Nikolaj Goranin
Vilnius Gediminas Technical University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Nikolaj Goranin.
Technological and Economic Development of Economy | 2017
Dmitrij Olifer; Nikolaj Goranin; Arnas Kačeniauskas; Antanas Cenys
AbstractAccording to the PricewaterhouseCoopers analysis, the average cost of a single information security and data protections breaches has increased twice during 2015 (Pricewaterhouse Coopers 2015). Amount of organizations who reported serious breach has also risen (from 9% in 2015 to 17% in 2016) (PricewaterhouseCoopers 2016). To achieve their goals criminals are using different techniques starting from Social engineering (phishing, whaling) and finishing with malware execution (such as ransomware) on target machines. Recent attacks (attack on Central Bank of Bangladesh, fraud attack on Mattel CEO and attack on Thailand state-run Government bank ATM) show, that criminals are very well organized, equipped and spend a lot of money and time to prepare their attacks. To protect themselves organizations are required to ensure security in depth principles and implement complex Security solutions, which are able to ensure the needed level of information security in appropriate costs.However, information secu...
Security and Communication Networks | 2015
Simona Ramanauskaite; Nikolaj Goranin; Antanas Cenys; Jonas Juknius
The number of coordinated and targeted Distributed Denial of Service DDoS attacks in the world used both as information warfare and as economic racket is increasing. It demonstrates the importance of DDoS attack modelling in order to increase understanding of DDoS nature success factors and to refine the protection mechanisms. Existing models concentrate on DDoS attack and victim properties and do not pay attention to Botnet properties, while Botnets become the major DDoS organization and management technology. We propose the DDoS attack model, which allows estimation of influence of Botnet size and agent allocation strategies on attack success probability. Modelling results of different Botnet agent allocation strategies have shown the dependence of DDoS success on attack power dynamics. The proposed DDoS attack model can be used for analysing probability of victim resistance to DDoS attack by modelling situations with different victim, attack and Botnet properties and by applying these results for optimal countermeasure planning. Copyright
International Journal of Computer Theory and Engineering | 2014
Simona Ramanauskaitė; Dmitrij Olifer; Nikolaj Goranin; Antanas Cenys; Lukas Radvilavičius
—There are many security standards which the company can use. While security standards can differ in purpose and covered area, more than one standard can be used at the same time which leads to overlap and potential conflicts in requirements of different standards. In such cases, deep analysis of used standards has to be done to ensure optimal usage of companys resources while implementing these security requirements. In this paper we analyze existing solutions for standard harmonization, describe concepts of adaptive mapping and present new ideas for visualization of mapped security standards. These ideas were integrated into developed tool to visualize mapped security standards.
business process management | 2017
Dmitrij Olifer; Nikolaj Goranin; Justinas Janulevicius; Arnas Kačeniauskas; Antanas Cenys
Amount of security breaches and organizations’ losses, related to them, is increasing every year. One of the key reasons is a high dependency of organization’s key business processes on information and information technology. To decrease the risk of possible breaches, organizations have to ensure “due diligence” and “due care” principles. This means, organizations need to apply requirements or controls defined by existing security standards. One of the main issues in such approach is identification of critical areas and evaluation of cost for security requirements implementation.
Technological and Economic Development of Economy | 2013
Leonardas Marozas; Nikolaj Goranin; Antanas Cenys; Lukas Radvilavičius; Zenonas Turskis
AbstractCurrently, control of access to information and physical resources has become extremely important. Numerous methods and solutions for architecture of systems aimed at controlling physical access are available; however, there is little information about application of Multi-Criteria Decision Analysis methods when evaluating separate logical components, needed for the design of access control systems and their interconnection in the final architecture.This paper is the first part of a two-part article, discussing application of multi-criteria decision making for architecture of access control systems. The first part defines the problem and discusses the possibility to use Multi Criteria Decision Making techniques when designing access control systems, including risk analysis for specific criteria and practical application of the developed model. In the second part, the possible solution model will be presented.
Annales Umcs, Informatica | 2012
Vaidas Juzonis; Nikolaj Goranin; Antanas Cenys; Dmitrij Olifer
From the security point of view malware evolution forecasting is very important, since it provides an opportunity to predict malware epidemic outbreaks, develop effective countermeasure techniques and evaluate information security level. Genetic algorithm approach for mobile malware evolution forecasting already proved its effectiveness. There exists a number of simulation tools based on the Genetic algorithms, that could be used for malware forecasting, but their main disadvantages from the user’s point of view is that they are too complicated and can not fully represent the security entity parameter set. In this article we describe the specialized evolution forecasting simulation tool developed for security entities, such as different types of malware, which is capable of providing intuitive graphical interface for users and ensure high calculation performance. Tool applicability for the evolution forecasting tasks is proved by providing mobile malware evolution forecasting results and comparing them with the results we obtained in 2010 by means of MATLAB.
Archive | 2006
Antanas Cenys; Darius Rainys; Lukas Radvilavičius; Nikolaj Goranin
Data and information are sometimes called the “crown jewels” of an organization [3]. Modern company cannot exist without flexible, fast and secure data management system. Insuring data security is of vital importance for any company.
International Journal of Computers Communications & Control | 2013
Simona Ramanauskait; Dmitrij Olifer; Nikolaj Goranin
Journal of Engineering Science and Technology Review | 2010
Nikolaj Goranin; Antanas Cenys
Information Technology and Control | 2015
Nikolaj Goranin; Antanas Cenys