Cyberattack detection system
DOI:
https://doi.org/10.18372/2225-5036.23.12215Keywords:
attacks, cyberattacks, anomalies, detection of cyberattacks, detection of anomalies, intrusion detection systems, anomaly detection systems, attack detection systems, cyberattack detection systemsAbstract
Today, one of the conditions for providing cybersecurity in large organizations is ensure the continuity of the intrusion detection (cyberattack) process (cyberattacks). The most common are systems, which using known attacks signature (patterns) in network traffic and the systems, which oriented at detecting abnormalities that contain the normal (abnormal) activity profile. That systems have a number of disadvantages that overlap expert approaches based on the use of knowledge and experience of specialists in the relevant subject area. Extending the influence of cyberattacks, oriented to various information systems resources, initiates the task of constructing technical solutions and developing special tools that can remain effective when new types of threats appear with unidentified or unclear parameters. There are a number of very effective developments, which are used to solve such tasks of detecting cyberattacks. For this purpose, based on the well-known methodology for building of detecting anomalies systems, generated by cyberattacks, attacks detecting system was developed. The developed system, at the expense of cyberattacks databases, rules and standards, modules for the formation of current values, a-level denomination, identifying terms, level of abnormality and visualization, allows to build tools that expand the functional capabilities of modern systems of intrusion detection. This is achieved by determining the level of the abnormal state, the characteristic effect of a certain type of cyberattack in faintly formalized fuzzy environment.References
А. Корченко, «Построение систем защиты информации на нечетких множествах», Теория и практические решения, К.:МК-Пресс, 320 с., 2006.
А. Корченко, В. Щербина, Н. Вишневская, «Методология построения систем выявления ано-малий порожденных кибератаками», Захист інфор-мації, №1, Т.18, с. 30-38, 2016.
А. Корченко, «Кортежная модель форми-рования набора базовых компонент для выявления кибератак», Правове, нормативне та метрологічне за-безпечення системи захисту інформації в Україні, В.2 (28), с. 29-36, 2014.
A. Korchenko, K. Warwas, А. Kłos-Witkowska, «The Tupel Model of Basic Components' Set Formation for Cyberattacks», Proceedings of the 2015 IEEE 8th International Conference on «Intelligent Data Ac-quisition and Advanced Computing Systems: Technology and Applications» (IDAACS’2015), Warsaw, Poland, Septem-ber 24-26,: Vol. 1, pp. 478-483, 2015.
А. Корченко, «Метод формирования лингвистических эталонов для систем выявления вторжений» Захист інформації, Т.16, №1, с. 5-12, 2014.
И. Терейковский, А. Корченко, П. Викулов, А. Шаховал, «Модели эталонов лингви-стических переменных для обнаружения сниф-финг-атак», Захист інформації, №3, Т.19, с. 228-242, 2017.
В. Akhemetov, А. Korchenko, S. Akhmetova, N. Zhumangalieva, «Improved method for the for-mation of linguistic standards for of intrusion detection systems», Journal of Theoretical and Applied Information Technology, vol.87. №.2, p. 221-232, 2016
M. Karpinski, A. Korchenko, P. Vikulov, R. Kochan, «The Etalon Models of Linguistic Variables for Sniffing-Attack Detection», Proceedings of the 2017 IEEE 9th International Conference on «Intelligent Data Ac-quisition and Advanced Computing Systems: Technology and Applications» (IDAACS’2017), Romania, Bucharest, Sep-tember 21-23, Vol. 1, p. 258-264, 2017:
А. Корченко, «Метод фаззификации па-раметров на лингвистических эталонах для систем выявления кибератак», Безпека інформації, № 1 (20), с. 21-28, 2014.
А. Корченко, «Метод -уровневой номи-нализации нечетких чисел для систем обнаружения вторжений», Захист інформації, Т.16, №4, с.292-304, 2014.
А. Корченко, «Метод определения иден-тифицирующих термов для систем обнаружения вторжений», Безпека інформації, Т.20, № 3, с. 217-223, 2014
Н. Карпинский, А. Корченко, С. Ахмето-ва, «Метод формирования базовых детекционных правил для систем обнаружения вторжений», За-хист інформації, №4, Т.17, с. 312-324, 2015.
A. Korchenko, Z. Alimseitova, N. Zhumangaliyeva, «А system for identifying anoma-ly state in informational systems», VII Inter University Conference of Students, PhD Students and Young Scientists «Engineer of XXI Century», Poland, Vol.2, p. 39-48, 2017.