Sergiy Bondar

Work place: International Research and Training Center for Information Technologies and Systems, Kyiv, Ukraine



Research Interests: Information Security, Network Security, Data Structures and Algorithms


Serhii Bondar

PhD Student (2017-2021). In 2017 he received MSc degree in National Aviation University (Kyiv, Ukraine). He is currently working at International Research and Training Center for Information Technologies and Systems of the National Academy of Sciences (NAS) of Ukraine and Ministry of Education and Science (MES) of Ukraine.

Research interests: Cybersecurity, Telecomunication systems, Unmanned Aerial Vehicles, Data Processing.

Author Articles
Statistical Techniques for Detecting Cyberattacks on Computer Networks Based on an Analysis of Abnormal Traffic Behavior

By Zhengbing Hu Roman Odarchenko Sergiy Gnatyuk Maksym Zaliskyi Anastasia Chaplits Sergiy Bondar Vadim Borovik

DOI:, Pub. Date: 8 Dec. 2020

Represented paper is currently topical, because of year on year increasing quantity and diversity of attacks on computer networks that causes significant losses for companies. This work provides abilities of such problems solving as: existing methods of location of anomalies and current hazards at networks, statistical methods consideration, as effective methods of anomaly detection and experimental discovery of choosed method effectiveness. The method of network traffic capture and analysis during the network segment passive monitoring is considered in this work. Also, the processing way of numerous network traffic indexes for further network information safety level evaluation is proposed. Represented methods and concepts usage allows increasing of network segment reliability at the expense of operative network anomalies capturing, that could testify about possible hazards and such information is very useful for the network administrator. To get a proof of the method effectiveness, several network attacks, whose data is storing in specialised DARPA dataset, were chosen. Relevant parameters for every attack type were calculated. In such a way, start and termination time of the attack could be obtained by this method with insignificant error for some methods.

[...] Read more.
Other Articles