Integrated security systems for protecting payment synchronization from MITM attacks
The article addresses the challenge of securing payment synchronization against Man-in-the-Middle (MITM) attacks in multichannel payment systems, where cash, card, and online transactions are integrated with CRM and accounting platforms. It examines MITM attack scenarios and their impact on transact...
Saved in:
| Date: | 2025 |
|---|---|
| Main Authors: | Shahmatov, I.O., Zamrii, I.V. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
PROBLEMS IN PROGRAMMING
2025
|
| Subjects: | |
| Online Access: | https://pp.isofts.kiev.ua/index.php/ojs1/article/view/835 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Problems in programming |
| Download file: | |
Institution
Problems in programmingSimilar Items
The Code is based on random numbers with irregular distribution
by: Mikhersky, R.M.
Published: (2025)
by: Mikhersky, R.M.
Published: (2025)
Method of detection of http attacks on a smart home using the algebraic matching method
by: Gorbatiuk, V.O., et al.
Published: (2023)
by: Gorbatiuk, V.O., et al.
Published: (2023)
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021)
by: Шиян, А. А., et al.
Published: (2021)
Reputation-based secyrity for heterogtneous structurally complex systems
by: Kussul, O.M.
Published: (2015)
by: Kussul, O.M.
Published: (2015)
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)
by: Khudyntsev, Mykola M., et al.
Published: (2024)
Information security policy in the systems of information and analytical maintenance for support of organizational decisions
by: Churubrova, S.M.
Published: (2018)
by: Churubrova, S.M.
Published: (2018)
Game-theoretic approach to the network security problem
by: Ignatenko, O.P.
Published: (2018)
by: Ignatenko, O.P.
Published: (2018)
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: Дьогтєва, І. О., et al.
Published: (2021)
by: Дьогтєва, І. О., et al.
Published: (2021)
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
Flow based bonet traffic detection using AI
by: Panchuk, B.O.
Published: (2023)
by: Panchuk, B.O.
Published: (2023)
Organizational and legal mechanisms of cybersecurity and cyber defense in Ukraine: essentiality, conditions and development prospects
by: Semenchenko, A.I., et al.
Published: (2020)
by: Semenchenko, A.I., et al.
Published: (2020)
AN INTEGRATED AI-BASED APPROACH TO TRANSFORMING ENERGY SYSTEMS FOR SUSTAINABILITY AND EFFICIENCY
by: Karpenko, Dmytro, et al.
Published: (2025)
by: Karpenko, Dmytro, et al.
Published: (2025)
Complex approach for state critical information infrastructure cyber defence system constructing
by: Synitsyn, I.P., et al.
Published: (2018)
by: Synitsyn, I.P., et al.
Published: (2018)
Risk factor analysis of an example of an incident with global routing registry software
by: Zubok, V. Yu.
Published: (2020)
by: Zubok, V. Yu.
Published: (2020)
Ontology-based semantic similarity to metadata analysis in the information security domain
by: Gladun, A.Y., et al.
Published: (2021)
by: Gladun, A.Y., et al.
Published: (2021)
Technology system integration of hardware and software data protection
by: Alishоv, N.I., et al.
Published: (2025)
by: Alishоv, N.I., et al.
Published: (2025)
Neurosymbolic models for ensuring cybersecurity in critical cyberphysical systems
by: Yevdokymov, S.O.
Published: (2025)
by: Yevdokymov, S.O.
Published: (2025)
Network and economic component of financial cybersecurity indices
by: Turchynov, Oleksandr, et al.
Published: (2025)
by: Turchynov, Oleksandr, et al.
Published: (2025)
Improvement of protection for WEB resources from attacks based on combined heuristic and statistical approach
by: Prysiazhnyi, D. P.
Published: (2016)
by: Prysiazhnyi, D. P.
Published: (2016)
Neurosymbolic approach for attack detection in satellite communication systems
by: Mostovyi, O.S.
Published: (2024)
by: Mostovyi, O.S.
Published: (2024)
Потокові моделі мережі Інтернет за умов атак на відмову
by: Andon, P.I., et al.
Published: (2015)
by: Andon, P.I., et al.
Published: (2015)
Security basic model for applied tasks of the distributed information system
by: Rodin, Y.S., et al.
Published: (2021)
by: Rodin, Y.S., et al.
Published: (2021)
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019)
by: Saliieva, O. V., et al.
Published: (2019)
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Zubok, V. Yu.
Published: (2020)
by: Zubok, V. Yu.
Published: (2020)
The problems of massive construction of the integrated information security system (IISS) and a ways of their solution
by: Koltyk, M.A.
Published: (2025)
by: Koltyk, M.A.
Published: (2025)
System-ontological analysis the subject area of testing integrated information security system (IISS)
by: Koltyk, M.A.
Published: (2025)
by: Koltyk, M.A.
Published: (2025)
Methods and ways for realization of the automated support testing of the integrated information security system
by: Koltyk, M. A.
Published: (2025)
by: Koltyk, M. A.
Published: (2025)
Characteristics of information flows of software modules included in the software for automated support of ...
by: Borovskaya, E.N., et al.
Published: (2025)
by: Borovskaya, E.N., et al.
Published: (2025)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Technological solutions for intelligent analysis of Big Data. Programming languages
by: Grishanova, I.Y., et al.
Published: (2019)
by: Grishanova, I.Y., et al.
Published: (2019)
A modern approach to calculating the abilities and capabilities of military units to perform tasks using artificial intelligence
by: Бойченко, А. В., et al.
Published: (2025)
by: Бойченко, А. В., et al.
Published: (2025)
Semantic approach to automated formation of information security systems documentation
by: Bova, Yu.V., et al.
Published: (2026)
by: Bova, Yu.V., et al.
Published: (2026)
Theoretical justification of the necessity of payment for capacity in IPS
by: Kostyukovskyi, Borys, et al.
Published: (2022)
by: Kostyukovskyi, Borys, et al.
Published: (2022)
Development of decision support system using OLAP-technologies for information security monitoring systems
by: Dashdamirova, K.Q.
Published: (2023)
by: Dashdamirova, K.Q.
Published: (2023)
Use of ontological knowledge by intelligent agents
by: Rogushina, J.V.
Published: (2018)
by: Rogushina, J.V.
Published: (2018)
A combination of traditional methods and a metric approach to assessing the risks from cyber attacks to global routing.
by: Zubok, V. Yu.
Published: (2019)
by: Zubok, V. Yu.
Published: (2019)
Problems of active protection of information from leakage through vibroacoustic channels
by: Kataiev, V. С., et al.
Published: (2016)
by: Kataiev, V. С., et al.
Published: (2016)
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013)
by: Iaremchuk, Iu. E.
Published: (2013)
Functional stability of intelligent systems in decision-making
by: Shuklin, G.V., et al.
Published: (2025)
by: Shuklin, G.V., et al.
Published: (2025)
Ontological methods and tools for semantic extension of the media WIKI technology
by: Rogushina, J.V., et al.
Published: (2020)
by: Rogushina, J.V., et al.
Published: (2020)
Similar Items
-
The Code is based on random numbers with irregular distribution
by: Mikhersky, R.M.
Published: (2025) -
Method of detection of http attacks on a smart home using the algebraic matching method
by: Gorbatiuk, V.O., et al.
Published: (2023) -
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021) -
Reputation-based secyrity for heterogtneous structurally complex systems
by: Kussul, O.M.
Published: (2015) -
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)