THE RELEVANCE OF CREATING AN INTELLIGENT SYSTEM FOR PROTECTION OF DIGITAL CURRENCIES WITH LOW HASHRATE
DOI:
https://doi.org/10.28925/2663-4023.2025.27.714Keywords:
malicious actor, threat actor, attack surface, critical infrastructure object (CIO), Internet of Things, critical infrastructure objectsAbstract
In the modern digital world, where information technology is an integral part of life,
cybersecurity issues are becoming increasingly relevant. One of the key aspects of protecting
information systems is managing the attack surface, which includes all possible entry points for
malicious actors. Forming and managing the attack surface is a complex task that requires constant
attention and improvement. Malicious actors («Threat actors») play a crucial role in this process.
They constantly seek new ways to penetrate systems, using various methods and techniques. These
"actors" can vary in their origins and motivations: from cybercriminals seeking financial gain to
state actors conducting espionage and sabotage activities. Understanding the types of "malicious
actors" and their methods is essential for effective attack surface management. This understanding
helps to timely detect and eliminate vulnerabilities, improve system and network configurations, and
raise staff awareness of modern cyber threats. This article examines the key aspects of forming the
attack surface, focusing on the role of "malicious actors." It explores the types of "malicious actors,"
their methods and techniques, and provides practical recommendations for reducing risks and
improving the protection of information systems. Additionally, conducting regular security audits
and implementing modern protection technologies such as intrusion detection systems, data
encryption, and multi-factor authentication are important. Thus, a comprehensive approach to
managing the attack surface, which includes understanding «Threat actors», utilizing modern
protection technologies, and continuously training personnel, is crucial for effectively protecting the
information systems of critical infrastructure.
Downloads
References
Chubenko, V. Y. (2023). The influence of cryptocurrencies on the financial security of the country. Collection of scientific papers of the University of the State Fiscal Service of Ukraine, (1), 188–204. https://doi.org/10.33244/2617-5940.1.2022.188-204
Sloboda, L., & Rodionova, E. (2021). INVESTMENT DECISIONS ON THE CRYPTOCURRENCY MARKET AND THEIR IMPACT ON THE COUNTRY’S FINANCIAL SECURITY. Socio-Economic Relations in the Digital Society, 1(40), 25–33. https://doi.org/10.18371/2221-755X1(40)2021237576
Grebelny, A. (2024). CYBER RISKS ON CRYPTOCURRENCY EXCHANGES: CAUSES, CONSEQUENCES, AND THEIR MITIGATION. Modern Engineering and Innovative Technologies, 1(34–01), 106–113. https://doi.org/10.30890/2567-5273.2024-34-00-036
Lakhno, V., Malyukov, V., Malyukova, I., Atkeldi, O., Kryvoruchko, O., Desiatko, A., & Stepashkina, K. (2023). A MODEL OF STRATEGY ANALYSIS DURING THE DYNAMIC INTERACTION OF PHISHING ATTACK PARTICIPANTS. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 4(20), 124–141. https://doi.org/10.28925/2663-4023.2023.20.124141
Gavrylova, A. (2019). Analysis of the state of security of bccchain projects in the market of Ukrainian services. Intelligent systems and information technologies, 62–64.
Lee, S. A. (2022). Investigating the Impact of Cyber Security Attacks on Cryptocurrency Markets [Macquarie University]. https://doi.org/https://doi.org/10.25949/21598905.v1
Baruwa, Z., Bhattacherjee, S., Chandnani, S.R., & Zhu, Z. (2023). Social Media Perceptions of 51% Attacks on Proof-of-Work Cryptocurrencies: A Natural Language Processing Approach. ArXiv, abs/2310.14307.
Ramos, S., Pianese, F., Leach, T., & Oliveras, E. (2021). A great disturbance in the crypto: Understanding cryptocurrency returns under attacks, Blockchain. Research and Applications, 2(3). https://doi.org/10.1016/j.bcra.2021.100021
Kim, S. K., Yeun, C. Y., Damiani, E., & Al-Hammadi, Y. (2019). Various perspectives in new blockchain design by using theory of inventive problem solving. In: IEEE International Conference on Blockchain and Cryptocurrency.
Sayeed, S., & Marco-Gisbert, H. (2019). Assessing blockchain consensus and security mechanisms against the 51% attack. Applied Sciences, 9(9). https://doi.org/10.3390/app9091788
Taylor, K. (2021). What Happens in 51% Attacks? | CoinMarketCap. CoinMarketCap Academy. https://coinmarketcap.com/academy/article/what-happens-in-51-attacks
Yi, X., Fang, Y., Wu, D., & Jiang, L. (2022). BlockScope: Detecting and investigating propagated vulnerabilities in forked blockchain projects. https://doi.org/10.14722/ndss.2023.24222
Shaikh, M., Munir, S., Wiil, U. K., & Shaikh, A. (2024). A Blockchain-Based Renewable Energy Authenticated Marketplace: BEAM of Flexibility. Advances in Emerging Information and Communication Technology. ICIEICT 2023. Signals and Communication Technology. Springer, Cham. https://doi.org/10.1007/978-3-031-53237-5_31
La Morgia, M., Mei, A., Sassi, F., & Stefa, J. (2023). The doge of wall street: Analysis and detection of pump and dump cryptocurrency manipulations. ACM Transactions on Internet Technology, 23(1), 1–28. https://doi.org/10.1145/3561300
Lansiaux, E., Tchagaspanian, N., & Forget, J. (2022) Community Impact on a Cryptocurrency: Twitter Comparison Example Between Dogecoin and Litecoin. Front. Blockchain, 5:829865. https://doi.org/10.3389/fbloc.2022.829865
Hilmola, O.-P. (2021). On Prices of Privacy Coins and Bitcoin. Journal of Risk and Financial Management, 14(8), 361. https://doi.org/10.3390/jrfm14080361
Wang, Z., Li, X., Ruan, J., & Kou, J. (2019). Prediction of Cryptocurrency Price Dynamics with Multiple Machine Learning Techniques. In Proceedings of the 2019 4th International Conference on Machine Learning Technologies (ICMLT ‘19). Association for Computing Machinery. https://doi.org/10.1145/3340997.3341008
Lakhno, V., Malyukov, V., Malyukova, I., Akhmetov, B., Alimseitova, Z., & Ogan, A. (2024). A neuro-game model for analyzing strategies in the dynamic interaction of participants of phishing attacks. TELKOMNIKA (Telecommunication Computing Electronics and Control). http://doi.org/10.12928/telkomnika.v22i3.25938
Malyukov, V., Lakhno, V., Bebeshko, B., Malyukova, I., & Zhumadilova, M. (2023). Multifactor Model of the Digital Cryptocurrency Market as a Computational Core of the Information System. CPITS II, vol. 3550, 200–208.
Chikrii, A. A. (2013). Conflict controlled processes. Dordrecht. https://doi.org/10.1007/978-94-017-1135-7
Hulak, H. M., Zhiltsov, O. B., Kyrychok, R. V., Korshun, N. V., & Skladannyi, P. M. (2024). Information and cyber security of the enterprise. Textbook. Lviv: Publisher Marchenko T. V.
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Аркадій Чикрій, Ігор Мартинюк, Альона Десятко, Інна Малюкова, Роман Ширшов

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.