Yaroslav Melnyk, Victor Bobylov, Roman Timoshenko


The modern information environment is exposed to active cybernetic influence both on separate computer facilities, as well as on information and telecommunication systems and automated systems of state and military authorities that are aimed at interrupting the interrelated information properties: confidentiality, integrity and accessibility. Despite the introduction of various methods aimed at increasing the security of information resources in the information and telecommunication systems, the dynamics of the increase and the effects of cybernetic threats, both in the world and in Ukraine, remain rather high and constitute a world-class problem. In connection with this, there is an urgent need to ensure the effective functioning of heterogeneous information and telecommunication networks (ITN) of the Ministry of Defense and Armed Forces of Ukraine in the conditions of cyber attacks.

The purpose of this article is to provide recommendations on the construction of information and telecommunication networks based on the comparative assessment of the stability of integrated computer networks (CN) structures, which allows to increase the reliability of the results of comparative evaluation of ICN structures with increasing number of elements and under conditions of influence on network nodes of unintentional and intentional obstacles by taking into account the long-term decrease in the values of complex indicators of the reliability of the nodes of the ICN.


heterogyne network, integrated computer networks, information and telecommunication networks, intentional and unintentional obstacles, reliability of heterodyne telecommunication networks.


Barabash O.V. The construction of functionally stable distributed information systems / Barabash O.V. - K.: NAOU, 2004. - 226 p.

Elements of the study of complex military systems: [curriculum vitae]. manual.] / O.M. Zagorka, SP Mosov, AI Sbitnev, PI Stitug - K .: NAOU, 2005. - 100 p.

Subach I.Yu., Zdorenko Yu.M., Fesioha V.V. The method of detecting a cyberattack type JS (HTML) / SCRINJECT on the basis of the application of a mathematical apparatus of the theory of fuzzy sets / Zb. sciences VITI Ave. - 2018. - Issue number 4. - P. 125 - 131.

Dodonov O.G., Kuznetsova M.G., Gorbachik O.S. Methods of information protection in computer systems and networks: Materials of the round table "Protection of Information Resources of Ukraine in Information and Telecommunication Systems" 23. 05. 2001. - K.: DSTSZI SB of Ukraine, 2001.

Mamikonova, A.G. Automation design ACS / A.G. Mamikonova, A.D. Tsvirkun, V.V. Kulba Moscow, Energoizdat, 1981.328 p.

Date, K. Dzh. Introduction to database systems / K. J. Date. M .: Williams, 2006. - 1328 p.

Connolly, Thomas. Database. Design, implementation and maintenance. Theory and Practice / Thomas Connolly, Caroline Begg. -M .: Williams, 2003. 1436 p.

Meikshan V.I., Meikshan L.I. Analysis of the quality of functioning of a distributed information system with limited reliability of its elements // Proceedings of the ICMMG SB RAS. - Ser. Computer science. - Vol. 5. - Novosibirsk, 2005. - p. 79 - 88.

GOST Style Citations

1. Барабаш О.В. Построение функционально устойчивых распределенных информационных систем / Барабаш О.В. – К.:НАОУ, 2004. – 226 с.

2. Елементи дослідження складних систем військового призначення: [навч. посіб.] / О.М. Загорка, С.П. Мосов, А.І. Сбітнев, П.І. Стужук. – К.: НАОУ, 2005. – 100 с.

3. Субач І.Ю., Здоренко Ю.М., Фесьоха В.В. Методика виявлення кібератак типу JS (HTML)/SCRINJECT на основі застосування математичного апарату теорії нечітких множин/ Зб. наук. пр. ВІТІ. – 2018. – Випуск № 4. – С. 125 – 131.

4. Додонов О.Г., Кузнєцова М.Г., Горбачик О.С. Методи захисту інформації в комп’ютерних системах й мережах: Матеріали круглого столу “Захист інформаційних ресурсів України в інформаційно–телекомунікаційних системах” 23. 05. 2001. — К. : ДСТСЗІ СБ України, 2001.

5. Мамиконова, А.Г. Автоматизация проектирования АСУ /А.Г. Мамиконова , А.Д. Цвиркун , В.В. Кульба. М., Энергоиздат, 1981.328 с.

6. Дейт, К. Дж. Введение в системы баз данных / К. Дж. Дейт. М.: Вильяме, 2006. - 1328 с.

7. Коннолли, Томас. Базы данных. Проектирование, реализация и сопровождение. Теория и практика / Томас Коннолли, Каролин Бегг. -М.: Вильяме, 2003. 1436 с.

8. Мейкшан В.И., Мейкшан Л.И. Анализ качества функционирования распределенной информационной системы при ограниченной надежности ее элементов // Труды ИВМиМГ СО РАН. – Сер. Информатика. – Вып. 5. – Новосибирск, 2005. – С. 79 – 88. 

ISSN 2410-7336 (Online)

ISSN 2311-7249 (Print)