<?xml version="1.0" encoding="UTF-8"?>
<article article-type="research-article" dtd-version="1.3" xml:lang="ru" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamespaceSchemaLocation="https://metafora.rcsi.science/xsd_files/journal3.xsd">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">moitvivt</journal-id>
      <journal-title-group>
        <journal-title xml:lang="ru">Моделирование, оптимизация и информационные технологии</journal-title>
        <trans-title-group xml:lang="en">
          <trans-title>Modeling, Optimization and Information Technology</trans-title>
        </trans-title-group>
      </journal-title-group>
      <issn pub-type="epub">2310-6018</issn>
      <publisher>
        <publisher-name>Издательство</publisher-name>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.26102/2310-6018/2026.54.3.011</article-id>
      <article-id pub-id-type="custom" custom-type="elpub">2189</article-id>
      <title-group>
        <article-title xml:lang="ru">Конфиденциальный обмен данными о киберугрозах между государственными учреждениями с использованием FEGB-Net</article-title>
        <trans-title-group xml:lang="en">
          <trans-title>Privacy-preserving threat intelligence sharing across government agencies using FEGB-Net</trans-title>
        </trans-title-group>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <contrib-id contrib-id-type="orcid">0000-0002-7361-042X</contrib-id>
          <name-alternatives>
            <name name-style="eastern" xml:lang="ru">
              <surname>Арм</surname>
              <given-names>Ажи Азиз Салих</given-names>
            </name>
            <name name-style="western" xml:lang="en">
              <surname>Arm</surname>
              <given-names>Azhi Aziz Salih</given-names>
            </name>
          </name-alternatives>
          <email>arm.azhi@yandex.com</email>
          <xref ref-type="aff">aff-1</xref>
        </contrib>
        <contrib contrib-type="author">
          <contrib-id contrib-id-type="orcid">0000-0002-3420-3805</contrib-id>
          <name-alternatives>
            <name name-style="eastern" xml:lang="ru">
              <surname>Ляпунцова</surname>
              <given-names>Елена Вячеславовна</given-names>
            </name>
            <name name-style="western" xml:lang="en">
              <surname>Lyapuntsova</surname>
              <given-names>Elena Vyacheslavovna</given-names>
            </name>
          </name-alternatives>
          <email>lev77@me.com</email>
          <xref ref-type="aff">aff-2</xref>
        </contrib>
      </contrib-group>
      <aff-alternatives id="aff-1">
        <aff xml:lang="ru">Национальный исследовательский технологический университет МИСИС</aff>
        <aff xml:lang="en">National Research University of Technology "MISIS"</aff>
      </aff-alternatives>
      <aff-alternatives id="aff-2">
        <aff xml:lang="ru">Национальный исследовательский технологический университет МИСИС</aff>
        <aff xml:lang="en">National Research University of Technology "MISIS"</aff>
      </aff-alternatives>
      <pub-date pub-type="epub">
        <day>01</day>
        <month>01</month>
        <year>2026</year>
      </pub-date>
      <volume>1</volume>
      <issue>1</issue>
      <elocation-id>10.26102/2310-6018/2026.54.3.011</elocation-id>
      <permissions>
        <copyright-statement>Copyright © Авторы, 2026</copyright-statement>
        <copyright-year>2026</copyright-year>
        <license license-type="creative-commons-attribution" xlink:href="https://creativecommons.org/licenses/by/4.0/">
          <license-p>This work is licensed under a Creative Commons Attribution 4.0 International License</license-p>
        </license>
      </permissions>
      <self-uri xlink:href="https://moitvivt.ru/ru/journal/article?id=2189"/>
      <abstract xml:lang="ru">
        <p>Правительственные сети все чаще становятся объектами скоординированных кибератак, использующих сходства в инфраструктуре и методах работы различных ведомств. Хотя раннее обнаружение в одной организации может послужить важным сигналом для остальных, эффективный обмен информацией об угрозах часто ограничен законами о суверенитете и конфиденциальности данных. В данной статье представлено расширение федеративной ансамблевой графовой сети (FEGB-Net), которое позволяет государственным ведомствам обмениваться данными об угрозах, с выполнением требований конфиденциальности. Предложенный подход извлекает поведенческие сигнатуры угроз из локально обученных моделей графовых нейронных сетей, защищает эти сигнатуры с помощью методов дифференциальной приватности и использует их для межведомственного обнаружения угроз в реальном времени. Экспериментальная оценка с использованием набора данных CICIDS2017 показывает, что точность обнаружения остается сопоставимой с точностью при работе в изолированном (не федеративном) режиме, однако время обнаружения скоординированных атак сокращается до 88,5 %. Анализ показывает ε-дифференциальную приватность с ε = 2,0, что ограничивает возможности атак логического вывода до методов, близких к случайному перебору. Эти результаты показывают, что возможность совместной защиты может быть достигнута без ущерба для конфиденциальности данных и суверенитета.</p>
      </abstract>
      <trans-abstract xml:lang="en">
        <p>Government networks are increasingly targeted by coordinated cyberattacks that exploit similarities in infrastructure and operational practices across agencies. Although early detection at one organization could provide valuable warnings to others, effective threat intelligence sharing is often constrained by data sovereignty and privacy regulations. This paper presents an extension of the federated ensemble graph-based network (FEGB-Net) framework that enables privacy-preserving threat intelligence sharing across government agencies. The proposed approach extracts compact behavioral threat signatures from locally trained federated graph neural network models, protects these signatures using differential privacy, and supports real-time cross-agency threat matching. Experimental evaluation using the CICIDS2017 dataset demonstrates that detection accuracy remains comparable to isolated operation, while coordinated attack detection time is reduced by up to 88.5 %. Privacy analysis confirms that ε-differential privacy with ε = 2.0 limits membership inference attacks to near-random success. The results show that collaborative defense can be achieved without compromising data privacy or sovereignty.</p>
      </trans-abstract>
      <kwd-group xml:lang="ru">
        <kwd>федеративное обучение</kwd>
        <kwd>обмен данными об угрозах</kwd>
        <kwd>графовые нейронные сети</kwd>
        <kwd>дифференциальная приватность</kwd>
        <kwd>государственная кибербезопасность</kwd>
      </kwd-group>
      <kwd-group xml:lang="en">
        <kwd>federated learning</kwd>
        <kwd>threat intelligence sharing</kwd>
        <kwd>graph neural networks</kwd>
        <kwd>differential privacy</kwd>
        <kwd>government cybersecurity</kwd>
      </kwd-group>
      <funding-group>
        <funding-statement xml:lang="ru">Исследование выполнено без спонсорской поддержки.</funding-statement>
        <funding-statement xml:lang="en">The study was performed without external funding.</funding-statement>
      </funding-group>
    </article-meta>
  </front>
  <back>
    <ref-list>
      <title>References</title>
      <ref id="cit1">
        <label>1</label>
        <mixed-citation xml:lang="ru">Ndubuisi A.F. Strengthening national cybersecurity policies through coordinated threat intelligence sharing and real-time public-private collaboration frameworks. International Journal of Science and Research Archive. 2023;8(2):812–831. https://doi.org/10.30574/ijsra.2023.8.2.0299</mixed-citation>
      </ref>
      <ref id="cit2">
        <label>2</label>
        <mixed-citation xml:lang="ru">Alaeifar P., Pal Sh., Jadidi Z., Hussain M., Foo E. Current approaches and future directions for cyber threat intelligence sharing: A survey. Journal of Information Security and Applications. 2024;83. https://doi.org/10.1016/j.jisa.2024.103786</mixed-citation>
      </ref>
      <ref id="cit3">
        <label>3</label>
        <mixed-citation xml:lang="ru">McMahan B., Moore E., Ramage D., Hampson S., Arcas B.A. Communication-efficient learning of deep networks from decentralized data. In: Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, AISTATS 2017, 20–22 April 2017, Fort Lauderdale, FL, USA. PMLR; 2017. P. 1273–1282.</mixed-citation>
      </ref>
      <ref id="cit4">
        <label>4</label>
        <mixed-citation xml:lang="ru">Li T., Sahu A.K., Zaheer M., et al. Federated optimization in heterogeneous networks. In: Proceedings of the Third Conference on Machine Learning and Systems, MLSys 2020, 02–04 March 2020, Austin, TX, USA. MLSys Proceedings; 2020. URL: https://proceedings.mlsys.org/paper_files/paper/2020/file/1f5fe83998a09396ebe6477d9475ba0c-Paper.pdf</mixed-citation>
      </ref>
      <ref id="cit5">
        <label>5</label>
        <mixed-citation xml:lang="ru">Арм А.А.С., Ляпунцова Е.В. Новая гибридная модель обнаружения аномалий с использованием ансамблевого машинного обучения и федеративных графовых нейронных сетей для обеспечения сетевой безопасности. Моделирование, оптимизация и информационные технологии. 2025;13(2). https://doi.org/10.26102/2310-6018/2025.49.2.044</mixed-citation>
      </ref>
      <ref id="cit6">
        <label>6</label>
        <mixed-citation xml:lang="ru">Wu Z., Pan Sh., Chen F., et al. A comprehensive survey on graph neural networks. IEEE Transactions on Neural Networks and Learning Systems. 2021;32(1):4–24. https://doi.org/10.1109/TNNLS.2020.2978386</mixed-citation>
      </ref>
      <ref id="cit7">
        <label>7</label>
        <mixed-citation xml:lang="ru">Kipf Th.N., Welling M. Semi-supervised classification with graph convolutional networks. arXiv. URL: https://arxiv.org/abs/1609.02907 [Accessed 17th December 2025].</mixed-citation>
      </ref>
      <ref id="cit8">
        <label>8</label>
        <mixed-citation xml:lang="ru">Wagner C., Dulaunoy A., Wagener G., Iklody A. MISP: The design and implementation of a collaborative threat intelligence sharing platform. In: WISCS '16: Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, 24 October 2016, Vienna, Austria. New York: ACM; 2016. P. 49–56. https://doi.org/10.1145/2994539.2994542</mixed-citation>
      </ref>
      <ref id="cit9">
        <label>9</label>
        <mixed-citation xml:lang="ru">Dwork C., Roth A. The algorithmic foundations of differential privacy. Foundations and Trends® in Theoretical Computer Science. 2014;9(3–4):211–487. https://doi.org/10.1561/0400000042</mixed-citation>
      </ref>
      <ref id="cit10">
        <label>10</label>
        <mixed-citation xml:lang="ru">Mironov I. Rényi differential privacy. In: 2017 IEEE 30th Computer Security Foundations Symposium (CSF), 21–25 August 2017, Santa Barbara, CA, USA. IEEE; 2017. P. 263–275. https://doi.org/10.1109/CSF.2017.11</mixed-citation>
      </ref>
      <ref id="cit11">
        <label>11</label>
        <mixed-citation xml:lang="ru">Melis L., Song C., De Cristofaro E., Shmatikov V. Exploiting unintended feature leakage in collaborative learning. In: 2019 IEEE Symposium on Security and Privacy (SP), 19–23 May 2019, San Francisco, CA, USA. IEEE; 2019. P. 691–706. https://doi.org/10.1109/SP.2019.00029</mixed-citation>
      </ref>
      <ref id="cit12">
        <label>12</label>
        <mixed-citation xml:lang="ru">Bonawitz K., Ivanov V., Kreuter B., et al. Practical secure aggregation for privacy-preserving machine learning. In: CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 30 October – 03 November 2017, Dallas, TX, USA. New York: ACM; 2017. P. 1175–1191. https://doi.org/10.1145/3133956.3133982</mixed-citation>
      </ref>
      <ref id="cit13">
        <label>13</label>
        <mixed-citation xml:lang="ru">Sculley D., Holt G., Golovin D., et al. Hidden technical debt in machine learning systems. In: Advances in Neural Information Processing Systems 28: Annual Conference on Neural Information Processing Systems 2015, 07–12 December 2015, Montreal, Quebec, Canada. 2015. P. 2503–2511.</mixed-citation>
      </ref>
      <ref id="cit14">
        <label>14</label>
        <mixed-citation xml:lang="ru">Sharafaldin I., Lashkari A.H., Ghorbani A.A. Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: Proceedings of the 4th International Conference on Information Systems Security and Privacy, 22–24 January 2018, Funchal, Madeira, Portugal. SciTePress; 2018. P. 108–116. https://doi.org/10.5220/0006639801080116</mixed-citation>
      </ref>
      <ref id="cit15">
        <label>15</label>
        <mixed-citation xml:lang="ru">Malkov Yu.A., Yashunin D.A. Efficient and robust approximate nearest neighbor search using hierarchical navigable small world graphs. IEEE Transactions on Pattern Analysis and Machine Intelligence. 2020;42(4):824–836. https://doi.org/10.1109/TPAMI.2018.2889473</mixed-citation>
      </ref>
      <ref id="cit16">
        <label>16</label>
        <mixed-citation xml:lang="ru">Tan A.Z., Yu H., Cui L., Yang Q. Towards personalized federated learning. IEEE Transactions on Neural Networks and Learning Systems. 2023;34(12):9587–9603. https://doi.org/10.1109/TNNLS.2022.3160699</mixed-citation>
      </ref>
      <ref id="cit17">
        <label>17</label>
        <mixed-citation xml:lang="ru">Von Scherenberg F., Hellmeier M., Otto B. Data sovereignty in information systems. Electronic Markets. 2024;34(1). https://doi.org/10.1007/s12525-024-00693-4</mixed-citation>
      </ref>
    </ref-list>
    <fn-group>
      <fn fn-type="conflict">
        <p>The authors declare that there are no conflicts of interest present.</p>
      </fn>
    </fn-group>
  </back>
</article>