Model and methodology for the formation of adaptive security profiles for the protection of wireless networks in the face of dynamic cyber threats

Skladannyi, Pavlo та Kostiuk, Yuliia та Khorolska, Karyna та Bebeshko, Bohdan та Sokolov, Volodymyr (2025) Model and methodology for the formation of adaptive security profiles for the protection of wireless networks in the face of dynamic cyber threats Cyber Security and Data Protection 2025, 4042. с. 17-36. ISSN 1613-0073

[thumbnail of P_Skladannyi_Y_Kostyuk_K_Khorolska_B_Bebeshko_V_Sokolov_CSDP_4042_2025.pdf] Текст
P_Skladannyi_Y_Kostyuk_K_Khorolska_B_Bebeshko_V_Sokolov_CSDP_4042_2025.pdf

Download (1MB)
Офіційне посилання: https://ceur-ws.org/Vol-4042/

Анотація

The paper introduces a comprehensive model and accompanying methodology for constructing adaptive security profiles aimed at protecting wireless networks under dynamic cyber-threat conditions. The significance of the study stems from the ever-escalating complexity of attacks targeting wireless infrastructures, the widespread emergence of hybrid threat scenarios, the continual expansion of client-device diversity (including IoT endpoints), and the increasingly rapidly evolving risk landscape. The investigation was conducted with explicit reference to contemporary international cybersecurity standards—IEEE 802.11ax/802.11be, ISO/IEC 27033, ISO/IEC 15408, and NIST SP 800-53—and was guided by the principles of Zero-Trust architecture, which advocates a context-sensitive approach to designing access-control, authentication, encryption, and monitoring policies. The proposed model facilitates the creation of a family of security profiles that can be dynamically updated in accordance with the prevailing threat level, interaction modality, trust degree assigned to participating nodes, and detected behavioral anomalies within network traffic. The developed methodology incorporates a multifactorial risk assessment that considers the technological characteristics of the transmission medium, observed attack activity, interference levels, and the specific access context. Consequently, the model can underpin automated solutions that enhance cyber-resilience, certify the security posture of wireless networks, and enable dynamic, real-time audit mechanisms.

Тип елементу : Стаття
Ключові слова: adaptive security; security profiles; wireless network; Zero Trust; IEEE 802.11; dynamic threats; risk assessment; access policy; audit; international standards
Типологія: Статті у базах даних > Scopus (без квартилю)
Підрозділи: Факультет інформаційних технологій та математики > Кафедра інформаційної та кібернетичної безпеки ім. професора Володимира Бурячка
Користувач, що депонує: Павло Миколайович Складанний
Дата внесення: 20 Жов 2025 09:30
Останні зміни: 20 Жов 2025 09:30
URI: https://elibrary.kubg.edu.ua/id/eprint/53207

Actions (login required)

Перегляд елементу Перегляд елементу