Nikitin P.V., Gorokhova R.I. —
Analysis of modern intelligent methods for protecting critical information infrastructure
// Security Issues. – 2024. – ¹ 3.
– P. 14 - 38.
DOI: 10.25136/2409-7543.2024.3.69980
URL: https://en.e-notabene.ru/nb/article_69980.html
Read the article
Abstract: Critical information infrastructure (CII), including the financial sector, plays a key role in ensuring the sustainable functioning of economic systems and the financial stability of States. However, the growing digitalization of the financial industry and the introduction of innovative technologies are opening up new attack vectors for attackers. Modern cyber attacks are becoming more sophisticated, and traditional defenses are proving ineffective against new, previously unknown threats. There is an urgent need for more flexible and intelligent cybersecurity systems.
Thus, the subject of the study is modern intelligent methods and technologies for protecting critical information infrastructure (CII) from cyber attacks. The object of the research is methods and means of ensuring the protection of critical information infrastructure using artificial intelligence and machine learning technologies. The methodological basis of this study is a comprehensive analysis of the scientific literature on the use of intelligent methods and technologies to protect critical information infrastructure. During the review and critical analysis of relevant scientific publications, key problems and unresolved tasks requiring further scientific research and practical developments in this subject area were identified. This methodological approach allowed us to form a holistic view of the current state and prospects for the development of intelligent cybersecurity tools for critical financial systems, as well as to identify priority areas for further research. The main directions of scientific novelty of this research are:
1. A detailed review of promising approaches based on artificial intelligence and machine learning technologies to ensure effective protection of CII organizations from modern complex cyber attacks.
2. Identification and analysis of a number of key scientific and technical problems that need to be solved to increase reliability, interpretability and trust in intelligent cybersecurity systems, including issues of robustness to attacks, active online learning, federated and differential private data processing.
3. Identification of promising areas for further research and development in the field of application of specialized methods of secure and trusted AI to protect critical financial infrastructure.
Thus, this research makes a significant contribution to the development of scientific and methodological apparatus and practical solutions for the use of intelligent methods to ensure cybersecurity.
Nikitin P.V., Dolgov V.I., Gorokhova R.I., Korovin D.I., Bakhtina E.Y. —
Methodology for assessing the importance of features when analyzing the implementation of government contracts
// National Security. – 2023. – ¹ 4.
– P. 1 - 18.
DOI: 10.7256/2454-0668.2023.4.44013
URL: https://en.e-notabene.ru/nbmag/article_44013.html
Read the article
Abstract: The subject of the research is assessing the risks of performing government contracts. The object of the study is the process of analysis and evaluation of the implementation of government contracts. The study is aimed at developing a methodology that determines the importance and significance of signs that influence the risk of non-fulfillment of government contracts. Research methods were used: data analysis to detect connections and dependencies between various characteristics and the risk of non-fulfillment of government contracts; statistical analysis to obtain an assessment of the impact of each characteristic on the risk of non-fulfillment of contracts and ranking them in order of importance; machine learning to predict the risk of non-fulfillment of government contracts; expert assessments to take into account contextual factors and features, their impact on the importance of features. The main conclusions of the study are the presented methods for assessing the importance of features when analyzing the implementation of government contracts, by using data from various sources, including the register of public procurement of the unified information system (UIS), the register of unscrupulous suppliers (RNP) of the EIS and the SPARK information system. The authors managed to achieve high prediction accuracy (more than 97%) and analyze the most important and significant features. The scientific novelty lies in the fact that the results obtained make it possible to identify and analyze factors from three information systems that influence the risks of non-fulfillment of government contracts. Thus, this study is valuable and important in its field, which contributes to the development of more effective risk management methods and increased efficiency in the implementation of government contracts. The results obtained allow us to identify the factors that have the greatest impact on the risks of non-fulfillment of contracts, which makes the study valuable and important in this area.
Nikitin P.V., Andriyanov N.A., Gorokhova R.I., Bakhtina E.Y., Dolgov V.I., Korovin D.I. —
Methodology for assessing the risks of fulfilling government contracts using machine learning tools
// Software systems and computational methods. – 2023. – ¹ 4.
– P. 44 - 60.
DOI: 10.7256/2454-0714.2023.4.44113
URL: https://en.e-notabene.ru/itmag/article_44113.html
Read the article
Abstract: The subject of the research is the development of a software package for intelligent forecasting of the execution of government contracts using machine learning methods and analysis of unstructured information.
The object of the study is the process of control and decision-making in the field of public procurement, including the selection of contractors, the execution of contracts and the assessment of the timing and cost of their implementation.
Special attention in the study is paid to the development and application of interpreted machine learning methods to solve the problems of assessing the risks of choosing an unscrupulous contractor, the risks of non-fulfillment of the contract on time and forecasting the likely timing and cost of contract implementation.
The authors consider in detail such aspects as a unique set of data that was collected from various information systems. They have also developed automated data collection and update systems that can be installed on customers' servers. The methods of machine learning, analysis of unstructured information and interpreted methods were used in the work. Interpreted machine learning models were built to assess the risk of choosing an unscrupulous contractor, assess the risk of non-fulfillment of the contract on time, as well as assess the likely timing and cost of contract implementation. A unique set of data was collected in the work, including more than 83 thousand data on more than 190 features from various systems, such as the Unified Information System (UIS) Public Procurement Register, the Register of Unscrupulous Suppliers (RNP) EIS and SPARK Information System. Automated data collection and updating systems have been developed that can be deployed on customer servers.
In the course of the study, software packages were developed for intelligent forecasting of the execution of government contracts, which provide an opportunity to conduct a more accurate risk analysis using unstructured information analysis methods, machine learning models and interpreted methods. This makes it possible to increase the effectiveness of monitoring the implementation of government contracts and reduce the likelihood of corruption and violations. The study demonstrates the importance and applicability of machine learning methods and models in the field of public contracts and provides new opportunities for improving control and decision-making processes in the field of public procurement.
Nikitin P.V., Osipov A.V., Pleshakova E.S., Korchagin S.A., Gorokhova R.I., Gataullin S.T. —
Emotion Recognition by Audio Signals as one of the Ways to Combat Phone Fraud
// Software systems and computational methods. – 2022. – ¹ 3.
– P. 1 - 13.
DOI: 10.7256/2454-0714.2022.3.38674
URL: https://en.e-notabene.ru/itmag/article_38674.html
Read the article
Abstract: The relevance of the study is dictated by the current state in the field of telephone fraud. According to research conducted by Kaspersky Lab, the share of users who encountered various unwanted spam calls in the spring of 2022 was at the level of 71%. The subject of the research is machine learning and deep learning technologies for determining emotions by the timbre of the voice. The authors consider in detail such aspects as: the creation of a marked-up dataset; the conversion of WAV audio format into a numerical form convenient for fast processing; machine learning methods for solving the problem of multiclass classification; the construction and optimization of neural network architecture to determine emotions in real time. A special contribution to the study of the topic is that the authors implemented a fast method of conversion sound formats into numerical coefficients, which significantly increased the speed of data processing, practically without sacrificing their informativeness. As a result, the models were trained by machine learning algorithms quickly and efficiently. It should be particularly noted that the architecture of a convolutional neural network was modeled, which allowed to obtain the quality of model training up to 98%. The model turned out to be lightweight and was taken as the basis for training the model to determine emotions in real time. The results of the real-time operation of the model were comparable with the results of the trained model. The developed algorithms can be implemented in the work of mobile operators or banks in the fight against telephone fraud.
The article was prepared as part of the state assignment of the Government of the Russian Federation to the Financial University for 2022 on the topic "Models and methods of text recognition in anti-telephone fraud systems" (VTK-GZ-PI-30-2022).
Nikitin P.V. —
Increasing efficiency of physics education through elective courses of “Physics Fundamentals of Information Security”
// Modern Education. – 2020. – ¹ 2.
– P. 28 - 42.
DOI: 10.25136/2409-8736.2020.2.33254
URL: https://en.e-notabene.ru/pp/article_33254.html
Read the article
Abstract: The object of this research is the increase in motivation of students towards learning physics as one of the most complex sciences of school curriculum. The subject of this research is the elective course of “Physics Fundamentals of Information Security” developed by the author, based on the cross-disciplinary integration of such disciplines as physics, informatics, and information security. An extensive analysis is conducted on textbooks on physics and scientific methodical sources of literature on information security. Special attention is given to methodological questions of teaching this elective course, structured on application of the method of problem-based learning as an optimal method for search and acquisition of new knowledge and active learning activity. The scientific novelty consists in development of the elective course “Physics Fundamentals of Information Security”, which has applied aim. The laboratory works developed by the author in such way that the students learn the laws of physics in the course of completing the research. They first see “how it works”, and then make conclusions as formulas, after which they solve the theoretical tasks on these topics, understanding entirety of the depth. This course is registered in Rospatent as the database Electronic Educational Resource on the Discipline “Physics Fundamentals of Information Security”. The author pays particular attention to implementation of this course into educational process, as well as describes the methodological system of teaching and the pedagogical experiment that proves the effectiveness of this course.