Skip to main content

Showing 1–6 of 6 results for author: Buriachok, V

Searching in archive cs. Search in all archives.
.
  1. Research of Caller ID Spoofing Launch, Detection, and Defense

    Authors: Volodymyr Buriachok, Volodymyr Sokolov, Mahyar TajDini

    Abstract: Caller ID parodying produces the valid Caller character, in this manner deciding seem to start from another client. This apparently basic assault strategy has been utilized in the develo** communication fake and trick calls, bringing about significant financial trouble. Unfortunately, callerID spoofing is easy to implement but yet it is difficult to have protection against it. In addition, there… ▽ More

    Submitted 1 April, 2020; originally announced April 2020.

    ACM Class: C.2.0; C.2.1

    Journal ref: Cybersecurity: Education, Science, Technique (ISSN: 2663-4023), no. 7(3), 2020

  2. Implementation of an Index Optimize Technology for Highly Specialized Terms based on the Phonetic Algorithm Metaphone

    Authors: V. Buriachok, M. Hadzhyiev, V. Sokolov, P. Skladannyi, L. Kuzmenko

    Abstract: When compiling databases, for example to meet the needs of healthcare establishments, there is quite a common problem with the introduction and further processing of names and last names of doctors and patients that are highly specialized both in terms of pronunciation and writing. This is because names and last names of people cannot be unique, their notation is not subject to any rules of phonet… ▽ More

    Submitted 31 October, 2019; originally announced November 2019.

    ACM Class: F.2.2; H.3.3

    Journal ref: Eastern-European Journal of Enterprise Technologies (ISSN: 1729-4061). 2019. Vol. 5. No. 2(101)

  3. Men-in-the-Middle Attack Simulation on Low Energy Wireless Devices using Software Define Radio

    Authors: Mahyar TajDini, Volodymyr Sokolov, Volodymyr Buriachok

    Abstract: The article presents a method of organizing men-in-the-middle attack and penetration test on Bluetooth Low Energy devices and ZigBee packets using software define radio with sniffing and spoofing packets, capture and analysis techniques on wireless waves with the focus on Bluetooth. The paper contains the analysis of the latest scientific work in this area, provides a comparative analysis of SDRs… ▽ More

    Submitted 26 June, 2019; originally announced June 2019.

    ACM Class: C.2.0; C.2.1; K.6.5

    Journal ref: Mathematics. Information Technologies. Education (MoMLeT&DS), 2019

  4. Security Rating Metrics for Distributed Wireless Systems

    Authors: Volodymyr Buriachok, Volodymyr Sokolov, Pavlo Skladannyi

    Abstract: The paper examines quantitative assessment of wireless distribution system security, as well as an assessment of risks from attacks and security violations. Furthermore, it describes typical security breach and formal attack models and five methods for assessing security. The proposed normalized method for assessing the degree of security assurance operates with at least three characteristics, whi… ▽ More

    Submitted 26 June, 2019; originally announced June 2019.

    ACM Class: C.2.0; C.2.1; H.3.4

    Journal ref: Mathematics. Information Technologies. Education (MoMLeT&DS), 2019

  5. Low-Cost Spectrum Analyzers for Channel Allocation in Wireless Networks 2.4 GHz Range

    Authors: Volodymyr Buriachok, Volodymyr Sokolov

    Abstract: The article introduces a new scheme of dynamic interference free channel allocation. The scheme is based on additional spectral analyzers in wireless networks IEEE 802.11. Design and implementation is presented.

    Submitted 22 February, 2019; originally announced February 2019.

    ACM Class: C.2.0; C.2.1

    Journal ref: World Science (ISSN: 2413-1032), no 3 (31), vol. 1, Warsaw, RS Global Sp. z O. O., 2018

  6. Using 2.4 GHz Wireless Botnets to Implement Denial-of-Service Attacks

    Authors: Volodymyr Buriachok, Volodymyr Sokolov

    Abstract: This article attempts to create a software and hardware complex that can work autonomously and demonstrates the ease of implementation of attacks on denial of service on wireless networks, which in turn emphasizes the need to provide comprehensive protection of wireless networks.

    Submitted 22 February, 2019; originally announced February 2019.

    ACM Class: C.2.0; C.2.1

    Journal ref: Web of Scholar (ISSN: 2518-167X), no. 6 (24), vol. 1, Warsaw, RS Global Sp. z O. O., 2018