The method of a-level of nominalization for intrusion detection systems
DOI:
https://doi.org/10.18372/2410-7840.16.7614Keywords:
cyber attacks, anomalies, fuzzy standards, a-level fuzzy numbers, intrusion detection systems, anomaly detection systems, attack detection systems, anomaly detection in computer networksAbstract
Modern facalities which are used for cyber attacks detec-tion in low defined partially formalized environment have a number of limitations. As part of this goal, the appro-priate technical solutions are developed for intrusion detection systems, where the basis is the method for anomalies detection caused by cyber attacks in infor-mation system. In this method the process of transfor-mation of standards and current fuzzy numbers requires the precise formalization. To overcome this limitation, a method which is based on mathematical models and methods of fuzzy logic and is implemented through three basic stages: formation of a-levels which is equivalent to the conversion of fuzzy numbers, the formation of ge-nerelized tables and graphical interpretation of nominal-ized fuzzy numbers. The method enables to formalize the process of -level intervals formation to get the equiva-lent transformation of standard and current fuzzy num-bers, which in turn will make it possible to define the identifying terms that indicate the current state of the environment and increase the efficiency of corresponding intrusion detection systems.References
. Корченко А.А. Система выявления аномального состояния в компьютерных сетях / А.А. Корче-нко // Безпека інформації. – 2012. – № 2 (18). – С. 80-84.
. Корченко А.А. Система формирования нечетких эталонов сетевых параметров / А.А. Корченко // Захист інформації. – 2013. – Т.15, №3. – С. 240-246.
. Корченко А.А. Система формирования эвристи-ческих правил для оценивания сетевой активно-сти / А.А. Корченко // Захист інформації. – 2013. – №4. Т.15. – С. 353-359.
. Стасюк А.И. Метод выявления аномалий порожденных кибератаками в компьютерных сетях / А.И. Стасюк, А.А. Корченко // Захист інфор-мації. – 2012. – №4 (57). – С. 129-134.
. Стасюк А.И. Базовая модель параметров для по-строения систем выявления атак / А.И. Стасюк, А.А. Корченко // Захист інформації. –2012. – № 2 (55). – С. 47-51. [6]. Корченко А.Г. Построение систем защиты информации на нечетких множествах [Текст] : Теория и практические решения / А.Г. Корченко. – К. : МК-Пресс, 2006. – 320 с.
. Корченко А.А. Метод формирования лингвисти-ческих эталонов для систем выявления вторже-ний / А.А. Корченко // Захист інформації. – Т.16, №1. – 2014. – С. 5-12.
. Модели эталонов лингвистических переменных для систем выявления атак / М.Г. Луцкий, А.А. Корченко, А.В. Гавриленко, А.А Охрименко // Захист інформації. – 2012. – №2 (55). – С. 71-78.
. Корченко А.А. Метод фаззификации параметров на лингвистических эталонах для систем выявления кибератак / А.А. Корченко // Безпека інформації. – 2014. – № 1 (20). – С. 21-28.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).