Improvement of cyber deffence information systems by adaptive technologies recognition of cyberattacks
DOI:
https://doi.org/10.18372/2410-7840.18.10588Keywords:
major-critical information systems, cyber security, information security, threats detection, abnor-malities, clustering features, information and extreme algorithmAbstract
The last decade showed the rapid development of major-critical information systems (MCIS), where cyber tech-nology detection and identification of cyber-attacks are used for cyber defense. Necessity of further research in the development of methodological and theoretical foundations of information synthesis of self-learning cyber defense systems are caused by growing number destabilizing factors of cyber security of MCIS. This paper contains tasks of improving the stability of MCIS in terms of introduction of new systems and moderniza-tion of existing information and automated control sys-tems with increasing number of destabilizing effects on the availability, confidentiality and integrity of infor-mation.The process of cyber defense of MCIS is monitored and analyzed by values of several parameters of abnormalities signs or cyber-attacks. This is make it possible to carry out a preliminary assessment of information security via the clustering feature set of abnormalities or attempted cyber-attacks. Offered a categorical model of develop-ment adaptive systems of an intellectual detection of cyber threats (ASIDCT). Algorism of self-learning of ASIDCT is developed with the help of procedure of fuzzy clustering. This allows to create an adaptive self-learning mechanisms of ASIDCT. To assess the quality partitioning area of abnormalities signs, vulnerabilities and cyber-attacks is made a rational set of number of clusters and fuzziness index clusters in features area. It is proved that the offered approach gives the possibility to solve complex problems in control of cyber-attack pro-cess of MCIS and can be used in the development of software solutions for cyber defense systems.References
Abidar, R. Intelligent and Pervasive Supervising Platform for Information System Security Based on Multi-Agent Systems [Text] / R. Abidar, K. Moummadi, F. Moutaouakkil, H. Medromi // in-ternational review on computers and software. – 2015. – Vol. 10, Issue 1. – p. 44–51.
Alcaraz, C. Critical Control System Protection in the 21st Century [Text] / C. Alcaraz, S. Zeadally // Com-puter. – 2013. – vol. 46, Issue 10. – p. 74–83.
Jegede, A. J. Information Security Policy: Relevance, Creation and Enforce-ment [Text] / A. J. Jegede, G. I. O. Aimufua, H. O. Salami // International Jour-nal of Soft Computing. – 2007. – Vol. 2, Issue 3. – p. 408–410.
Hassani, A. Integrity-OrBAC: a new model to preserve Critical Infrastructures integrity [Text] / A. A. El Hassani, A. A. El Kalam, A. Bouhoula, R. Abassi, A. A. Ouahman // International Journal of Information Security. – 2015. –Vol. 14, Issue 4. – p. 367–385.
Attacks Statistics [Electronic resource]. – Availa-ble at: http://www.hackmageddon. com / 2016 / 01/ 11/ 2015-cyber-attacks-statistics.
Дудикевич В. Б. Проблеми оцінки ефективності систем захисту [Текст] / В. Б. Дудикевич, І. А. Прокопишин, В. Ф. Чекурін // Вісник Національного університету "Львівська політехніка". Сер.: Автоматика, вимірювання та керування. – 2012. – № 741. – С. 118–122.
Грищук, Р. В. Атаки на інформацію в інформаційно-комунікаційних системах [Текст] / Р. В. Грищук // Сучасна спеціальна техніка. – 2011. – № 1 (24). – С. 61–66.
Корченко, А. А. Система формирования нечетких эталонов сетевых параметров [Текст] / А. А. Корченко // Захист інформації. – 2013. – Т. 15, № 3. – С. 240–246.
Lahno, V. Ensuring of information processes’ reliability and security in critical application data processing sys-tems [Text] / V. Lahno // MEST Journal. – Belgrade. – 2014. –Vol. 2, Issue 1. – P. 71–79.
Manap, N. A. Legal Issues of Data Protection in Cloud Computing [Text] / N. Manap, S.Basir, S. Hussein, P. Tehrani, A. Rouhani // International Journal of Soft Computing. – 2013. – Vol. 8, Issue 5. – P. 371–376.
George, J. A. Improving Authentication and Authori-zation for Identity Based Cloud Environment Using OAUTH with Fuzzy Based Blowfish Algorithm [Text] / J. A. George, M. Hemalatha // international review on computers and software. – 2015. – Vol. 10, Issue 7. – p. 783–788.
Li, H.-H. Study of Network Access Control System Featuring Collaboratively Interacting Network Security Components [Text] / H.-H. Li, C.-L. Wu // interna-tional review on computers and software. – 2013. – Vol. 8, Issue 2. – P. 527–532.
Geuna K.Applying Need Pull and Technology Push Theory to Organizational Information Security Man-agement [Text] / K. Geuna, K. Sanghyun // Interna-tional Business Management. – 2015. – Vol. 9. Issue 4. – p. 524–531.
Geetha, R. Secure Communication Against Framing Attack in Wireless Sensor Network [Text] / R. Geetha, E. Kannan // international review on computers and software. – 2015. – Vol. 10, Issue 4. – p. 393–398.
Shamshirband, S. An appraisal and design of a multia-gent system based cooperative wireless intrusion detec-tion computational intelligence technique [Text] / S. Shamshirband, N. B. Anuar, M. L. Kiah, A. Patel, // Engineering Applications of Artificial Intelligence. – 2013. – Vol. 26, Issue 9. – p. 2105–2127.
Мірошник, М. А. Розробка методів оцінки ефективності захисту інформації в розподілених комп'ютерних системах [Текст] / M. А. Мірошник // Інформаційно-керуючі системи на залізничному транспорті: науково-технічний журнал. – 2015. – № 4 (113). – С. 39–43.
Keunsoo, L. DDoS attack detection method using cluster analysis [Text] / L. Keunsoo, J. Kim, K. Hoon Kwon, Y. Han, S. Kim // Expert Systems with Applications. – 2008. – Vol. 4, Issue 3. – p. 1659–1665.
Dilek, S. Applications of artificial intelligence tech-niques to combating cyber-crimes: A review [Text] / S. Dilek, H. Çakır, M. Aydın // International Jour-nal of Artificial Intelligence & Applications. – 2015. – Vol. 6, Issue 1. – P. 21–39.
Patel, A. M. An intrusion detection and prevention system in cloud computing: A systematic review [Text] / A. Patel, M. Taghavi, K. Bakhtiyari, J. Cel-estino Junior // Journal of Network and Computer Applications. – 2013. – Vol. 36, Issue 1. – P. 25–41.
Barman, D. K. Design of Intrusion Detection Sys-tem Based On Artificial Neural Network and Appli-cation of Rough Set [Text] / D. K. Barman, G. Khataniar // International Journal of Computer Science and Communication Networks. – 2012. – Vol. 2, Issue 4. – P. 548–552.
Raiyn, J. A survey of Cyber Attack Detection Strat-egies [Text] / J. Raiyn // International Journal of Security and Its Applications. – 2014. – Vol. 8, Issue 1 –P. 247–256.
Mukkamala, S. Intrusion detection systems using adaptive regression splines [Text] / S. Mukkamala, A.H. Sung, A. Abraham, V. Ramos // Sixth Inter-national Conference on Enterprise Information Sys-tems. – 2006. – Part 3. – P. 211–218.
Kotenko, I. Integrated repository of security infor-mation for network security evaluation [Text] / I. Kotenko, A. Fedorchenko, A. Chechulin // Journal of Wireless Mobile Networks, Ubiquitous Compu-ting, and Dependable Applications (JoWUA). – 2015. – Vol. 6, Issue 2. – P. 41–57.
Lakhno V. Creation of the adaptive cyber threat detection system on the basis of fuzzy feature clus-tering [Text] / V. Lakhno // Eastern-European Journal of Enterprise Technologies. – 2016. – Vol. 2, No 9(80): Information and controlling system. – P. 18–25. DOI: 10.15587/1729-4061.2016.66015.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).