A methodology for empirical research and analysis in the field of cybersecurity


  • Yoana Ivanova New Bulgarian University




simulation modelling, steganography, steganalysis, artificial neural networks


This article is considered to be a continuation of a publication by the author devoted to an algorithm for steganographic embedding of encrypted files in raster images (Yearbook Telecommunication, №9, 2022). The aim of this paper is proposing a methodology for empirical research and analysis on the field of cybersecurity which to contribute to various areas in cybersecurity. Its originality is expressed in the joint application of methods for research and analysis realized by various simulation environments for conducting experiments. This methodology has a specific structure as it is conditionally divided into two major parts depending on the type of the simulation process and software products used – a study of the direct impact of cyberattacks on communication networks by the method of the agent-based modelling and a study of potential steganography attacks using software for simulation of Artificial Neural Networks (ANNs) for the purposes of steganalysis.


CUCURULL, Jordi, Sandra GUASCH, Alex ESCALA, Guillermo NAVARRO-ARRIBAS, and Victor ACIN. QR Steganography: A Threat to New Generation Electronic Voting Systems. 11th International Conference on Security and Cryptography (SECRYPT) [online]. Vienna: IEEE, 2014, pp. 1-8 [viewed 20 January 2023]. eISBN 978-9-8985-6595-2. Available from: https://ieeexplore.ieee.org/document/7509529

OBAID, Hadeel S. Wireless Network Behaviour during Jamming Attacks: Simulation using OPNET. Journal of Physics: Conference Series [online]. 2020, vol. 1530(1), № 012009 [viewed 20 January 2023]. еISSN 1742-6596. IOPscience. Available from: DOI:10.1088/1742-6596/1530/1/012009

КЪДРЕВ, Васил и Росен ПАСАРЕЛСКИ. Приложение на подходи на изкуствен интелект и машинно обучение в киберсигурността. Годишник Телекомуникации 2021[онлайн]. София: НБУ, 2021, (8), с. 53-64 [прегледан 20 Януари 2023]. eISSN 2534-854X. Достъпен на: https://telecommunications.nbu.bg/bg/godishnik-telekomunikacii-broeve/godishnik-telekomunikacii-2021-g-tom-8 [KADREV, Vasil i Rosen PASARELSKI. Prilozhenie na podhodi na izkustven intelekt i mashinno obuchenie v kibersigurnostta. Godishnik Telekomunikatsii 2021[onlayn], Sofia: NBU, 2021, (8), s. 53-64 [pregledan 20 Yanuari 2023]. eISSN 2534-854X. Dostapen na: https://telecommunications.nbu.bg/bg/godishnik-telekomunikacii-broeve/godishnik-telekomunikacii-2021-g-tom-8]

СИМЕОНОВА, Цветелина и Васил КЪДРЕВ. Развитие на изкуствения интелект и неговото приложение в телекомуникационните мрежи и услуги. Сборник доклади от Научна конференция с международно участие на НВУ „В. Левски”, В. Търново, 27-28.05.2021. Велико Търново: ИК на НВУ „Васил Левски, 2021, с. 2376-2386. ISSN 2367-7481. [SIMEONOVA, Tsvetelina i Vasil KADREV. Razvitie na izkustvenia intelekt i negovoto prilozhenie v telekomunikatsionnite mrezhi i uslugi. Sbornik dokladi ot Nauchna konferentsia s mezhdunarodno uchastie na NVU „V. Levski”, V. Tarnovo, 27-28.05.2021. Veliko Tarnovo: IK na NVU „Vasil Levski, 2021, s. 2376- 2386. ISSN 2367-7481.]

SARGENT, Robert, G. Verification and Validation of Simulation Models. Proceedings of the 2010 Winter Simulation Conference [online]. 2011, vol. 37(2), pp. 166-183 [viewed 20 January 2023]. eISBN 978-1-4244-9865-9. IEEE Xplore. Available from: https://ieeexplore.ieee.org/document/5679166

Applicable Law. Maltego [online]. [viewed 20 January 2023]. Available from: https://www.maltego.com/legal-notice/

МАРКОВ, Минко. Лекции по теория на графите, 2016. [MARKOV, Minko. Lektsii po teoria na grafite. 2016.]

GreyNoise Intelligence Solution. Maltego [online]. 03 November 2021 [viewed 20 January 2023]. Available from: https://www.maltego.com/blog/greynoise-intelligence-solution-inmaltego/?fbclid=IwAR1pY36MqV7TI3BNNudoaxT9RJa6znZeNB4x5qCUpaKt66U7xmziO4_X73s

Beginners' Guide Charting My First Maltego Graph. Maltego [online]. 03 June 2020 [viewed 20 January 2023]. Available from: https://www.maltego.com/blog/beginners-guide-to-maltego-chartingmy-first-maltego-graph/

Introduction to Maltego Standard Transforms. Maltego [online]. 18 August 2022 [viewed 20 January 2023]. Available from: https://docs.maltego.com/support/solutions/articles/15000041468-introduction-to-maltego-standard-transforms#overview-0-0




How to Cite

Ivanova, Y. (2022). A methodology for empirical research and analysis in the field of cybersecurity. Yearbook Telecommunications, 9, 45–52. https://doi.org/10.33919/YTelecomm.22.9.4