Issue 1 (211), article 1


Cybernetics and Computer Engineering, 2023, 1(211)

ODARCHENKO R.S.1, DSc (Engineering), Professor,
Head of the Telecommunication and Radio Electronic Systems Department ,

BONDAR S.O.2, Acting Head of Intelligent Control Department, Researcher ,

SIMAKHIN V.M.2, Ph.D. student,
Researcher of Intelligent Control Department ,

Researcher of Intelligent Control Department ,

PINCHUK A.D.1, Student ,


STANKO P.O.3, PhD (Engineering),
Associate Professor of the Information Technologies Department

1National Aviation University,
1, av. Lubomyra Huzara, 03058, Kyiv, Ukraine

2International Research and Training Center for Information
Technologies and Systems of the NAS and MES of Ukraine,
40, av. Acad. Glushkov, 03680, Kyiv, Ukraine

3University of New Technologies,
5A, st. Metrobudivska, 03065, Kyiv, Ukraine


Introduction. This research paper examines the current state of cyberwarfare in the world. The issues regarding definition of the very term “cyberwar” are discussed. The historical beginning of the Russian-Ukrainian cyberwar, its course and current state are considered, as well as the main means of its conduct are examined. It has been determined that this cyberwar was the world’s first full-scale global cyberwar. The main attention is paid to the cybervolunteer IT army of Ukraine, which appeared in the course of this cyberwar and is successfully combating with the russian federation on the cyberfront.

The purpose of the article  is to show the process of waging a real cyberwar today, the application of the means for its carrying out, and conduct a study of its intermediate results; using Ukraine as the example to show the efficiency and effectiveness of the work of cybervolunteer initiatives.

The results. An analysis of the main existing approaches to conducting cyberwarfare was carried out, and the types of cyberattacks that are most often used were determined. It has been determined which directions and means of conducting cyberspace the russian federation focuses on. The IT activities of the Ukrainian army were studied, the key areas of work were determined and their detailed classification was given. In the course of the study, the main indicators of the effectiveness of the cyberarmy of Ukraine were determined and statistical data on the work of key areas were collected, on the basis of which the efficiency, effectiveness and problems that arise during the fight on the cyberfront were analyzed.

Conclusions. For the first time, the process of waging the Russian-Ukrainian cyberwar was examined in detail, with an emphasis on the activities of cybervolunteer initiatives of Ukraine. Determining the key areas of their activity made it possible to investigate the effectiveness and determine the intermediate results of this cyberwar. After analyzing all the data, recommendations were made to improve efficiency and effectiveness in the fight on the cyberfront.

Keywords: cyberfront, cyberwar, approaches to waging cyberwars, cyberweapons, Russian-Ukrainian cyberwar, cybervolunteer initiatives, IT Army of Ukraine.

Download full text!


1. Cyber defence. NATO. URL:

2. Cyberwar timeline. InfoPlease. URL:

3. 30 years ago, the world’s first cyberattack set the stage for modern cybersecurity challenges. The Conversation. URL:

4. The Age of Cyberwarfare. Columbia Magazine. URL: rticle/age-cyberwarfare

5. Kaiser R. The birth of cyberwar. Political Geography. 2015, Vol. 46, pp. 11-20.

6. luciana aparecida santos Santos. The Georgia’s Cyberwar. – Share research. URL:

7. Cyber War and Ukraine. Center for Strategic and International Studies |. URL:

8. Howell K. U.S. begins cyberwar against ISIS. The Washington Times. URL:

9. Security Magazine. Security Magazine. The business magazine for security executives. URL:

10. Wikimedia projects participants. Russian-Ukrainian cyberwarfare URL:

11. Pakharenko G. Cyber Operations at Maidan: A First-Hand Account. Tallinn : NATO CCD COE Publications, 2015, 10p. URL: h07_CyberWarinPerspective_Pakharenko.pdf .

12. Maschmeyer L., Dunn Cavelty M. Goodbye Cyberwar: Ukraine as Reality Check. Research Collection. URL: 49252/P10-3_2022-EN.pdf?sequence=2&isAllowed=y

13. Pinchiuk А., Odarchenko R. Modern methods of the cyberwarfare conducting. XL Scientific and technical conference of young scientists and speciallists of G.E. Pukhov Institute of Modelling problems in energetics of the NAS of Ukraine. Proceedings of the scientific and technical conference (Kyiv, 11 of May 2022 р.). G.E. Pukhov Institute of Modelling problems in energetics of the NAS of Ukraine, Kyiv, 2022, pp. 31-32

14. DDOS attacks on several Ukrainian banks and state websites on February, 15. Systems for business. URL:

15. Molodan V. “Beware and wait for worth”: hackers attacked websites of Ukrainian Ministries, «Diia»-website is disconnected – Ukrainian and worldwide news online – main business portal. URL:

16. FEDOROV. Telegram. URL:

17. Ukrinform. Powerful 300-thousand IT-army have been established in Ukraine – Fedorov. Ukrinform – Ukrainian and world’s relevant news. URL:

18. UYkiL. Who are Anonymous and why they are helping Ukraine to defeat russia. URL:

19. Ukrinform. Details of the Ukrtelecom cyberattack have been revealed by State Service of Special Communications and Information Protection of Ukraine. Ukrinform – recent news of world and Ukraine. URL:

20. The Economical Truth. Government reports about the new cyberattack on the governmental services. The Economical Truth. URL:

21. Pavliuk O. Russian hackers claimed the “cyberwar” to states that are support “Nazis and russophobia”. URL:

22. Cyber Warfare. URL:

23. Hanna K. T., Ferguson K., Rosencrance L. What is cyberwarfare?. SearchSecurity. URL:

24. StopRussia | MRIYA. StopRussia | MRIYA. URL:

25. Ukrainian Internet Army. Telegram. URL:

26. Ukrinform. Ukraine organizedly reacts on russian cyberattacks – National Security and Defense Council of Ukraine. Ukrinform – recent news of world and Ukraine. URL:

27. Daniel Hughes and Andrew Colarik. The Hierarchy of Cyber War Definitions. Pacific-Asia Workshop on Intelligence and Security Informatics.Springer, 2017, pp.15-33.

28. Richard A. Clarke, Robert Knake. Cyber War: The Next Threat to National Security and What to Do About It. Reprint edition. New York: Ecco, 2012, p.6.

29. Merezhko О. Cyberwar and cybersecurity problems at the international policy. Juridical Journal. 2009, 6, p. 94.

30. Carr J. Inside Cyber Warfare. USA, O’Reilly, 2010.

31. Hildreth S.A. Cyberwarfare. Congressional Research Service Report for Congress. No. RL30735, 19 June 2001.

32. Parks R.C., Duggan D.P. Principles of Cyberwarfare. IEEE Security & Privacy Magazine. 2011, Vol. 9, no. 5, pp. 30-35.

33. Samuel Liles .Applying Traditional Military Principles to Cyber Warfare. 4th International Conference on Cyber Conflict. NATO CCD COE Publications, Tallinn. 2012, pp. 169-178.

34. Ashraf C. Defining cyberwar: towards a definitional framework. Defense & Security Analysis. 2021, pp. 1-21.

35. Manoj Kumar. Cyber Warfare: New Dimension in Security and Strategy. Search eLibrary: SSRN. URL:

36. Andress J., Winterfeld S. Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners. Elsevier Science & Technology Books, 2013, 324 p.

37. Recognizing the seven stages of a cyber-attack – DNV. DNV. URL: cybersecurity/cyber-insights/recognizing-the-seven-stages-of-a-cyber-attack.html

38. J. H. Choi. On cyberattack mechanisms. International Journal of Web and Grid Services. 2013, Vol. 9, no. 4, pp. 351.

39. Zeadally S., Flowers A. Cyberwar: The What, When, Why, and How [Commentary]. IEEE Technology and Society Magazine. 2014, Vol. 33, no. 3, pp. 14-21.

40. Stevens T. A Cyberwar of Ideas? Deterrence and Norms in Cyberspace. Contemporary Security Policy. 2012, Vol. 33, no. 1, pp. 148-170. URL:

41. Zetter Kim.(2016). Insidethe Cunning, Unprecedented Hack of Ukraine’s Power Grid. Wired. URL:

42. Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art. International Journal of Computer Applications. 2012, Volume 49- No.7, (0975-8887)

43. Neha Singh, Ravindra Kumar Purwar. SQL INJECTIONS – A HAZARD TO WEB APPLICATIONS. International Journal of Advanced Research in Computer Science and Software Engineering. 2012, No. 2, pp. 42-46.

44. Fight against the enemy on the IT-front official website – IT ARMY of Ukraine. Fight against the enemy on the IT-front official website – IT ARMY of Ukraine. URL:

45. Ukraine calls for entering International Legion of Internet Army Techukraine. Techukraine. URL:

46. Routine portion of anti-Semitism from Russia. At Viber this time. – articles and data journalism for the people. URL: cherhova-portsija-antysemityzmu-vid-rosiyi-tsoho-razu-u-vajberi/

47. TSN-editorship. TikTok would be derussificated, but danger remains: how russian federation spreads propaganda inside the popular network. Т URL:

48. Ukrainian Internet Forces. Telegram. URL:

49. Ukrainian Internet Forces. Telegram. URL:

50. Ukrainian Internet Forces. Telegram. URL: HYPERLINK “”

Received 20.11.2022