Methodological Foundations of Calculating Cybersecurity from Specialized Determinants of Communication Networks

PDF (778KB), PP.1-15

Views: 0 Downloads: 0

Author(s)

Volodymyr Akhramovych 1 Vadym Akhramovych 2 Alla Kobozieva 3 Oleksandr Laptiev 4,*

1. Department of Cybersecurity of the State University "Kyiv Aviation Institute", Kyiv, Ukraine

2. Computing Center of the National Academy of Statistics, Accounting and Auditing, Kyiv, Ukraine

3. Department of Technical Cybernetics and Information Technology n.a. Prof. R.V. Merkt, Odesa National Maritime University, Odesa, Ukraine

4. Department of Cyber Security and Information Protection Faculty of Information Technology, Taras Shevchenko National University of Kyiv

* Corresponding author.

DOI: https://doi.org/10.5815/ijwmt.2026.02.01

Received: 6 Mar. 2025 / Revised: 31 Oct. 2025 / Accepted: 20 Jan. 2026 / Published: 8 Apr. 2026

Index Terms

Communication networks, cybersecurity, parameters, system, modeling, mathematical equations with derivatives, specialized determinants, oscillatory processes, nonlinearity, stability

Abstract

The article proposes a conceptually new approach to assessing cybersecurity in modern communication networks, which is based on taking into account specialized determinants — sociotechnical parameters that reflect the structural and functional complexity of network interactions. Such determinants include the centrality of nodes, the level of mutual support, the intensity of information exchange, the degree of community connectivity, user popularity, and other non-trivial characteristics that traditional protection mechanisms based on static models ignore. The central idea of the study is to formalize the dynamic stability of the cybersecurity system by building a nonlinear mathematical model that takes into account the nonlinear relationships between these determinants and the general state of network security. Methodologically, the problem is reduced to the formulation of a system of ordinary differential equations that describes the evolution of the system state under the influence of external and internal disturbances, in particular, cyberattacks. For the analytical study of stability, the method of exceptions and solution of the corresponding homogeneous characteristic equation was used, which allows for to identification the conditions of asymptotic stability. Numerical modeling was performed in the MATLAB/Multisim environment, where phase portraits were synthesized, which clearly demonstrate the stable behavior of the system even in the maximum load mode and in the presence of large-scale attacks. The obtained quantitative results confirm that the proposed model adequately reproduces the dynamics of cyber defense and provides the ability to predict the state of the system under conditions of variable network parameters. The key scientific contribution is the development of methodological principles that combine the theory of nonlinear dynamical systems, graph theory, and sociotechnical analysis to form an adaptive, predictive architecture of cyber defense, focused on complex, evolutionary communication networks.

Cite This Paper

Volodymyr Akhramovych, Vadym Akhramovych, Alla Kobozieva, Oleksandr Laptiev, "Methodological Foundations of Calculating Cybersecurity from Specialized Determinants of Communication Networks", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.16, No.2, pp. 1-15, 2026. DOI:10.5815/ijwmt.2026.02.01

Reference

[1]Lukova-Chuyko N.V., Laptev O.A., Barabash O.V., Musienko A.P., Akhramovich V.M. Method for calculating personal data protection taking into account a complex of specific parameters of social networks. Collection of scientific works of the Military Institute of the Taras Shevchenko National University of Kyiv. Kyiv: VIKNU, 2022. No. 76. P. 54 – 68. https://doi.org/10.17721/2519-481X/2022/76-05.
[2]Albert R., Barabási A.-L. Statistical mechanics of complex networks // Review of Modern Physics, 2002. – 74. – P. 47-97.
[3]Bonacich P. F. Simultaneous group and individual centralities // Soc. Networks. 1991. V. 13. P. 155-168.
[4]Friedkin N.E. Theoretical foundations for centrality measures // Amer. J. Sociol. 1991. V. 96. P. 1478-1504.
[5]Valente T. W., Foreman R. K. Integration and radiality: measuring the extent of an individual's connectedness and reachability in a network // Soc. Networks. 1998. V. 20. P. 89-105.
[6]Wang Yu; Gumare, Eshwar; Vandenberghe, Rick; Dupont, Patrick (2017). "Comparison of various generalized clustering coefficients and local efficiency for weighted undirected graphs". Neural calculations. 29 (2): 313–331. doi: 10.1162/NECO_a_00914. Checked on August 8, 2020.
[7]Vasenin V. A., Afonyn S. A., Panyushkin D. WITH. Models of information dissemination in social networks. Software engineering.-2012.-№2 c. 33–42
[8]Horkovenko D.K. Comparative analysis of epidemic models and cellular automata when modeling the spread of information in social networks // Scientific and technical bulletins of SPbHPU. Informatics. Telecommunications. Administration. 2017. T. 10. No. 3. S. 103–113.
[9]Gubanov D. AND. Overview of online reputation/trust systems. – 2009. – M.: IPU RAS, Internet conference on management problems (www.mtas.ru/forum). - 25 p.
[10]Gubanov D.A., Novikov D.A., Chkhartishvili A.G. "Social networks: models of informational influence, control and struggle", 2010 - 228 pages.
[11]Machueva D. A., Azhmukhamedov I. M. Modeling the process of information interaction in social systems. Systems of management, communication and security No. 2, 2018, p. 18-39.
[12]Naydenov N.D., Spiryagin I.V., Novokshonova E.N. Economic and mathematical models of the cluster. Modern research of social problems (electronic scientific journal), Modern Research of Social Problems, No. 9(53), 2015. p. 415-432.
[13]Pavlov Yu. L., Cheplyukova I. AND. On the asymptotics of the power structure of configuration graphs with restrictions on the number of edges // Diskretnaya mathematica, 2018. Vol. 30. Issue 1. S. 77–94.
[14]Podlazov A.V. Zipf's law and models of competitive growth // New in synergetics. Nonlinearity in modern natural science / Ed. H.G. Malynetsky / Synergetics: from the past to the future. - M.: LIBROKOM, 2009. P.229-256.
[15]Podlazov A.V., Shchetinina D.P. A model of the growth of the social network // Preprints of the IPM named after M.V. Keldysha. 2013. No. 95. 16 p. URL: http://library.keldysh.ru/preprint.asp?id=2013-95
[16]Raigorodsky A.M. Models of random graphs and their application // Tr. MIFT 2010. Vol. 2, No. 4. P. 130–140.
[17]Trubetskov D.I. Introduction to synergy. Chaos and structure. Ed. 2nd expt. And add. – M. Editorial. URSS 2004. 240 p.
[18]D. Salnikov, D. Karaman, and V. Krylova, “Highly reconfigurable soft-cpu based peripheral modules design”, Advanced Information Systems, vol. 7, no. 2, pp. 92–97, 2023, doi: https://doi.org/10.20998/2522-9052.2023.2.13
[19]A. Podorozhniak, N. Liubchenko, V. Oliinyk, and V. Roh, “Research application of the spam filtering and spammer detection algorithms on social media and messengers ”, Advanced Information Systems, vol. 7, no. 3, pp. 60–66, 2023, doi: https://doi.org/10.20998/2522-9052.2023.3.09
[20]I. Petrovska, and H. Kuchuk, “Adaptive resource allocation method for data processing and security in cloud environment”, Advanced Information Systems, vol. 7, No. 3, pp. 67–73, 2023, doi: https://doi.org/10.20998/2522-9052.2023.3.10
[21]N. Dzheniuk, S. Yevseiev, B. Lazurenko, O. Serkov, and O. Kasilov, “A method of protecting information in cyber-physical space”, Advanced Information Systems, vol. 7, no. 4, pp. 80–85, 2023, doi: https://doi.org/10.20998/2522-9052.2023.4.11
[22]Valentyn Sobchuk, Inna Kal’chuk, Galyna Kharkevych, Oleksandr Laptiev, Yurii Kharkevych, Andriy Makarchuk. Solving the Problem of Convergence of the Results of Analog Signals Conversion in the Process of Aircraft Control. 2021 IEEE 6 th Internaional Conference. Actual Problems of Unmanned Aerial Vehicles development (APUAVD). October 19-21. 2021. Kyiv. Ukraine. Р.29-33, ISBN: 978-1-6654-3821-6. IEEE Catalog Number: CFP2129V-USB.
[23]Lukova-Chuiko, N., Herasymenko, O., Toliupa, S., ...Laptievа, T., Laptiev, O. The method detection of radio signals by estimating the parameters signals of eversible Gaussian propagation. 2021 IEEE 3rd International Conference on Advanced Trends in Information Theory, ATIT 2021 - Proceedings, 2021, Р. 67–70
[24]Serhii Yevseiev & Yuliia Khokhlachova & Serhii Ostapov & Oleksandr Laptiev et al, 2023. "Models of socio-cyber-physical systems security," Monographs, PC TECHNOLOGY CENTER, number 978-617-7319-72-5.redif, December. DOI: https://doi.org/10.15587/978-617-7319-72-5
[25]O. Laptiev, I. Parkhomenko, A. Musienko, A. Makarchuk, A. Mishchuk and D. Shapovalov, Weierstrass Method of Analogue Signal Approximation, 2023 IEEE 4th KhPI Week on Advanced Technology (KhPIWeek) ", Kharkiv, Ukraine, 02-06 October 2023, pp. 1-6.   https://doi.org/10.1109/KhPIWeek61412.2023.10311583
[26]F. K. Mammadov, “New approach to book cipher: web pages as a cryptographic key”, Advanced Information Systems, vol. 7, no. 1, pp. 59–65, 2023, doi: https://doi.org/10.20998/2522-9052.2023.1.10
[27]S. Datsenko, and H. Kuchuk, “Biometric authentication utilizing convolutional neural networks”, Advanced Information Systems, vol. 7, no. 2, pp. 87–91, 2023, doi: https://doi.org/10.20998/2522-9052.2023.2.12