DEVELOPMENT OF A METHOD FOR CONSTRUCTING LINGUISTIC STANDARDS FOR MULTI-CRITERIA ASSESSMENT OF HONEYPOT EFFICIENCY (p. 14–23)

Advanced Research in Computer Science and Software Engineering, 6 (2), 418–423. 7. Biba, M., Gjati, E. (2014). Boosting Text Classification through Stemming of Composite Words. Recent Advances in Intelligent Informatics, 185–194. doi: https://doi.org/10.1007/978-3-319-01778-5_19 8. Farrar, D., Huffman Hayes, J. (2019). A Comparison of Stemming Techniques in Tracing. 2019 IEEE/ACM 10th International Symposium on Software and Systems Traceability (SST). doi: https://doi.org/ 10.1109/sst.2019.00017 9. Al-Sharhan, S., Al-Hunaiyyan, A., Alhajri, R., Al-Huwail, N. (2019). Utilization of Learning Management System (LMS) Among Instructors and Students. Advances in Electronics Engineering, 15–23. doi: https://doi.org/10.1007/978-981-15-1289-6_2 10. Joshi, A., Thomas, N., Dabhade, M. (2016). Modified Porter Stemming Algorithm. International Journal of Computer Science and Information Technologies, 7 (1), 266–269.

One of the pressing areas that is developing in the field of information security is associated with the use of Honeypots (virtual decoys, online traps), and the selection of criteria for determining the most effective Honeypots and their further classification is an urgent task. The main products that implement virtual decoy technologies are presented. They are often used to study the behavior, approaches and methods that an unauthorized party uses to gain unauthorized access to information system resources. Online hooks can simulate any resource, but more often they look like real production servers and workstations. A number of fairly effective developments are known that are used to solve the problems of detecting attacks on information system resources, which are based on the apparatus of fuzzy sets. They showed the effectiveness of the appropriate mathematical apparatus, the use of which, for example, to formalize the approach to the formation of a set of reference values that will improve the process of determining the most effective Honeypots. For this purpose, many characteristics have been formed (installation and configuration process, usage and support process, data collection, logging level, simulation level, interaction level) that determine the properties of online traps. These characteristics became the basis for developing a method for the formation of standards of linguistic variables for further selection of the most effective Honeypots. The method is based on the formation of a Honeypots set, subsets of characteristics and identifier values of linguistic estimates of the Honeypot characteristics, a base and derived frequency matrix, as well as on the construction of fuzzy terms and reference fuzzy numbers with their visualization. This will allow classifying and selecting the most effective virtual baits in the future.
Keywords: honeypot classification, virtual decoys, fuzzy standards, method of forming linguistic standards.
is logged by the DNS servers of the provider, which poses a threat to the privacy of users. A comprehensive algorithm of protection against the collection of user data, consisting of two modules, has been developed and tested. The first module makes it possible to redirect the communication device's DNS traffic through DNS proxy servers with a predefined anonymity class based on the proposed multitest. To ensure a smooth and sustainable connection, the module automatically connects to a DNS proxy server that has minimal response time from those available in the compiled list. The second module blocks the acquisition of data collected by the developers of the software installed on the user's communication device, as well as by specialized Internet services owned by IT companies. The proposed algorithm makes it possible for users to choose their preferred level of privacy when communicating with the Internet space, thereby providing them with a choice of privacy level and, as a result, limiting the possibility of information manipulation over their owners. The DNS traffic of various fixed and mobile communication devices has been audited. The analysis of DNS traffic has enabled to identify and structure the DNS requests responsible for collecting data from users by the Internet services owned by IT companies. The identified DNS queries have been blocked; it has been experimentally confirmed that the performance of the basic and application software on communication devices was not compromised.
Keywords: DNS query, DNS server, DNS leaks, DNS traffic, DNS proxy server, data collection. In order to identify ways used to collect data from user communication devices, an analysis of the interaction between DNS customers and the Internet name domain space has been carried out. It has been established that the communication device's DNS traffic A significant problem in the control field is the adjustment of PID controller parameters. Because of its high nonlinearity property, control of the DC motor system is difficult and mathematically repetitive. The particle swarm optimization PSO solution is a great optimization technique and a promising approach to address the problem of optimum PID controller results. In this paper, a modified particle swarm optimization PSO method with four inertia weight functions is suggested to find the global optimum parameters of the PID controller for speed and position control of the DC motor. Benchmark studies of inertia weight functions are described. Two scenarios have been suggested in order to modify PSO including the first scenario called M1-PSO and the second scenario called M2-PSO, as well as classical PSO algorithms. For the first scenario, the modification of the PSO was done based on changing the four inertia weight functions, social and personal acceleration coefficient, while in the second scenario, the four inertia weight functions have been changed but the social and personal acceleration coefficient stayed constant during the algorithm implementation. The comparison between the presented scenarios and traditional PID was carried out and satisfied simulation results have shown that the first scenario has rapid search speeds, and very effective and fast implementation compared to the second scenario and classical PSO and even improved PSO technique. Moreover, the proposed approach has a fast searching speed compared to classical PSO. However, it has been found that the classical PSO algorithm has a premature, inaccurate and local convergence process when solving complex optimization issues. The presented algorithm is proposed to increase the search speed of the original PSO. Keywords: tuning of PID, particle swarm optimization, DC motor, inertia weight functions.

Valerii Shevchenko
Training & Certifying Center of Seafarers National University «Odessa Maritime Academy», Odessa, Ukraine ORCID: http://orcid.org/0000-0003-  This paper considers the construction of principles and the synthesis of a system of effective control over the processes of synchronization of generator sets (GSs) that form a part of the distributed MP-control systems for complex ship technical systems and complexes (STS and C). The tasks of synchronization have been set, the process and database models have been built, the system configurations have been defined. Based on the use of resultant functions, we have determined stages in solving the tasks of control over the frequency adjustment synchronization in a hierarchical sequence. The performance analysis of the STS and C control elements has been carried out; the use of the integrated optimization criteria and dual management principles has been proposed. Practical techniques to manage the GS synchronization have been given. We have solved the problem of high-speed control over the frequency of synchronized objects based on the principles of adjustment. That has made it possible to determine in advance the moments of GS enabling under the deterministic and stochastic statement of the synchronization task. The results of the experimental study into the GS synchronization processes are given; the effectiveness of the proposed GS control has been proven. The principles underlying the construction of procedures to control the GS composition when using the methods of "rigid" and "flexible" thresholds have made it possible to define the optimization criteria and implement a control law that satisfied the condition for an extremum, which is an indicator of the feasibility of the set goal and takes into consideration the limitations of control influences. We managed to design a system in the class of adaptive control systems by the appropriate decomposition of the system's elements by splitting a synchronization task into the task on performance and the task on control under the required conditions. The given examples of the processes where the synchronization failed while using standard synchronizer control algorithms, as well as processes of successful GS synchronization when applying the proposed synchronizer dual control algorithms, have confirmed the reliability of the main scientific results reported here.