Protection of critical infrastructure: methods of counteracting targeted attacks on electronic communication systems of the security and defense forces of Ukraine
DOI:
https://doi.org/10.33405/2786-8613/2025/2/6/350828Keywords:
targeted attacks, cybersecurity, security and defense forces of Ukraine, cryptographic protection, frequency-hopping spreading, communication systemsAbstract
The article examines the problem of ensuring the protection of electronic communication systems of the Security and Defense Forces of Ukraine under the conditions of modern hybrid warfare, which is accompanied by the growing impact of cyber and radio-electronic threats. It is demonstrated that traditional information security approaches focused exclusively on cryptographic methods or radio engineering solutions are insufficient given the complex multi-vector influence of the adversary. Particular attention is paid to a comprehensive approach to countering targeted attacks, which encompasses cybersecurity measures, physical protection of communication equipment, and improvement of electronic communication protocols. A multi-layer cyber protection model is proposed, combining cryptographic mechanisms (AES-256, RSA, NTRU), adaptive frequency-hopping techniques, the use of SIEM systems, and the reservation of HF/VHF/UHF and satellite communication channels. The results show that the proposed solutions significantly reduce the risk of successful targeted attacks, improve the continuity and reliability of communication processes, and ensure an adequate level of information security. The article outlines directions for future research related to the integration of quantum-resistant encryption algorithms, the development of artificial-intelligence-based threat detection technologies, the creation of unified standards and methodological recommendations for building comprehensive cybersecurity systems for military communications, and the improvement of physical protection measures for electronic communication infrastructure, including Starlink satellite equipment. The findings confirm the effectiveness of the integrated cybersecurity approach and its scalability for real combat conditions.
References
Kamien D. (Ed.). The McGraw-Hill Homeland Security Handbook. McGraw-Hill, 2017. Retrieved from: https://www.mheducation.com/ (accessed 08 February 2025) [in English].
DiMaggio J., Peterson M. Threat Intelligence and Incident Response: High-stakes Security. O’Reilly Media, 2016. Retrieved from: https://www.oreilly.com/library/view/threat-intelligence-and/9781491935199/ (accessed 08 February 2025) [in English].
NIST SP 800-160. Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. National Institute of Standards and Technology, 2018. DOI: 10.6028/NIST.SP.800-160. Retrieved from: https://doi.org/10.6028/NIST.SP.800-160 (accessed 08 February 2025) [in English].
Kott A., Swami A. Cyber Defense and Situational Awareness. Springer, 2016. DOI: 10.1007/978-3-319-25107-5. Retrieved from:https://doi.org/10.1007/978-3-319-25107-5 (accessed 08 February 2025) [in English].
Buchanan W. J., Macfarlane R., Smith D. Advanced Cryptographic Methods for Secure Military Communication. Information Security Journal, 2020, vol. 29, no. 3, pp. 202–214. DOI: 10.1080/19393555.2020.1767752. Retrieved from: https://doi.org/10.1080/19393555.2020.1767752 (accessed 08 February 2025) [in English].
Koblitz N., Menezes A. A Survey of the Security of Elliptic Curve Cryptosystems. SIAM Review, 2017, vol. 59, no. 1, pp. 42–55. DOI: 10.1137/151003604. Retrieved from: https://doi.org/10.1137/151003604 (accessed 08 February 2025) [in English].
Sharma G., Chen D. A Study on Post-Quantum Cryptography: RSA and ECC. Journal of Cryptographic Engineering, 2018, vol. 8, no. 4, pp. 275–286. DOI: 10.1007/s13389-018-0186-5. Retrieved from: https://doi.org/10.1007/s13389-018-0186-5 (accessed 08 February 2025) [in English].
Bansal M., Kumar R. Radio Frequency Jamming Techniques and Their Countermeasures. IEEE Communications Surveys & Tutorials, 2017, vol. 19, no. 1, pp. 677–694. DOI: 10.1109/COMST.2016.2614462. Retrieved from: https://doi.org/10.1109/COMST.2016.2614462 (accessed 08 February 2025) [in English].
Strobel D., Hess M. Satellite System Vulnerabilities, Security Issues, and Mitigation Techniques. IEEE Aerospace and Electronic Systems Magazine, 2018, vol. 33, no. 4, pp. 22–31. DOI: 10.1109/MAES.2018.160122. Retrieved from: https://doi.org/10.1109/MAES.2018.160122 (accessed 08 February 2025) [in English].
Huber M., Kann V. Frequency Hopping for Military Communications: A Survey of Evolving Standards. IEEE Communications Surveys & Tutorials, 2020, vol. 22, no. 3, pp. 1345–1357. DOI: 10.1109/COMST.2020.2987303. Retrieved from: https://doi.org/10.1109/COMST.2020.2987303 (accessed 08 February 2025) [in English].
Zhang Y., Rayi V. K. Physical Layer Security in Frequency Hopping Systems. Wireless Personal Communications, 2018, vol. 101, no. 4, pp. 297–312. DOI: 10.1007/s11277-018-5745-9. Retrieved from: https://doi.org/10.1007/s11277-018-5745-9 (accessed 08 February 2025) [in English].
Ciampa M. Security+ Guide to Network Security Fundamentals. Cengage Learning, 2018. Retrieved from: https://www.cengage.com/ (accessed 08 February 2025) [in English].
Fulp E. W., Reeves D. S. A Multi-agent System for Network Intrusion Detection and Response. Journal of Network and Systems Management, 2015, vol. 23, no. 4, pp. 381–404. DOI: 10.1007/s10922-014-9325-2. Retrieved from: https://doi.org/10.1007/s10922-014-9325-2 (accessed 08 February 2025) [in English].
Zuech R., Khoshgoftaar T. M., Wald R. Intrusion Detection and Big Heterogeneous Data: A Survey. Journal of Big Data, 2015, vol. 2, no. 1, p. 3. DOI: 10.1186/s40537-015-0013-4. Retrieved from: https://doi.org/10.1186/s40537-015-0013-4 (accessed 08 February 2025) [in English].
Strohm M. Examining Resilience in Satellite Communications: Starlink, OneWeb, and Other LEO Constellations. International Journal of Satellite Communications, 2019, vol. 37, no. 2, pp. 97–105. DOI: 10.1002/sat.1301. Retrieved from: https://doi.org/10.1002/sat.1301 (accessed 08 February 2025) [in English].
Trichakis G., Street M. Global Iridium-based Communication in Modern Military Operations. Defense Technology Review, 2021, vol. 29, no. 2, pp. 45–52. Retrieved from: https://www.defensetechnologyreview.com/ (accessed 08 February 2025) [in English].
National Security Agency. Commercial National Security Algorithm Suite 2.0. NSA/CSS, 2022. Retrieved from: https://www.nsa.gov/ (accessed 08 February 2025) [in English].