Improvement of cyber deffence information systems by adaptive technologies recognition of cyberattacks

Authors

  • Валерий Анатольевич Лахно European University
  • Анна Михайловна Терещук European University
  • Тарас Анатолиевич Петренко Chernihiv National University of Technology

DOI:

https://doi.org/10.18372/2410-7840.18.10588

Keywords:

major-critical information systems, cyber security, information security, threats detection, abnor-malities, clustering features, information and extreme algorithm

Abstract

The last decade showed the rapid development of major-critical information systems (MCIS), where cyber tech-nology detection and identification of cyber-attacks are used for cyber defense. Necessity of further research in the development of methodological and theoretical foundations of information synthesis of self-learning cyber defense systems are caused by growing number destabilizing factors of cyber security of MCIS. This paper contains tasks of improving the stability of MCIS in terms of introduction of new systems and moderniza-tion of existing information and automated control sys-tems with increasing number of destabilizing effects on the availability, confidentiality and integrity of infor-mation.The process of cyber defense of MCIS is monitored and analyzed by values of several parameters of abnormalities signs or cyber-attacks. This is make it possible to carry out a preliminary assessment of information security via the clustering feature set of abnormalities or attempted cyber-attacks. Offered a categorical model of develop-ment adaptive systems of an intellectual detection of cyber threats (ASIDCT). Algorism of self-learning of ASIDCT is developed with the help of procedure of fuzzy clustering. This allows to create an adaptive self-learning mechanisms of ASIDCT. To assess the quality partitioning area of abnormalities signs, vulnerabilities and cyber-attacks is made a rational set of number of clusters and fuzziness index clusters in features area. It is proved that the offered approach gives the possibility to solve complex problems in control of cyber-attack pro-cess of MCIS and can be used in the development of software solutions for cyber defense systems.

Author Biographies

Валерий Анатольевич Лахно, European University

Doctor of Science, associate professor, Head of Complex Information Security Organization Department, European University

Анна Михайловна Терещук, European University

Senior lecturer of Department of Information Systems and Mathematical Disciplines, Eu-ropean University.

Тарас Анатолиевич Петренко, Chernihiv National University of Technology

Senior lecturer of mathematical simulation and cybersecurity department, Chernihiv National University of Technology

References

Abidar, R. Intelligent and Pervasive Supervising Platform for Information System Security Based on Multi-Agent Systems [Text] / R. Abidar, K. Moummadi, F. Moutaouakkil, H. Medromi // in-ternational review on computers and software. – 2015. – Vol. 10, Issue 1. – p. 44–51.

Alcaraz, C. Critical Control System Protection in the 21st Century [Text] / C. Alcaraz, S. Zeadally // Com-puter. – 2013. – vol. 46, Issue 10. – p. 74–83.

Jegede, A. J. Information Security Policy: Relevance, Creation and Enforce-ment [Text] / A. J. Jegede, G. I. O. Aimufua, H. O. Salami // International Jour-nal of Soft Computing. – 2007. – Vol. 2, Issue 3. – p. 408–410.

Hassani, A. Integrity-OrBAC: a new model to preserve Critical Infrastructures integrity [Text] / A. A. El Hassani, A. A. El Kalam, A. Bouhoula, R. Abassi, A. A. Ouahman // International Journal of Information Security. – 2015. –Vol. 14, Issue 4. – p. 367–385.

Attacks Statistics [Electronic resource]. – Availa-ble at: http://www.hackmageddon. com / 2016 / 01/ 11/ 2015-cyber-attacks-statistics.

Дудикевич В. Б. Проблеми оцінки ефективності систем захисту [Текст] / В. Б. Дудикевич, І. А. Прокопишин, В. Ф. Чекурін // Вісник Національного університету "Львівська політехніка". Сер.: Автоматика, вимірювання та керування. – 2012. – № 741. – С. 118–122.

Грищук, Р. В. Атаки на інформацію в інформаційно-комунікаційних системах [Текст] / Р. В. Грищук // Сучасна спеціальна техніка. – 2011. – № 1 (24). – С. 61–66.

Корченко, А. А. Система формирования нечетких эталонов сетевых параметров [Текст] / А. А. Корченко // Захист інформації. – 2013. – Т. 15, № 3. – С. 240–246.

Lahno, V. Ensuring of information processes’ reliability and security in critical application data processing sys-tems [Text] / V. Lahno // MEST Journal. – Belgrade. – 2014. –Vol. 2, Issue 1. – P. 71–79.

Manap, N. A. Legal Issues of Data Protection in Cloud Computing [Text] / N. Manap, S.Basir, S. Hussein, P. Tehrani, A. Rouhani // International Journal of Soft Computing. – 2013. – Vol. 8, Issue 5. – P. 371–376.

George, J. A. Improving Authentication and Authori-zation for Identity Based Cloud Environment Using OAUTH with Fuzzy Based Blowfish Algorithm [Text] / J. A. George, M. Hemalatha // international review on computers and software. – 2015. – Vol. 10, Issue 7. – p. 783–788.

Li, H.-H. Study of Network Access Control System Featuring Collaboratively Interacting Network Security Components [Text] / H.-H. Li, C.-L. Wu // interna-tional review on computers and software. – 2013. – Vol. 8, Issue 2. – P. 527–532.

Geuna K.Applying Need Pull and Technology Push Theory to Organizational Information Security Man-agement [Text] / K. Geuna, K. Sanghyun // Interna-tional Business Management. – 2015. – Vol. 9. Issue 4. – p. 524–531.

Geetha, R. Secure Communication Against Framing Attack in Wireless Sensor Network [Text] / R. Geetha, E. Kannan // international review on computers and software. – 2015. – Vol. 10, Issue 4. – p. 393–398.

Shamshirband, S. An appraisal and design of a multia-gent system based cooperative wireless intrusion detec-tion computational intelligence technique [Text] / S. Shamshirband, N. B. Anuar, M. L. Kiah, A. Patel, // Engineering Applications of Artificial Intelligence. – 2013. – Vol. 26, Issue 9. – p. 2105–2127.

Мірошник, М. А. Розробка методів оцінки ефективності захисту інформації в розподілених комп'ютерних системах [Текст] / M. А. Мірошник // Інформаційно-керуючі системи на залізничному транспорті: науково-технічний журнал. – 2015. – № 4 (113). – С. 39–43.

Keunsoo, L. DDoS attack detection method using cluster analysis [Text] / L. Keunsoo, J. Kim, K. Hoon Kwon, Y. Han, S. Kim // Expert Systems with Applications. – 2008. – Vol. 4, Issue 3. – p. 1659–1665.

Dilek, S. Applications of artificial intelligence tech-niques to combating cyber-crimes: A review [Text] / S. Dilek, H. Çakır, M. Aydın // International Jour-nal of Artificial Intelligence & Applications. – 2015. – Vol. 6, Issue 1. – P. 21–39.

Patel, A. M. An intrusion detection and prevention system in cloud computing: A systematic review [Text] / A. Patel, M. Taghavi, K. Bakhtiyari, J. Cel-estino Junior // Journal of Network and Computer Applications. – 2013. – Vol. 36, Issue 1. – P. 25–41.

Barman, D. K. Design of Intrusion Detection Sys-tem Based On Artificial Neural Network and Appli-cation of Rough Set [Text] / D. K. Barman, G. Khataniar // International Journal of Computer Science and Communication Networks. – 2012. – Vol. 2, Issue 4. – P. 548–552.

Raiyn, J. A survey of Cyber Attack Detection Strat-egies [Text] / J. Raiyn // International Journal of Security and Its Applications. – 2014. – Vol. 8, Issue 1 –P. 247–256.

Mukkamala, S. Intrusion detection systems using adaptive regression splines [Text] / S. Mukkamala, A.H. Sung, A. Abraham, V. Ramos // Sixth Inter-national Conference on Enterprise Information Sys-tems. – 2006. – Part 3. – P. 211–218.

Kotenko, I. Integrated repository of security infor-mation for network security evaluation [Text] / I. Kotenko, A. Fedorchenko, A. Chechulin // Journal of Wireless Mobile Networks, Ubiquitous Compu-ting, and Dependable Applications (JoWUA). – 2015. – Vol. 6, Issue 2. – P. 41–57.

Lakhno V. Creation of the adaptive cyber threat detection system on the basis of fuzzy feature clus-tering [Text] / V. Lakhno // Eastern-European Journal of Enterprise Technologies. – 2016. – Vol. 2, No 9(80): Information and controlling system. – P. 18–25. DOI: 10.15587/1729-4061.2016.66015.

Published

2016-05-30

Issue

Section

Articles