CYBERSECURITY POLICY CONTROL SYSTEM WITH ELEMENTS OF ARTIFICIAL INTELLIGENCE OF THE CORPORATE COMMUNICATION NETWORK

Authors

DOI:

https://doi.org/10.20998/2079-0023.2025.01.02

Keywords:

cybersecurity, threats, protection, corporate networks, artificial intelligence, Theil index

Abstract

In today’s digital world, where almost all aspects of life are connected to the Internet, cybersecurity is not just important but an integral part of our reality. It ensures the smooth operation of services: from email to social and corporate networks across all sectors of critical infrastructure in countries worldwide. The development of artificial intelligence in the field of cybersecurity opens up significant potential for improving the effectiveness of information protection in all sectors of critical infrastructure. The developed system relates to the cybersecurity policy with artificial intelligence elements for corporate communication networks. The goal is to improve the accuracy of forming and controlling the cybersecurity policy of corporate communication networks by identifying techniques for executing computer attacks using artificial intelligence and analyzing the situation and vulnerabilities present in the software infrastructure. To achieve this goal, a cybersecurity policy control system with artificial intelligence elements for corporate communication networks was developed. The effectiveness of the developed system was calculated by comparing Theil coefficients to assess its validity. The developed system processes and evaluates information using artificial intelligence, including comparator identification, which allows for understanding the capabilities and techniques of executing each known computer attack. It also uses a situational text predicate to identify and analyze the situation of a cyberattack and predict its trajectory, determining the likelihood of each known attack and comparing it with the effectiveness of existing defense measures. By comparing the calculated Theil coefficients of the system with an existing analogue, it was concluded that the validity of forming a cybersecurity policy with artificial intelligence elements in the developed system is higher than that of the analogue, confirming the achievement of the proposed technical result. The use of AI in corporate communication networks enables faster and more efficient detection, analysis, and response to cyber threats, providing a high level of protection against modern cyberattacks. The integration of AI into cybersecurity also enhances security and improves the ability to respond to the challenges of today’s digital environment. Thus, AI integration in the field of cybersecurity opens up new opportunities for ensuring effective and comprehensive protection against cyber threats in the modern digital world, becoming a key factor in ensuring future cybersecurity.

Author Biographies

Andrii Levterov, Kharkiv National Automobile and Highway University

Candidate of Technical Sciences, Full Professor, Kharkiv National Automobile and Highway University, Professor at the Department of Informatics and Applied Mathematics, Kharkiv, Ukraine

Ganna Pliekhova, Kharkiv National Automobile and Highway University

Candidate of Technical Sciences, Associate Professor, Kharkiv National Automobile and Highway University, Head of the Department of Informatics and Applied Mathematics, Kharkiv, Ukraine

Maryna Kostikova, Kharkiv National Automobile and Highway University

Candidate of Technical Sciences, Associate Professor, Kharkiv National Automobile and Highway University, Associate Professor at the Department of Informatics and Applied Mathematics, Kharkiv, Ukraine

Anton Okun, National Technical University "Kharkiv Polytechnic Institute"

Candidate of Technical Sciences, Associate Professor, National Technical University "Kharkiv Polytechnic Institute", Associate Professor at the Department of Computer Modeling and Integrated Forming Technologies, Kharkiv, Ukraine

References

Orhanizatsiia kanalu peredachi danykh dlia biznesu. [Organization of data transmission channel for business]. GigaTrans Telecom operator. Available at https://gigatrans.ua/ua/services/organizaciya-kanala-peredachi-dannuh. (accessed: 20.01.2025).

DSTU ISO/IEC 27001:2023 Informatsiina bezpeka, kiberbezpeka ta zakhyst konfidentsiinosti. Systemy keruvannia informatsiinoiu bezpekoiu. Vymohy (ISO/IEC 27001:2022, IDT) [Information Security, cybersecurity and privacy protection. Information security management systems. Requirements] / National Standart of Ukraine. Кyiv: DP «UkrNDNC» Publ., 2022. 26 p.

Bezpeka. [Safety]. CityHost. Available at https://cityhost.ua/uk/blog/bezopasnost/2/. (accessed: 20.01.2025).

2024 SonicWall Cyber Threat Report. Marlin Communications. Available at https://marlincomms.co.uk/wp-content/uploads/2024/ 03/SonicWall-Marlin-Cybersecurity-Threat-Report-compressed.pdf. (accessed: 20.01.2025).

Hraivoronskyi M. V., Novikov O. M. Bezpeka informatsiino-komunikatsiinykh system [Security of information and communication systems]. Kyiv: BHV Publ., 2009. 608 p.

Kucherniuk P. V. Metody i tekhnolohii zakhystu komp’iuternykh merezh (fizychnyi ta kanalnyi rivni) [Methods and technologies for protecting computer networks (physical and channel levels)]. Mikrosystemy, Elektronika ta Akustyka [Microsystems, Electronics and Acoustics]. 2017. Vol. 22, Iss. 6(101). pp. 64–70.

Smelyakov K., Chupryna A., Darahan D., Midina S. Effectiveness of modern text recognition solutions and tools for common data sources. CEUR Workshop Proceedings, 2021, Vol. 2870, pp. 154–165.

Smelyakov K., Pribylnov D., Martovytskyi V., Chupryna A. Investigation of network infrastructure control parameters for effective intellectual analysis. 14th International Conference on Advanced Trends in Radioelecrtronics, Telecommunications and Computer Engineering (TCSET). Lviv-Slavske, Ukraine, 2018, pp. 983–986.

Bondarchuk O. I., Naumenko T. S., Tovt B. M. Rozrobka ta vprovadzhennia innovatsiinykh metodiv kiberbezpeky u komp’iuternykh systemakh. [Development and implementation of innovative cybersecurity methods in computer systems]. Tavriiskyi naukovyi visnyk. Seriia: Tekhnichni nauky [Tavria Scientific Bulletin. Series: Technical Sciences], 2024, Iss. 4, pp. 31–40.

Levterov A. I., Pliekhova H. A., Sharonova N. V., Neronov S. M. Systema kontroliu polityky kiberbezpeky z elementamy shtuchnoho intelektu korporatyvnoi merezhi zv’iazku [Cybersecurity policy control system with elements of artificial intelligence of a corporate communication network]. Patent UA, no.157855, 2024.

Hasan S. K. Computer security based on Artificial intelligence. Patent US, no. 2017/0214701 A1. 2017.

Bellù L. G., Liberati P. Describing Income Inequality. Theil Index and Entropy Class Indexes. Open Knowledge. Available at https://openknowledge.fao.org/ server/api/core/bitstreams/2d4181c9-30f3-4511-a1f8-f641ab0a13d8/content. (accessed 20.01.2025).

Published

2025-07-11

How to Cite

Levterov, A., Pliekhova, G., Kostikova, M., & Okun, A. (2025). CYBERSECURITY POLICY CONTROL SYSTEM WITH ELEMENTS OF ARTIFICIAL INTELLIGENCE OF THE CORPORATE COMMUNICATION NETWORK. Bulletin of National Technical University "KhPI". Series: System Analysis, Control and Information Technologies, (1 (13), 10–16. https://doi.org/10.20998/2079-0023.2025.01.02

Issue

Section

CONTROL IN TECHNICAL SYSTEMS