ,
          <volume>84</volume>
          ,
          <year>2021</year>
          , pp.
          <fpage>433</fpage>
          -
          <lpage>450</lpage>
          . doi:
          <volume>10</volume>
          .51582/interconf.7-
          <fpage>8</fpage>
          .
          <fpage>11</fpage>
          .
          <year>2021</year>
          .
          <volume>043</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A.</given-names>
            <surname>Ilienko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Ilienko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Kvasha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Mazur</surname>
          </string-name>
          ,
          <article-title>Practical approaches to identifying vulnerabilities in information and telecommunication networks, Cybersecurity: education, science</article-title>
          , technology (
          <year>2023</year>
          )
          <fpage>96</fpage>
          -
          <lpage>108</lpage>
          . doi:
          <volume>10</volume>
          .28925/
          <fpage>2663</fpage>
          -
          <lpage>4023</lpage>
          .
          <year>2023</year>
          .
          <volume>19</volume>
          .96108.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>O.</given-names>
            <surname>Androschuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Kovalenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Titova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Cheshun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Polyakov</surname>
          </string-name>
          ,
          <article-title>Improvement of information protection systems in computer networks of the state border guard service of Ukraine, Military Sciences (</article-title>
          <year>2021</year>
          )
          <fpage>5</fpage>
          -
          <lpage>21</lpage>
          . doi:
          <volume>10</volume>
          .32453/3.v85i2-
          <fpage>3</fpage>
          .
          <fpage>828</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>O.</given-names>
            <surname>Polotai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Fedynets</surname>
          </string-name>
          ,
          <string-name>
            <surname>N. Kukharska,</surname>
          </string-name>
          <article-title>Research on information security threats and methods of their resolution in computer networks at the channel level</article-title>
          , Bulletin of the Ukrainian State University of Railways (
          <year>2024</year>
          )
          <fpage>65</fpage>
          -
          <lpage>71</lpage>
          . doi:
          <volume>10</volume>
          .32447/20784643.29.
          <year>2024</year>
          .
          <volume>07</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>P.</given-names>
            <surname>Kuchernyuk</surname>
          </string-name>
          ,
          <article-title>Methods and technologies for protecting computer networks (physical and channel levels</article-title>
          ),
          <source>Microsystems, Electronics and Acoustics</source>
          <volume>22</volume>
          (
          <year>2017</year>
          )
          <fpage>64</fpage>
          -
          <lpage>70</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>P.</given-names>
            <surname>Kucherniuk</surname>
          </string-name>
          ,
          <article-title>Methods and technologies for protecting computer networks (network, transport and application levels</article-title>
          ),
          <source>Microsystems, Electronics and Acoustics</source>
          <volume>23</volume>
          (
          <year>2018</year>
          )
          <fpage>52</fpage>
          -
          <lpage>58</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>O.</given-names>
            <surname>Lebid</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kiporenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Vovk</surname>
          </string-name>
          ,
          <article-title>Detection of cyberattacks and improvement of information security based on neural network technologies in cyberwarfare conditions</article-title>
          ,
          <source>Science and Technology Today</source>
          (
          <year>2023</year>
          )
          <fpage>238</fpage>
          -
          <lpage>256</lpage>
          . doi:
          <volume>10</volume>
          .52058/
          <fpage>2786</fpage>
          -6025-2023-
          <volume>1</volume>
          (
          <issue>15</issue>
          )
          <string-name>
            <surname>-</surname>
          </string-name>
          238-256.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>V.</given-names>
            <surname>Savchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Rybalchenko</surname>
          </string-name>
          ,
          <article-title>Building an efective enterprise network security system based on the method of analyzing hierarchies of quality indicators</article-title>
          ,
          <source>Modern Information Protection</source>
          (
          <year>2024</year>
          )
          <fpage>6</fpage>
          -
          <lpage>14</lpage>
          . doi:
          <volume>10</volume>
          .31673/
          <fpage>2409</fpage>
          -
          <lpage>7292</lpage>
          .
          <year>2024</year>
          .
          <volume>010001</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>A.</given-names>
            <surname>Yanko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Vyhivskyi</surname>
          </string-name>
          ,
          <article-title>Computer network protection system</article-title>
          ,
          <source>Control, Navigation and Communication Systems</source>
          (
          <year>2022</year>
          )
          <fpage>91</fpage>
          -
          <lpage>94</lpage>
          . doi:
          <volume>10</volume>
          .26906/SUNZ.
          <year>2022</year>
          .
          <volume>2</volume>
          .091.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>V.</given-names>
            <surname>Susukailo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Opirsky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Yaremko</surname>
          </string-name>
          ,
          <article-title>Methodology of ISMS establishment against modern cyber-</article-title>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>