Nataliia Lukova-Chuiko

Work place: Taras Shevchenko National University of Kyiv, Kyiv, Ukraine



Research Interests: Image Compression, Image Manipulation, Image Processing, Analysis of Algorithms, Mathematics of Computing, Theory of Computation, Models of Computation


Nataliia Lukova-Chuiko was born in 1982. She graduated from Taras Shevchenko National University of Kyiv and got a degree in "Mathematics". In 2010 she defended her thesis for the degree of candidate of Physics and Mathematics sciences, the specialty is "Geometry and Topology". She has held the post of the Assistant professor of the Dapartment of Cyber Security and Information Protection in Taras Shevchenko National University of Kyiv since 2014. She is the author of more than 35 scientific publications. Her scientific interests lie in the field of information protection, cryptography, problems of cyber security, methods and means of digital image processing, geometry and topology.

Author Articles
The Method of Hidden Terminal Transmission of Network Attack Signatures

By Igor Ruban Nataliia Lukova-Chuiko Vadym Mukhin Yaroslav Kornaga Igor Grishko Anton Smirnov

DOI:, Pub. Date: 8 Apr. 2018

This article is proposes a new approach to the transmission of signatures of network attacks onto a remote Internet resource. The problem is that the known protocols that are used for transfer data and control actions from an administrative resource to a network agents are poorly protected. Even in case of use of cryptographic mechanisms for organization of secure connections, it is possible to form behavioral patterns of interactions such as "administrative resource - network agents." Such templates allow to predict the actions taken in accordance with the security policy in order to maintain the required level of functionality of a remote Internet resource. Thus, it is necessary to develop a new protocol for the transfer of designated information, based on information technology, which level out the existence of opportunities for the formation of behavioral patterns of network interactions. As such technology, it is proposed to use a set of means of network interaction and some methods of hidden (steganographic) data transmission in information and telecommunication networks.

[...] Read more.
Other Articles