Improvement of cyberspace of information and communication systems of transport for the account of minimization of training selections in systems of investigation of invasions
DOI:
https://doi.org/10.18372/2410-7840.20.12449Keywords:
information and communication system, cybersecurity, information protection, threat recognition, anomalies, minimization of signs, filter methodsAbstract
The last decades were marked by a rapid growth in using of information technologies in various areas of civiliza-tional practices. This confirms the course on digitalization of business processes, particular in the transport industry of the Republic of Kazakhstan. The tendency to digitali-zation of the economy and integration into business pro-cesses of various information and communication sys-tems, obliges to take into account emerging incidental risks. First of all, the part, which is connected with the protection of information and the cybersecurity of digital systems. In the tasks of cyber defense, cognitive technol-ogies for detecting and recognizing intrusions are increas-ingly being used. In the conditions of growing number of destabilizing influences on information and communica-tion systems, including transport, involving a variety of digital technologies, further scientific research is needed to develop the theoretical and methodological founda-tions for the synthesis of intelligent, self-taught intrusion detection systems. It is shown that the process of cyber defense for information and communication systems, in particular transport, is controlled and analyzed according to the values of several parameters of the signs of anom-alies, cyber-attacks and threats. There are considered ad-ditions to methods of selecting informative features for training samples used in intrusion detection systems in this work. It is shown that the most simple, and at the same time effective, from the point of view of hardware and software implementation in such systems are filter methods. Additions are proposed to filter methods in the tasks of minimizing training samples in systems for de-tecting anomalies, attacks and threats. It is shown that the most simple, and at the same time effective, from the point of view of hardware and software implementation in such systems are filter methods. It is shown that the filtering methods allow to perform the estimation of in-formativeness for the subset of characteristics suffi-ciently, in particular to reduce the low-information char-acteristics, the analysis of which makes the detection and classification of anomalies, cyber-attacks and threats dif-ficult.References
A. Petrov, V. Lakhno, A. Korchenko, "Models, methods and information technologies of protection of corporate systems of transport based on intellectual identification of threats", Decision Making in Manufacturing and Services, vol. 9, no. 2, pp. 117-135, 2016.
В. Лахно, "Інформаційна безпека інтелектуальних транспортних систем", Захист інформації, Т. 17, № 4, С. 298-305, 2015.
M. M. Al Hadidi, Y. K. Ibrahim, V. Lakhno, A. Korchenko, А. Tereshchuk, А. Pereverzev, "Intelligent Systems for Monitoring and Recognition of Cyber Attacks on Information and Communication Systems of Transport", International Review on Comput-ers and Software (IRECOS), vol. 11, no. 12, pp. 1167-1177, 2016.
R. Abidar, K. Moummadi, F. Moutaouakkil, H. Medromi, "Intelligent and Pervasive Supervising Platform for Information System Security Based on Multi-Agent Systems", International review on computers and software, Vol. 10, Issue 1, pp. 44-51, 2015.
Г. Бекетова, Б. Ахметов, О. Корченко, В. Лахно, "Розробка моделі інтелектуального розпізнавання аномалій і кібератак з використанням логічних процедур, які базуються на покриттях матриць ознак", Безпека інформації, Т. 22, №. 3, С. 242-254, 2016.
G. Beketova, G. B. Akhmetov, A. Korchenko, V. Lakhno, A. Tereshuk., "Cyber intelligence systems based on adaptive regression splines and logical pro-cedures of attack recognition", Computer modelling and new technologies, vol. 21, no. 2, pp. 7-16, 2017.
A. A. El Hassani, A. A. El Kalam, A. Bouhoula, R. Abassi, A. A. Ouahman, "Integrity-OrBAC: a new model to preserve Critical Infrastructures integrity", International Journal of Information Security, vol. 14, is-sue 4, pp. 367-385, 2015.
Р. Грищук, "Атаки на інформацію в інформаційно-комунікаційних системах", Сучасна спеціальна техніка, no. 1 (24), С. 61-66, 2011.
Petrov, B. Borowik, M. Karpinskyy, Immune and defensive corporate systems with intellectual identification of threats, Pszczyna: Śląska Oficyna Drukarska, 2016, 222 p, ISBN: 978-83-62674-68-8.
V. Lahno, "Ensuring of information processes’ reliability and security in critical application data processing systems", MEST Journal, vol. 2, issue 1, pp. 71-79, 2014.
N. Manap, S. Basir, S. Hussein, P. Tehrani, A. Rouhani, "A. Legal Issues of Data Protection in Cloud Computing", International Journal of Soft Compu-ting, vol. 8, issue 5, pp. 371-376, 2013.
J.A. George, M. Hemalatha, "Improving Authentication and Authorization for Identity Based Cloud Environment Using OAUTH with Fuzzy Based Blow-fish Algorithm", International review on computers and software, vol. 10, issue 7, pp. 783-788, 2015.
H.-H. Li, C.-L. Wu, "Study of Network Access Con-trol System Featuring Collaboratively Interacting Network Security Components", International review on computers and software, vol. 8, issue 2, pp. 527-532, 2013.
R. Geetha, E. Kannan, Secure "Communication Against Framing Attack in Wireless Sensor Network", International review on computers and software, vol. 10, issue 4, pp. 393-398, 2015.
S. Shamshirband, N. B. Anuar, M. L. Kiah, A. Patel, "An appraisal and design of a multiagent system based cooperative wireless intrusion detection computational intelligence technique", Engineering Applica-tions of Artificial Intelligence, vol. 26, issue 9, pp. 2105-2127, 2013.
L. Keunsoo, J. Kim, K. Hoon Kwon, Y. Han, S. Kim, "DDoS attack detection method using cluster analysis", Expert Systems with Applications, vol. 4, issue 3, pp. 1659-1665, 2008.
S. Dilek, H. Çakır, M. Aydın, "Applications of artificial intelligence techniques to combating cyber-crimes: A review", International Journal of Artificial Intel-ligence & Applications, vol. 6, issue 1, pp. 21-39, 2015.
A. Patel, M. Taghavi, K. Bakhtiyari, J. Celestino Junior, "An intrusion detection and prevention system in cloud computing: A systematic review", Journal of Network and Computer Applications, vol. 36, issue 1, pp. 25-41, 2013.
D. K. Barman, G. Khataniar, "Design of Intrusion Detection System Based On Artificial Neural Net-work and Application of Rough Set", International Journal of Computer Science and Communication Networks, vol. 2, issue 4, pp. 548-552, 2012.
J. Raiyn, "A survey of Cyber Attack Detection Strategies", International Journal of Security and Its Applications, vol. 8, issue 1, pp. 247-256, 2014.
S. Mukkamala, A.H. Sung, A. Abraham, V. Ramos, "Intrusion detection systems using adaptive regression splines", Sixth International Conference on Enterprise Information Systems, part 3, pp. 211-218, 2006.
B. Akhmetov, "Designing a decision support system for the weakly formalized problems in the provision of cybersecurity", Eastern-European Journal of Enterprise Technologies, vol. 1, no. 2 (85), pp. 4-15, 2017.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).