<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Software module protecting web applications from several attacks types using formal logic⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Nataliia Gulak</string-name>
          <email>gulak_n@ukr.net</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sergii Ilyenko</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Elena Dubchak</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrii Maistrenko</string-name>
          <email>andrii.maistrenko@npp.kai.edu.ua</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Bohdan Zhurakovskyi</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Vadym Hetman Kyiv National Economic University</institution>
          ,
          <addr-line>54/1 Beresteyskyi ave., 03057 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <fpage>35</fpage>
      <lpage>45</lpage>
      <abstract>
        <p>Modern cryptographic systems often assume that strong encryption alone guarantees confidentiality. However, attackers may bypass algorithms by exploiting traffic patterns and predictable plaintext structures. Traffic analysis focuses on metadata such as packet length, timing, and communication patterns, enabling adversaries to infer user behavior, organizational links, or even military operations without decryption. For example, message frequency and size in secure messaging applications can reveal relationships or activity cycles, supporting espionage or profiling. Another threat arises from partial plaintext knowledge, since digital communications frequently include standardized headers, protocol fields, or common phrases. Predictable content facilitates known-plaintext and chosen-plaintext attacks, and in certain modes even controlled ciphertext manipulation. For instance, recognizing “GET” or “POST” in HTTP traffic may expose structural weaknesses. Together, these techniques demonstrate that confidentiality depends not only on algorithms but also on protocol design and metadata protection. Effective countermeasures include traffic padding, timing obfuscation, randomization of protocol fields, and encryption schemes resistant to plaintext attacks. This underscores a crucial principle: cryptographic strength must be complemented by system-level resilience to safeguard sensitive communications against real-world adversaries.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;cyber security</kwd>
        <kwd>web application</kwd>
        <kwd>attack</kwd>
        <kwd>cryptography</kwd>
        <kwd>steganography</kwd>
        <kwd>formal logic</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Digital transformation has significantly increased society's dependence on online services and web
applications. The scope of web applications using is constantly expanding — from e-commerce to
the provision of various services and technologies. The growing number of Internet users and
volumes of online information create an ideal environment for cybercriminals and attackers to gain
unauthorized access to sensitive data and vulnerable resources.</p>
      <p>Global cloud platform leader Fastly, Inc. (NYSE: FSLY) introduced the Fastly Threat Insights
Report, which presents the latest trends and attack methods in the web application security industry.</p>
      <p>
        According to data provided in the Fastly Threat Insights Report, as of August 26, 2024, the
number of cyberattacks aimed at identifying and exploiting software vulnerabilities has increased
by 22% compared to 2023 and is 91% [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>As the importance of web applications grows, so does the number of threats targeting them.
Cybercriminals attempt to gain unauthorized access to sensitive data using various attack
techniques such as SQL injections, cross-site scripting, phishing, DDoS attacks, and more. These
threats can lead to data loss, financial losses, privacy breaches, and reputational damage.
0009-0000-9584-7113 (N. Gulak); 0000-0002-0437-0995 (S. Ilyenko); 0000-0001-9739-3960 (E. Dubchak);
0009-0002-16129178 (A. Maistrenko); 0000-0003-3990-5205 (B. Zhurakovskyi)
Given these factors, ensuring the web applications information security becomes a challenge for
organizations and software developers. It’s important to consider these threats and take
appropriate measures to prevent and detect them in order to organize reliable protection of both
web applications and user information.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Main part</title>
      <p>The work examines developed algorithms for detecting th following types of attacks: SQL
injections, cross-site scripting (XSS), buffer overflow (“session fixation” attack).</p>
      <p>
        According to definition, a web application is software designed to perform specific functions or
tasks through a web browser. The principle of operation of web applications con-sists in processing
requests from the user through a web browser and providing answers in HTML pages form. The
web application can interact with a database, process logic using server scripts, and provide
responses to client requests [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        Wide using of web applications is:
1. The web applications availability from any device that has a web browser and an Internet
connection.
2. Simplified deployment and updating of web applications are achieved due to the possibility
of their centralized up-dating on the server, which makes this process convenient and efficient.
3. Web applications can be easily scaled to handle large numbers of users and data.
4. The web applications cross-platform nature consists of the ability to work on different
operating systems and devices without the need to develop separate versions for each
platform.
5. Dynamic web applications can update content without the need to reload the page,
providing users with relevant information in real time [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>These aspects are main for understanding the web applications functionality and value, as well
as for development and it security protection.</p>
      <sec id="sec-2-1">
        <title>2.1. Web application security</title>
        <p>
          Web applications information security can be ensured using cryptographic and steganographic
methods. Steganography is differentiated from cryptography by fundamentally different
approaches. Cryptography encrypts information to ensure confidentiality, and steganography is
aimed at making in-formation invisible [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]. To select a method for information storing in web
applications, we will analyze these methods.
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>2.1.1. Steganography methods</title>
        <p>Steganography methods include the following concealment types: in text documents; in multimedia
files; in network traffic; in program code; in text or graphics content of web sites. An analysis of
these methods using in information security is given below. Protection of information
confidentiality. Steganography is used to sensitive data protection, when important information
can be hidden in ordinary data and transmitted without attracting attention.</p>
      </sec>
      <sec id="sec-2-3">
        <title>2.1.2. Other methods</title>
        <p>
          Embedded information can be used to resources access determine. For example, websites can use
steganography to hide authentication keys or access rights. Steganography can be used to protect
copyright, add hidden markers or signatures to media files that allow to identify their authors or
source [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]. Embedded information may be used to determine data in-tegrity during transmission or
storage. This allows to detect any changes in the data. Steganography can be used to uniquely
encrypt data, making it less vulnerable to interception attacks. Steganography can be used to
provide hidden information to intelligence agents or law enforcement agencies for surveillance and
intelligence gathering.
        </p>
        <p>
          It’s important to note that steganography isn’t a substitute for cryptography, and its
effectiveness depends on the specific application and the security measures taken to protect the
hidden information [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]. It’s also important that using of steganography is within the law and
complies with the privacy and relevant organizations security regulations.
        </p>
        <p>
          Taking into account the above mentioned, as well as the need to ensure confidentiality, integrity
and authenticity of information in information systems and networks, it is necessary to pay
attention to cryptographic methods that use a mathematical and computational basis [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ].
        </p>
      </sec>
      <sec id="sec-2-4">
        <title>2.2. Cryptography techniques</title>
        <p>Below we will consider the use of basic cryptography techniques, such as symmetric encryption,
asymmetric encryption, hash functions, digital signatures, security protocols, access keys, key
management.</p>
        <p>
          Quantum cryptography. This type of cryptography uses the properties of quantum mechanics to
ensure the security of data transmission. Quantum cryptography is based on principles that use
pho-tons and their quantum properties to create secure cryptographic keys and protect information
from attacks using quantum computers [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ].
        </p>
        <p>
          Network security protocols. Protocols such as IPsec are used for networks security. They
provide encryption of the data, transmitted over the network, and ensure the data confidentiality
and integrity [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ].
        </p>
        <p>Cryptographic attacks and defense methods. Cryptographic system developers also consider
different types of attacks, including brute-force attacks, key spoofing attack, implementation
attacks etc. Defense against these attacks includes careful selection of cryptographic algorithms,
secure key storage, and usage of the most effective security practices.</p>
        <p>
          Tools for authentication and access management. These tools include multi-level authentication
systems, biometric authentication methods, access control mechanisms, and user identity
management systems [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ].
        </p>
        <p>Public key infrastructure. Public key infrastructure (PKI) is used to create, store and distribute
cryptographic keys and digital certificates. It plays an important role in ensuring the security of
communications and users identification.</p>
        <p>Protection against attacks using social engineering. Cryptography is also used to protect against
attacks that use social engineering, such as phishing. Data encryption and appropriate user training
are important aspects of protecting against this type of attack.</p>
      </sec>
      <sec id="sec-2-5">
        <title>2.3. Analysis and audit of cryptographic security</title>
        <p>
          The analysis and audit of existing solutions to identify possible vulnerabilities and improvement of
existing security measures is an important aspect of cryptographic security [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ].
        </p>
        <p>We will analyze the methods of cryptography and steganography according to the criteria (see
Table 1) and consider the advantages and disadvantages of using them to protect information.</p>
        <sec id="sec-2-5-1">
          <title>Steganography</title>
          <p>
            Analysis of cryptography and steganography
methods.
- For covert data exchange in text messages,
photos, audio and video [
            <xref ref-type="bibr" rid="ref3">3</xref>
            ].
- Commonly used to create “invisible” means
of watermark for authorizing content.
          </p>
        </sec>
        <sec id="sec-2-5-2">
          <title>Cryptology</title>
          <p>Decryption of data is possible
only if the key is available.</p>
          <p>For confidential information
exchange and saving it in
databases.
Advantages of steganography methods for data protection in information systems: invisibility of
using digital watermarks for copyright protection; it’s difficult to detect the presence of hidden
data.</p>
          <p>Disadvantages:low resistance to cryptanalytic attacks; the ability to detect hidden data under
the conditions of using special software.</p>
          <p>Advantages of cryptography methods for data protection: high resistance to cryptanalytic
attacks; effective protection of information from unauthorized access; the ability to set different
levels of encryption; relatively high speed of encryption and decryption.</p>
          <p>Disadvantages:requires the exchange of keys between the communicating parties;requires
additional encryption and decryption calculations associated with the key.</p>
          <p>The choice between steganography and cryptography for the protection of web applications
depends on the specific needs and requirements of the project.</p>
          <p>According to the results of the analysis, for solving the problem a cryptographic method was
chosen, because compared to steganography, cryptography allows to increase the level of service
security against direct attacks. During the development of the web application protection module
against several types of attacks, formal logic tools were used.</p>
        </sec>
      </sec>
      <sec id="sec-2-6">
        <title>2.4. Attack types characteristics</title>
        <p>Below are presented characteristics of the attacks types, for which the software module is being
developed. As mentioned above, these attacks can be used by attackers to gain unauthorized access,
steal data, or affect the normal operation of web applications.</p>
      </sec>
      <sec id="sec-2-7">
        <title>2.4.1. Cross-Site Scripting (XSS)</title>
        <p>XSS is an attack, while which an attacker adds malicious code (usually JavaScript) to a web page,
which is then exe-cuted in another user’s browser. The main types of XSS:</p>
        <p>Stored XSS (Persisted XSS). An attack occurs when an at-tacker inputs malicious code on a
server; this code is then stored on the server. When another user visits a page that hosts malicious
code, that code is executed in the user’s browser. For example, an attacker could enter a malicious
script into a forum comment field or user input area. Malicious code is executed on every device
that views the page.</p>
        <p>Reflected XSS. During a Reflected XSS attack, an attacker embeds malicious code in a URL or
request parameters. This code is displayed on the page and executed, when the user follows a
certain link. For example, an attacker can send a link to a user with malicious code that will be
executed when the link is opened.</p>
        <p>DOM-based XSS. This type of XSS attack occurs at the Document Object Model (DOM) level of
the browser. The attacker affects the DOM structure of the page that is al-ready loaded in the
user’s browser. For example, malicious code can modify DOM elements on a page, causing
malicious code to be executed in the user’s browser.</p>
        <p>Blind XSS (Second Order XSS). To providing this attack, an attacker enters malicious code, but
its execution occurs on a different page or for a different user than the one, who entered the data.
An example of such attack could be the following situation. An attacker enters a malicious script
that is stored on the server. When an administrator or other user with higher privileges views a
page that contains malicious code, the code is executed in the administrator’s browser.</p>
        <p>Self-XSS. During this attack, the attacker tries to mislead the user and convince him of the need
to execute malicious code in his own browser. For example, an attacker can send a phishing email
or launch an attack via social media by prompting the user to enter malicious code in their
browser’s address bar.</p>
      </sec>
      <sec id="sec-2-8">
        <title>2.4.2. Injections</title>
        <p>Injections (SQL and others). Injection is an attack, during which an attacker inputs malicious code
or commands into data that is passed to a web application via input or URL parameters. The main
types of injections:</p>
        <p>SQL injection. Malicious SQL code is inputted into a database query, which may lead to the
leakage, deletion or modification of data in the database.</p>
        <p>Command injection. Malicious commands are inputted into server system commands, allowing
an attacker to per-form actions on the server, such as creating, modifying, or deleting files.</p>
        <p>JavaScript injection (DOM injection). Malicious code is inputted into the DOM structure of the
page and executed in the user’s browser, similar to XSS.</p>
        <p>
          Injection attacks can cause various consequences, including the leakage of confidential data, loss
of system control, denial of service (DoS), etc [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ].
        </p>
      </sec>
      <sec id="sec-2-9">
        <title>2.4.3. Buffer overflow</title>
        <p>A buffer overflow is a situation where an attacker inputs more data into the buffer than it can hold.
This can cause important data to be overwritten, malicious code to be exe-cuted, or even the
program to crash.</p>
        <p>Types of buffer overflow attacks:</p>
        <p>Stack Overflow. Take place, when an attacker overflows the program stack by changing return
addresses and can bias code execution to his advantage.</p>
        <p>Heap Overflow. The user programs unlimited memory us-age on the heap, but the stack is not
designed for that much data. This allows an attacker to access and modify the in-formation. Such
actions by an attacker can cause uncontrolled code execution.</p>
      </sec>
      <sec id="sec-2-10">
        <title>2.5. Attack consequences</title>
        <p>The considered types of attacks lead to the following consequences: obtaining unauthorized access
to confidential information of the database;deletion, modification or loss of important data, which
can significantly affect the functioning of the web application and the organization as a whole;
using an SQL injection attack for implementation and execution of malicious code in the database
environment; a vulnerability caused by an SQL injection attack can be used to gain unauthorized
access to server and file system resources;loss of availability during SQL-injection attacks can lead
to denial of service and loss of web application availability for users; in case of a successful buffer
overflow attack, an attacker can change the normal flow of program execution, which can lead to
unforeseen consequences, such as the execution of malicious code, incorrect data processing, etc.; a
buffer overflow attack can be used to gain access to confidential data, passwords, access keys,
session tokens and other confidential information; a successful buffer overflow attack can use a
vulnerability in a web application to gain unauthorized access to other systems, on which the web
application has access rights. The consequence of such attack may be a security compromise in the
system.</p>
      </sec>
      <sec id="sec-2-11">
        <title>2.6. Security aspects taken to account</title>
        <p>Analysis of software methods to protect information in web applications from unauthorized access
is an important part of the ensuring cyber security process in the online environment. Below are
some key aspects that should be taken into account when analyzing software methods</p>
        <p>Protection against XSS and injection includes validating and data shielding before output to the
page, usage secure APIs that prevent injection (such as parameterized SQL queries), and regular
system security updates.</p>
        <p>
          To achieve cybersecurity of web applications, the following is recommended: a detailed
overview of measures to protect sessions, including assigning a unique session identifier; the
session encrypting using the HTTPS protocol to protect data from interception or eavesdropping;
session identifiers must have a limited lifetime;session identifiers sending in encoded form and
using HTTP-only cookies; generation of a new session ID after user authentication to prevent the
attacker to install his session ID on the victim’s computer; authorization of each request, which
must be checked for the validity of the session ID and user access rights [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ]; use of safe functions
that automatically set limits on the size of the buffer or perform a check for entry into a certain
range; verification and validation of outside input data from an unfamiliar source;setting a limit on
the maximum size of the buffer and checking of these limits fulfilling during data saving operations
[
          <xref ref-type="bibr" rid="ref12 ref13 ref14 ref15 ref16">12–16</xref>
          ]; using of safe programming languages that have built-in security measures to prevent
buffer overflows; updating of software libraries and compilers, which may include security
measures to protect against known vulnerabilities.
        </p>
        <p>
          Analysis of software methods to protect information in web applications from unauthorized
access is a constant iterative process, as threats change and evolve over time. Ensuring a high level
of security requires constant improvement and updating of protection measures [
          <xref ref-type="bibr" rid="ref17">17–20</xref>
          ].
        </p>
        <p>Therefore, the development of a software module for the protection of web applications is an
important component of a cybersecurity strategy in today’s world, where the number and
complexity of cyber threats is increasing. Hacking attacks use new techniques, such as artificial
intelligence (AI) attacks, to bypass traditional protection measures. The software module will allow:
adapt to modern threats; protect web applications from the latest types of attacks; proactively
identify and fix new vulnerabilities, ensuring a sustainable level of security [21–24].</p>
        <p>The consequences of such attacks as SQL injections, cross-site scripting (XSS), buffer overflows
(“session-fixing” attacks) significantly affect the correct operation of web applications. Based on the
conducted analysis of these types of attacks algorithms, protection algorithms for their detection
have been created.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Action protection algorithm</title>
      <p>An action algorithm to protect against the execution of unwanted scripts is presented below; it
allows to check each created feedback for the presence of a cross-site scripting attack (see Figure 1).</p>
      <p>SQL injection attack algorithm.</p>
      <p>During the attack, the injection occurs at the moment of saving the information and the
attacker gains access to the database of the web application.</p>
      <p>To protect the web application from an SQL injection at-tack, an action algorithm is considered
(see Figure 2); it filters the request and prevents unplanned actions.</p>
      <p>In a session capture type attack, an attacker can steal another user’s cookies and be able to
recreate this session. That is, operating the site on someone else’s behalf and potentially gaining
access to features or information that at-tacker should not have access to. As follow, attacker can
distort or completely destroy information, which is stored in a web application.</p>
      <p>There are various ways to protect web applications from this type of attack. An following
algorithm is considered below (see Figure 3), in which protection is carried out by means of the
session identifier rotation during each login, logout, change of user_id or permissions. For this
purpose, the system logic has been changed to re-create the session ID in specific scenarios.</p>
      <p>The defense against this attack is to regularly circulate session tokens. For example, token can
be updated every time the user finishes working with the service.</p>
      <p>To reduce the time of detection and web applications protection from several types of attacks, a
software module was created, which combined protection against SQL injection, cross-site
scripting and session fixation using formal logic. We note that the application of formal logic in
programming is an important element for ensuring the correctness and reliability of software
systems.</p>
      <sec id="sec-3-1">
        <title>3.1. Formal logic usage</title>
        <p>
          Formal logic allows developers to mathematically describe and analyze the properties of programs,
which helps in the detection and elimination of errors, and also ensures the sta-bility and efficiency
of the code [
          <xref ref-type="bibr" rid="ref13 ref15">13, 15</xref>
          ]. The main aspects of formal logic application in programming are as follows:
1. Definition of specifications. Formal logic is used to define program specifications, including
functional requirements, security properties, limitations, and other aspects. This helps
developers clearly understand how the program should work.
2. Achieving correctness. Application of formal logic mathematical concepts allows to prove
the correctness of programs. Mathematical proofs can determine that a pro-gram fulfills
certain security and stability properties.
3. Formal verification. The using of formal methods to verify the correctness of software code
includes the imple-mentation of special tools and programming languages for formal
verification of code, in particular, verification of its compliance with defined specifications.
4. Mathematical modeling. Formal logic is used for mathematical modeling of programs
various parts. This al-lows to analyze and predict system behavior in various sce-narios.
5. Validation of code properties. Formal logic is used to determine and verify code properties
such as no division by zero, absence of continuous cycles, and other aspects that may affect
code stability.
6. Risk management. Formal logic using helps developers identify and eliminate potential
problems and errors at the early stages of development, which helps to avoid dangers and
improve the overall quality of the software product.
7. Ensuring security. Formal logic using to identify and analyze potential security
vulnerabilities in software code and implementation of appropriate protective measures.
        </p>
        <p>
          Formal logic using to create a software module for web applications protecting from attacks
allows to systematize and formalize rules that control and ensure system security. [
          <xref ref-type="bibr" rid="ref13 ref14 ref16">13, 14, 16</xref>
          ] This
allows automated detection of suspicious activity or attacks and appropriate notification.
        </p>
        <p>Formal logic using helped to combine following in the developed module: protection against
cross-site scripting attacks, SQL injection and session fixation (see Figure 4).</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Results</title>
      <p>The implementation of protection mechanisms based on formal logic demonstrated measurable
improvements in the detection, mitigation, and recovery phases of common web application
security threats. By introducing structured rules for SQL injection, cross-site scripting, and session
capture, the system was able to identify anomalies more rapidly, reduce the time required to apply
corrective measures, and ensure a stable recovery with minimal disruption.
The comparative results are summarized in Table X, which highlights the time-based effects of
each protection mechanism. Based on internal testing and simulation of typical web application
traffic, SQL injection defenses reduced detection time from an average of 15 seconds per anomalous
query to 3 seconds, while mitigation actions were executed immediately due to the use of
parameterized queries. Cross-site scripting protections enabled detection of malicious scripts
within 5 seconds, and the sanitization process reduced client-side errors to near zero, cutting
recovery time from approximately 20 seconds to 4 seconds. Session capture protection,
implemented through secure token rotation and logical consistency checks, allowed detection of
abnormal sessions within 2 seconds, and recovery of secure sessions required on average 1–2
seconds.</p>
      <p>These results confirm that integrating multiple layers of defense not only strengthens overall
security posture but also significantly accelerates the web application development lifecycle by
reducing the time required to detect, isolate, and remediate vulnerabilities. The combined approach
provides both security and operational efficiency, addressing critical challenges in web application
protection.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion</title>
      <p>Cryptographic protection methods were chosen based on the analysis of database protection
methods and the impact of such types of attacks on web applications as cross-site scripting, SQL
injection and session capture. The attack algorithms (cross-site scripting, SQL injection and session
fixation) were considered, which formed the basis for the criteria selection of web application
protection algorithms construction against these types of attacks Based on formal logic, a
combination of SQL injection protection, cross-site scripting, and session capture was
implemented, which reduced the time to identify and eliminate errors, and also provided the ability
to ensure code stability and efficiency.</p>
      <p>The software module, proposed in the work, can be used in real web applications in order to
increase the level of data security. Practical recommendations will be useful for in-formation
security experts, when making decisions about the feasibility of different approaches to protect of
web applications from other possible types of attacks.
Declaration on Generative AI
While preparing this work, the authors used the AI programs Grammarly Pro to correct text
grammar and Strike Plagiarism to search for possible plagiarism. After using this tool, the authors
reviewed and edited the content as needed and took full responsibility for the publication’s content.
[18] S. Yevseiev, et al., Development of Niederreiter Hybrid Crypto-Code Structure on Flawed
Codes, Eastern-European J. Enterp. Technol. 1.9(97) (2019) 27–38.
doi:10.15587/17294061.2019.156620
[19] P. Skladannyi, et al., Adaptive Methods for Embedding Digital Watermarks to Protect Audio
and Video Images in Information and Communication Systems, in: Classic, Quantum, and
Post-Quantum Cryptography (CQPC), vol. 4016 (2025) 13–31.
[20] S. Buchyk, et al., Improvement of Steganographic Methods based on the Analysis of Image
Color Models, in: Workshop on Cybersecurity Providing in Information and
Telecommunication Systems, CPITS, vol. 2923 (2021) 117–124.
[21] S. Popereshnyak, Y. Novikov, Y. Zhdanova, Cryptographic System Security Approaches by
Monitoring the Random Numbers Generation, in: Cybersecurity Providing in Information and
Telecommunication Systems II (CPITS-II), vol. 3826 (2024) 301–309.
[22] D. Proskurin, et al., Hybrid RNN-CNN-based Model for PRNG Identification, in: Classic,</p>
      <p>Quantum, and Post-Quantum Cryptography (CQPC), vol. 3829 (2024) 47–53.
[23] A. Horpenyuk, I. Opirskyy, P. Vorobets, Analysis of Problems and Prospects of
Implementation of Post-Quantum Cryptographic Algorithms, in: Classic, Quantum, and
PostQuantum Cryptography (CQPC), vol. 3504 (2023) 39–49.
[24] P. Petriv, I. Opirskyy, N. Mazur, Modern Technologies of Decentralized Databases,
Authentication, and Authorization Methods, in: Cybersecurity Providing in Information and
Telecommunication Systems II, vol. 3826 (2024) 60–71.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>Security</given-names>
            <surname>Solutions Media</surname>
          </string-name>
          .
          <source>New Fastly Threat Research Reveals</source>
          <volume>91</volume>
          %
          <article-title>of Cyberattacks Targeted Multiple Organisations Using Mass Scanning to Uncover and Exploit Vulnerabilities</article-title>
          . https://www.securitysolutionsmedia.com/
          <year>2024</year>
          /08/26/new-fastly
          <article-title>-threat-research-reveals-91-ofcyberattacks-targeted-multiple-organisations-using-mass-scanning-to-uncover-and-exploitvulnerabilities/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Webcase</surname>
          </string-name>
          ,
          <article-title>What is a Web Application? The Difference Between a Website, Web Application, SPA, and PWA</article-title>
          . https://webcase.com.ua/uk/blog/cho-takoe
          <article-title>-web-prilozhenie-vse-vidy/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>T.</given-names>
             
            <surname>Valibayli</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
           
          <article-title>Gürhanlı, Using Steganography within WEB Security and Its Application in User Login System</article-title>
          ,
          <year>2020</year>
          . https://www.academia.edu/42794094/Using_Steganography_within _WEB_Security_and_Its_Application_in_User_Login_System
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Intellipaat</surname>
            , What is Steganography?
            <given-names>A Complete</given-names>
          </string-name>
          <string-name>
            <surname>Guide</surname>
          </string-name>
          ,
          <year>2023</year>
          . https://intellipaat.com/blog/ what-is-steganography/#no15
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>O.</given-names>
             
            <surname>Desiatnyk</surname>
          </string-name>
          , Cryptographic Methods of Information Protection,
          <source>Integrity Control of Software and Information Resources</source>
          ,
          <year>2020</year>
          . https://classmill.com/659/112/m/xnb7A
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Logsign</surname>
          </string-name>
          , What are Authentication Protocols in Cryptography?
          <year>2020</year>
          . https://www.logsign.com/blog/what
          <article-title>-are-authentication-protocols-in-cryptography/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Amazon</given-names>
            <surname>Web Services</surname>
          </string-name>
          . What is IPsec? https://aws.amazon.com/what-is/ipsec/
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>S.</surname>
          </string-name>
           Rawat, Characteristics, Types, and Applications of Cryptography,
          <year>2021</year>
          . https://www.analyticssteps.com/blogs/characteristics
          <article-title>-types-and-applications-cryptography</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>N. K.</given-names>
            <surname>Hulak</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
           
          <string-name>
            <given-names>V.</given-names>
            <surname>Los</surname>
          </string-name>
          , Information Protection in Web Applications Using Cryptography Methods, in: V International Scientific and Practical Conference “
          <source>Trends in Science Regarding the Creation of New Teaching Methods”</source>
          ,
          <year>2023</year>
          ,
          <fpage>184</fpage>
          -
          <lpage>186</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Lenovo</surname>
          </string-name>
          ,
          <article-title>What is the Least Significant Bit (LSB)? https://www</article-title>
          .lenovo.com/us/en/glossary/ least-significant-bit
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11] CQR Company,
          <source>Session Fixation Vulnerabilities</source>
          ,
          <year>2023</year>
          . https://cqr.company/ua/webvulnerabilities/session-fixation-vulnerabilities/
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Sebweo</surname>
          </string-name>
          ,
          <article-title>How to Protect Your Website from Brute-force</article-title>
          <string-name>
            <surname>Attacks</surname>
          </string-name>
          ,
          <year>2020</year>
          . https://sebweo.com
          <article-title>/yak-zahistiti-svij-sajt-vid-atak-metodom-gruboyi-sili-brute-force/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>J. Southworth</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
           
          <string-name>
            <surname>Swoyer</surname>
          </string-name>
          ,
          <article-title>Critical Reasoning: A User's Manual, v.4.0</article-title>
          . https://www.academia.edu/110209180/Critical_
          <article-title>Reasoning_A_Users_Manual_v_4_0?uc-sbsw=75306691</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>S.</given-names>
            <surname>Kazmirchuk</surname>
          </string-name>
          , et al.,
          <article-title>Improved Gentry's Fully Homomorphic Encryption Scheme: Design, Implementation and Performance Evaluation, CybHyg (</article-title>
          <year>2019</year>
          )
          <fpage>72</fpage>
          -
          <lpage>83</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>O. K.</given-names>
             
            <surname>Yudin</surname>
          </string-name>
          , Y. K. 
          <string-name>
            <surname>Ziatdinov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
           N. 
          <string-name>
            <surname>Voronin</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
           V. 
          <article-title>Ilyenko, A Method for Determining Informative Components on the Basis of Construction of a Sequence of Decision Rules, Cybernetics Syst</article-title>
          . Anal.
          <volume>52</volume>
          (
          <issue>2</issue>
          ) (
          <year>2016</year>
          )
          <fpage>323</fpage>
          -
          <lpage>329</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>A.</given-names>
            <surname>Ilyenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Ilyenko</surname>
          </string-name>
          ,
          <source>Program Module of Cryptographic Protection Critically Important Information of Civil Aviation Channels, Int. Conf. Comput. Sci. Eng</source>
          . Educ. Appl. (
          <year>2022</year>
          )
          <fpage>235</fpage>
          -
          <lpage>247</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kostiuk</surname>
          </string-name>
          , et al.,
          <article-title>Application of Statistical and Neural Network Algorithms in Steganographic Synthesis and Analysis of Hidden Information in Audio and Graphic Files</article-title>
          , in: Classic, Quantum, and
          <string-name>
            <surname>Post-Quantum Cryptography</surname>
          </string-name>
          (CQPC), vol.
          <volume>4016</volume>
          (
          <year>2025</year>
          )
          <fpage>45</fpage>
          -
          <lpage>65</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>