THE RELEVANCE OF CREATING AN INTELLIGENT SYSTEM FOR PROTECTION OF DIGITAL CURRENCIES WITH LOW HASHRATE

Authors

DOI:

https://doi.org/10.28925/2663-4023.2025.27.714

Keywords:

malicious actor, threat actor, attack surface, critical infrastructure object (CIO), Internet of Things, critical infrastructure objects

Abstract

In the modern digital world, where information technology is an integral part of life,
cybersecurity issues are becoming increasingly relevant. One of the key aspects of protecting
information systems is managing the attack surface, which includes all possible entry points for
malicious actors. Forming and managing the attack surface is a complex task that requires constant
attention and improvement. Malicious actors («Threat actors») play a crucial role in this process.
They constantly seek new ways to penetrate systems, using various methods and techniques. These
"actors" can vary in their origins and motivations: from cybercriminals seeking financial gain to
state actors conducting espionage and sabotage activities. Understanding the types of "malicious
actors" and their methods is essential for effective attack surface management. This understanding
helps to timely detect and eliminate vulnerabilities, improve system and network configurations, and
raise staff awareness of modern cyber threats. This article examines the key aspects of forming the
attack surface, focusing on the role of "malicious actors." It explores the types of "malicious actors,"
their methods and techniques, and provides practical recommendations for reducing risks and
improving the protection of information systems. Additionally, conducting regular security audits
and implementing modern protection technologies such as intrusion detection systems, data
encryption, and multi-factor authentication are important. Thus, a comprehensive approach to
managing the attack surface, which includes understanding «Threat actors», utilizing modern
protection technologies, and continuously training personnel, is crucial for effectively protecting the
information systems of critical infrastructure.

Downloads

Download data is not yet available.

References

Chubenko, V. Y. (2023). The influence of cryptocurrencies on the financial security of the country. Collection of scientific papers of the University of the State Fiscal Service of Ukraine, (1), 188–204. https://doi.org/10.33244/2617-5940.1.2022.188-204

Sloboda, L., & Rodionova, E. (2021). INVESTMENT DECISIONS ON THE CRYPTOCURRENCY MARKET AND THEIR IMPACT ON THE COUNTRY’S FINANCIAL SECURITY. Socio-Economic Relations in the Digital Society, 1(40), 25–33. https://doi.org/10.18371/2221-755X1(40)2021237576

Grebelny, A. (2024). CYBER RISKS ON CRYPTOCURRENCY EXCHANGES: CAUSES, CONSEQUENCES, AND THEIR MITIGATION. Modern Engineering and Innovative Technologies, 1(34–01), 106–113. https://doi.org/10.30890/2567-5273.2024-34-00-036

Lakhno, V., Malyukov, V., Malyukova, I., Atkeldi, O., Kryvoruchko, O., Desiatko, A., & Stepashkina, K. (2023). A MODEL OF STRATEGY ANALYSIS DURING THE DYNAMIC INTERACTION OF PHISHING ATTACK PARTICIPANTS. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 4(20), 124–141. https://doi.org/10.28925/2663-4023.2023.20.124141

Gavrylova, A. (2019). Analysis of the state of security of bccchain projects in the market of Ukrainian services. Intelligent systems and information technologies, 62–64.

Lee, S. A. (2022). Investigating the Impact of Cyber Security Attacks on Cryptocurrency Markets [Macquarie University]. https://doi.org/https://doi.org/10.25949/21598905.v1

Baruwa, Z., Bhattacherjee, S., Chandnani, S.R., & Zhu, Z. (2023). Social Media Perceptions of 51% Attacks on Proof-of-Work Cryptocurrencies: A Natural Language Processing Approach. ArXiv, abs/2310.14307.

Ramos, S., Pianese, F., Leach, T., & Oliveras, E. (2021). A great disturbance in the crypto: Understanding cryptocurrency returns under attacks, Blockchain. Research and Applications, 2(3). https://doi.org/10.1016/j.bcra.2021.100021

Kim, S. K., Yeun, C. Y., Damiani, E., & Al-Hammadi, Y. (2019). Various perspectives in new blockchain design by using theory of inventive problem solving. In: IEEE International Conference on Blockchain and Cryptocurrency.

Sayeed, S., & Marco-Gisbert, H. (2019). Assessing blockchain consensus and security mechanisms against the 51% attack. Applied Sciences, 9(9). https://doi.org/10.3390/app9091788

Taylor, K. (2021). What Happens in 51% Attacks? | CoinMarketCap. CoinMarketCap Academy. https://coinmarketcap.com/academy/article/what-happens-in-51-attacks

Yi, X., Fang, Y., Wu, D., & Jiang, L. (2022). BlockScope: Detecting and investigating propagated vulnerabilities in forked blockchain projects. https://doi.org/10.14722/ndss.2023.24222

Shaikh, M., Munir, S., Wiil, U. K., & Shaikh, A. (2024). A Blockchain-Based Renewable Energy Authenticated Marketplace: BEAM of Flexibility. Advances in Emerging Information and Communication Technology. ICIEICT 2023. Signals and Communication Technology. Springer, Cham. https://doi.org/10.1007/978-3-031-53237-5_31

La Morgia, M., Mei, A., Sassi, F., & Stefa, J. (2023). The doge of wall street: Analysis and detection of pump and dump cryptocurrency manipulations. ACM Transactions on Internet Technology, 23(1), 1–28. https://doi.org/10.1145/3561300

Lansiaux, E., Tchagaspanian, N., & Forget, J. (2022) Community Impact on a Cryptocurrency: Twitter Comparison Example Between Dogecoin and Litecoin. Front. Blockchain, 5:829865. https://doi.org/10.3389/fbloc.2022.829865

Hilmola, O.-P. (2021). On Prices of Privacy Coins and Bitcoin. Journal of Risk and Financial Management, 14(8), 361. https://doi.org/10.3390/jrfm14080361

Wang, Z., Li, X., Ruan, J., & Kou, J. (2019). Prediction of Cryptocurrency Price Dynamics with Multiple Machine Learning Techniques. In Proceedings of the 2019 4th International Conference on Machine Learning Technologies (ICMLT ‘19). Association for Computing Machinery. https://doi.org/10.1145/3340997.3341008

Lakhno, V., Malyukov, V., Malyukova, I., Akhmetov, B., Alimseitova, Z., & Ogan, A. (2024). A neuro-game model for analyzing strategies in the dynamic interaction of participants of phishing attacks. TELKOMNIKA (Telecommunication Computing Electronics and Control). http://doi.org/10.12928/telkomnika.v22i3.25938

Malyukov, V., Lakhno, V., Bebeshko, B., Malyukova, I., & Zhumadilova, M. (2023). Multifactor Model of the Digital Cryptocurrency Market as a Computational Core of the Information System. CPITS II, vol. 3550, 200–208.

Chikrii, A. A. (2013). Conflict controlled processes. Dordrecht. https://doi.org/10.1007/978-94-017-1135-7

Hulak, H. M., Zhiltsov, O. B., Kyrychok, R. V., Korshun, N. V., & Skladannyi, P. M. (2024). Information and cyber security of the enterprise. Textbook. Lviv: Publisher Marchenko T. V.

Downloads


Abstract views: 21

Published

2025-03-27

How to Cite

Chikrii, A., Martyniuk, I., Desiatko, A., Malyukova, I., & Shyrshov, R. (2025). THE RELEVANCE OF CREATING AN INTELLIGENT SYSTEM FOR PROTECTION OF DIGITAL CURRENCIES WITH LOW HASHRATE. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 3(27), 41–53. https://doi.org/10.28925/2663-4023.2025.27.714

Most read articles by the same author(s)

1 2 > >>