Research of Data Processing, Detection and Protection Algorithms to Minimize the Impact of Malware and Phishing Attacks on Users of Digital Platforms
Main Article Content
Abstract
The article is devoted to the development of a scientific and methodological apparatus for improving the effectiveness of protecting digital platforms from cyber threats by creating processing and detection algorithms that take into account the cognitive characteristics of users. A conceptual model of a three-stage protection system is proposed, integrating technical security mechanisms with cognitive decision-making models. A heuristic detection algorithm based on Random Forest machine learning with analysis of 47 features, including technical URL characteristics and cognitive-semantic content characteristics, has been developed. A methodology for dynamic integration of four threat data sources has been created, reducing response time from 12–14 hours to two hours. An algorithm for recursive analysis of redirection chains up to ten levels deep to detect masked threats is proposed. Experimental validation on an empirical base of approximately one million records confirmed detection accuracy of 87% when processing one hundred thousand records per hour. The developed solutions ensure compliance with the requirements of GOST R 57580.1-2017 and Russian legislation in the field of personal data protection.
Article Details
References
2. Group-IB. Report on cyber threats in Russia for 2023: analysis of trends and forecasts. Moscow: Group-IB, 2024. 89 p.
3. Kaspersky Lab. Development of cyber threats in 2023: statistics and analytics of information security incidents. Moscow: Kaspersky Laboratory, 2024. 156 p.
4. Russkikh E.I. Past, present and future of phishing attacks // BBK 1 N 34. P. 6015.
5. Nazarov A.K. Some modern means of protection against cyber threats // Editorial and publishing council of the Krasnodar University of the Ministry of Internal Affairs of Russia. P. 76.
6. Bryukhanov V.A., Gryzunov V.V., Shestakov A.V. Identification of information security problems by the method of systematic literature review. 2024.
7. Tokolov A.V. Social engineering in information security issues // Criminological Journal. 2024. No. 4. P. 175–182.
8. Gorbunova E.A., Saykinov V.E. Russian Federation The problem of phishing in the use of information systems based on cloud technologies // I74 Information Society: current state and development prospects: collection of materials of the XI international student forum. Krasnodar: KubSAU, 2018. P. 103.
9. Sergeev A.Yu., Shirokova O.V. Fraud in digital society under conditions of social change // Digital Sociology. 2023. Vol. 6, No. 1. P. 59–71.
10. Mrochko V.L., Roschina T.M., Tarasov M.D. Ensuring security on the Internet: psychological and pedagogical aspects // Economic and socio-humanitarian research. 2024. No. 3 (43). P. 196–204.
11. Serik A.S. Legal foundations for preventing cybercrime: state and development prospects. 2022.
12. Shvetsova E.E. Types of fraud in the field of remote banking and methods of combating them // Collection of materials of the All-Russian scientific conference of young researchers with international participation INTEX-2024. 2024. P. 269–272.
13. Uvarov A.A. Information security of Russian citizens: current state // Lex russica. 2024. Vol. 77, No. 1 (206). P. 133–143.
14. Kharisova Z.I. Genesis of crime in the field of computer information and its determinants // Society, law, statehood: retrospective and perspective. 2025. No. 1 (21). P. 57–65.
15. Bityukova A.F. Directions for the development of banking electronic services and methods of ensuring their security. 2019.
16. GOST R 57580.1-2017. Security of financial (banking) operations. Requirements for the organization and conduct of security work. Moscow: Standartinform, 2017. 26 p.
17. Federal Law No. 152-FZ of July 27, 2006 "On Personal Data" (as amended on July 14, 2022). Access from the reference legal system "ConsultantPlus".
18. Federal Law No. 149-FZ of July 27, 2006 "On Information, Information Technologies and Information Protection" (as amended on July 14, 2022). Access from the reference legal system "ConsultantPlus".
19. Sheng S., Holbrook M., Kumaraguru P., Cranor L.F., Downs J. Who falls for phish? A demographic analysis of phishing susceptibility and effectiveness of interventions // Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. Atlanta, GA, USA, 2010. P. 373–382. https://doi.org/10.1145/1753326.1753383
20. Guarino N. Formal ontology, conceptual analysis and knowledge representation // Int. J. of Human Computer Studies. 1995. Vol. 43 (5/6). P. 625–640.

This work is licensed under a Creative Commons Attribution 4.0 International License.
Presenting an article for publication in the Russian Digital Libraries Journal (RDLJ), the authors automatically give consent to grant a limited license to use the materials of the Kazan (Volga) Federal University (KFU) (of course, only if the article is accepted for publication). This means that KFU has the right to publish an article in the next issue of the journal (on the website or in printed form), as well as to reprint this article in the archives of RDLJ CDs or to include in a particular information system or database, produced by KFU.
All copyrighted materials are placed in RDLJ with the consent of the authors. In the event that any of the authors have objected to its publication of materials on this site, the material can be removed, subject to notification to the Editor in writing.
Documents published in RDLJ are protected by copyright and all rights are reserved by the authors. Authors independently monitor compliance with their rights to reproduce or translate their papers published in the journal. If the material is published in RDLJ, reprinted with permission by another publisher or translated into another language, a reference to the original publication.
By submitting an article for publication in RDLJ, authors should take into account that the publication on the Internet, on the one hand, provide unique opportunities for access to their content, but on the other hand, are a new form of information exchange in the global information society where authors and publishers is not always provided with protection against unauthorized copying or other use of materials protected by copyright.
RDLJ is copyrighted. When using materials from the log must indicate the URL: index.phtml page = elbib / rus / journal?. Any change, addition or editing of the author's text are not allowed. Copying individual fragments of articles from the journal is allowed for distribute, remix, adapt, and build upon article, even commercially, as long as they credit that article for the original creation.
Request for the right to reproduce or use any of the materials published in RDLJ should be addressed to the Editor-in-Chief A.M. Elizarov at the following address: amelizarov@gmail.com.
The publishers of RDLJ is not responsible for the view, set out in the published opinion articles.
We suggest the authors of articles downloaded from this page, sign it and send it to the journal publisher's address by e-mail scan copyright agreements on the transfer of non-exclusive rights to use the work.