Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Nikolaj Goranin is active.

Publication


Featured researches published by Nikolaj Goranin.


Technological and Economic Development of Economy | 2017

Controls-based approach for evaluation of information security standards implementation costs

Dmitrij Olifer; Nikolaj Goranin; Arnas Kačeniauskas; Antanas Cenys

AbstractAccording to the PricewaterhouseCoopers analysis, the average cost of a single information security and data protections breaches has increased twice during 2015 (Pricewaterhouse Coopers 2015). Amount of organizations who reported serious breach has also risen (from 9% in 2015 to 17% in 2016) (PricewaterhouseCoopers 2016). To achieve their goals criminals are using different techniques starting from Social engineering (phishing, whaling) and finishing with malware execution (such as ransomware) on target machines. Recent attacks (attack on Central Bank of Bangladesh, fraud attack on Mattel CEO and attack on Thailand state-run Government bank ATM) show, that criminals are very well organized, equipped and spend a lot of money and time to prepare their attacks. To protect themselves organizations are required to ensure security in depth principles and implement complex Security solutions, which are able to ensure the needed level of information security in appropriate costs.However, information secu...


Security and Communication Networks | 2015

Modelling influence of Botnet features on effectiveness of DDoS attacks

Simona Ramanauskaite; Nikolaj Goranin; Antanas Cenys; Jonas Juknius

The number of coordinated and targeted Distributed Denial of Service DDoS attacks in the world used both as information warfare and as economic racket is increasing. It demonstrates the importance of DDoS attack modelling in order to increase understanding of DDoS nature success factors and to refine the protection mechanisms. Existing models concentrate on DDoS attack and victim properties and do not pay attention to Botnet properties, while Botnets become the major DDoS organization and management technology. We propose the DDoS attack model, which allows estimation of influence of Botnet size and agent allocation strategies on attack success probability. Modelling results of different Botnet agent allocation strategies have shown the dependence of DDoS success on attack power dynamics. The proposed DDoS attack model can be used for analysing probability of victim resistance to DDoS attack by modelling situations with different victim, attack and Botnet properties and by applying these results for optimal countermeasure planning. Copyright


International Journal of Computer Theory and Engineering | 2014

Visualization of Mapped Security Standards for Analysis and Use Optimisation

Simona Ramanauskaitė; Dmitrij Olifer; Nikolaj Goranin; Antanas Cenys; Lukas Radvilavičius

—There are many security standards which the company can use. While security standards can differ in purpose and covered area, more than one standard can be used at the same time which leads to overlap and potential conflicts in requirements of different standards. In such cases, deep analysis of used standards has to be done to ensure optimal usage of companys resources while implementing these security requirements. In this paper we analyze existing solutions for standard harmonization, describe concepts of adaptive mapping and present new ideas for visualization of mapped security standards. These ideas were integrated into developed tool to visualize mapped security standards.


business process management | 2017

Improvement of Security Costs Evaluation Process by Using Data Automatically Captured from BPMN and EPC Models

Dmitrij Olifer; Nikolaj Goranin; Justinas Janulevicius; Arnas Kačeniauskas; Antanas Cenys

Amount of security breaches and organizations’ losses, related to them, is increasing every year. One of the key reasons is a high dependency of organization’s key business processes on information and information technology. To decrease the risk of possible breaches, organizations have to ensure “due diligence” and “due care” principles. This means, organizations need to apply requirements or controls defined by existing security standards. One of the main issues in such approach is identification of critical areas and evaluation of cost for security requirements implementation.


Technological and Economic Development of Economy | 2013

Raising effectiveness of access control systems by applying multi-criteria decision analysis: part 1 – problem definition

Leonardas Marozas; Nikolaj Goranin; Antanas Cenys; Lukas Radvilavičius; Zenonas Turskis

AbstractCurrently, control of access to information and physical resources has become extremely important. Numerous methods and solutions for architecture of systems aimed at controlling physical access are available; however, there is little information about application of Multi-Criteria Decision Analysis methods when evaluating separate logical components, needed for the design of access control systems and their interconnection in the final architecture.This paper is the first part of a two-part article, discussing application of multi-criteria decision making for architecture of access control systems. The first part defines the problem and discusses the possibility to use Multi Criteria Decision Making techniques when designing access control systems, including risk analysis for specific criteria and practical application of the developed model. In the second part, the possible solution model will be presented.


Annales Umcs, Informatica | 2012

Specialized Genetic Algorithm Based Simulation Tool Designed For Malware Evolution Forecasting

Vaidas Juzonis; Nikolaj Goranin; Antanas Cenys; Dmitrij Olifer

From the security point of view malware evolution forecasting is very important, since it provides an opportunity to predict malware epidemic outbreaks, develop effective countermeasure techniques and evaluate information security level. Genetic algorithm approach for mobile malware evolution forecasting already proved its effectiveness. There exists a number of simulation tools based on the Genetic algorithms, that could be used for malware forecasting, but their main disadvantages from the user’s point of view is that they are too complicated and can not fully represent the security entity parameter set. In this article we describe the specialized evolution forecasting simulation tool developed for security entities, such as different types of malware, which is capable of providing intuitive graphical interface for users and ensure high calculation performance. Tool applicability for the evolution forecasting tasks is proved by providing mobile malware evolution forecasting results and comparing them with the results we obtained in 2010 by means of MATLAB.


Archive | 2006

Database Level Honeytoken Modules for Active DBMS Protection

Antanas Cenys; Darius Rainys; Lukas Radvilavičius; Nikolaj Goranin

Data and information are sometimes called the “crown jewels” of an organization [3]. Modern company cannot exist without flexible, fast and secure data management system. Insuring data security is of vital importance for any company.


International Journal of Computers Communications & Control | 2013

Security Ontology for Adaptive Mapping of Security Standards

Simona Ramanauskait; Dmitrij Olifer; Nikolaj Goranin


Journal of Engineering Science and Technology Review | 2010

Evolutionary Algorithms Application Analysis in Biometric Systems

Nikolaj Goranin; Antanas Cenys


Information Technology and Control | 2015

GENETIC ALGORITHM BASED INTERNET WORM PROPAGATION STRATEGY MODELING

Nikolaj Goranin; Antanas Cenys

Collaboration


Dive into the Nikolaj Goranin's collaboration.

Top Co-Authors

Avatar

Antanas Cenys

Vilnius Gediminas Technical University

View shared research outputs
Top Co-Authors

Avatar

Dmitrij Olifer

Vilnius Gediminas Technical University

View shared research outputs
Top Co-Authors

Avatar

Justinas Janulevicius

Vilnius Gediminas Technical University

View shared research outputs
Top Co-Authors

Avatar

Simona Ramanauskaite

Vilnius Gediminas Technical University

View shared research outputs
Top Co-Authors

Avatar

Leonardas Marozas

Vilnius Gediminas Technical University

View shared research outputs
Top Co-Authors

Avatar

Lukas Radvilavičius

Vilnius Gediminas Technical University

View shared research outputs
Top Co-Authors

Avatar

Arnas Kačeniauskas

Vilnius Gediminas Technical University

View shared research outputs
Top Co-Authors

Avatar

Jonas Juknius

Vilnius Gediminas Technical University

View shared research outputs
Top Co-Authors

Avatar

Algirdas Laukaitis

Vilnius Gediminas Technical University

View shared research outputs
Top Co-Authors

Avatar

Darius Jurkevičius

Vilnius Gediminas Technical University

View shared research outputs
Researchain Logo
Decentralizing Knowledge