Abstract
Cyber security is an integral part of security system of any advanced country. Given the fact that the number of cyber attacks constantly increase with concurrent increase of their technological complexity, the paper proposes a new classifier structure to speed up detection of unauthorized interference while maintaining the established accuracy parameters. Method of reducing input data-flow dimensions is the basis for the designed structure of cyber attacks classifier. Unlike other well-known classifier principles, this one is based on a binary type classification of event patterns and two-stage scheme of network connection input data classification. The classifier is verified on the basis of real data and compared with advanced world standards. The results have confirmed the ability of the classifier to quickly detect and classify cyber attacks without loss of accuracy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Buryachok, V.L., Gryschuk, R.V., Horoshko, V.O.: The Policy of Information Security, 222 p. PVP « Zadruga », Кyiv (2014). ISBN 978-966-2970-87-6
ISO/IEC IS 27001:2013. Information Technology. Security Techniques. Information Security Management Systems. Requirements, Switzerland: ISO/IEC, 23 p. (2013)
Serduyk, V.A.: The New in the Corporative Systems Security against Hacking, 360 p. Technosphere, Moskva (2007). ISBN: 978-5-94836-133-8
Ostapenko, A.G., Ivanikin, M.P., Savenkov, G.A.: Attack Detection and Counteraction in the Distributed Information Systems: tutorial, 91 p. Voronezh State Technological University, Voronezh (2013). https://drive.google.com/file/d/0BxTtsLdUO4tbbUNSQXhKSzdCekE/view
Sheluhin, O.I.: The Detection of the Attacks into Computer Networks (network anomalies): tutorial, 220 p. Hot Line – Telecom, Moskva (2013). ISBN 978-5-9912-0323-4
Shangin, V.F.: Computer Information Security. The Effective Methods and Means, 544 p. DMK Press, Moskva (2010). ISBN 978-5-94074-518-1
Gamayunov, D.Y.: The Computer Attack Detection on the Basis of Network Object Behavior: Ph.D. Thesis: spec. 05.13.11, 89 p. Moskva (2007)
Lukatsky, A.: The Attack Detection. The 2-nd edition, 608 p. BHV-Petersburg, Sankt-Petersburg (2003). ISBN 5-941570-54-6
Scherbakov, A.Y.: The Modern Computer Security. The Theortical Background. The Practical Aspects, 352 p. Knizhnyi Mir, Moskva (2009). ISBN 978-5-8041-0378-2
Korobiichuk, I., Ladanyuk, A., Shumyhai, D., Boyko, R., Reshetiuk, V., Kamiński, M.: How to increase efficiency of automatic control of complex plants by development and implementation of coordination control system. In: Recent Advances in Systems, Control and Information Technology. Advances in Intelligent Systems and Computing, vol. 543, pp. 189–195 (2017). doi:10.1007/978-3-319-48923-0_23
Korobiichuk, I., Fedushko, S., Juś, A., Syerov, Y.: Methods of determining information support of web community user personal data verification system. In: Automation, ICA 2017. Advances in Intelligent Systems and Computing (AISC), vol. 550, pp 144–150 (2017). doi:10.1007/978-3-319-54042-9_13
McAfee Official Web Site. http://www.mcafee.com/us/products/network-security-platform.aspx
Check Point software technologies LTD Official Web Site. https://www.checkpoint.com/products/next-generation-threat-prevention/
IBM Official Web Site. http://www-03.ibm.com/software/products/ru/network-ips
Haq, N.F.: Application of machine learning approaches in intrusion detection system: A survey. http://thesai.org/Downloads/IJARAI/Volume4No3/Paper_2-Application_of_Machine_Learning_Approaches_in_Intrusion_Detection_System.pdf
Syarif, I.: Application of Bagging, Boosting and Stacking to Intrusion Detection. https://core.ac.uk/download/files/34/8748111.pdf
Nguyen, H.A.: Application of data mining to network intrusion detection: classifier selection model. http://arxiv.org/ftp/arxiv/papers/1007/1007.1268.pdf
Sinha, N.K.: A Review on Performance Comparison of Artificial Intelligence Techniques Used for Intrusion Detection. http://www.sbsstc.ac.in/icccs2014/Papers/Paper45.pdf
Ghaleb, A.M.M.: Assembly Classifier Approach to Analyze Intrusion Detection Dataset in Networks by Using Data Mining Techniques. http://www.ijsr.net/archive/v4i4/SUB153071.pdf
Shrivas, A.K.: An Ensemble Model for Classification of Attacks with Feature Selection based on KDD99 and NSL-KDD Data Set. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.677.7890&rep=rep1&type=pdf
Amdal’s Law. https://ru.wikipedia.org/wiki/%D0%97%D0%B0%D0%BA%D0%BE%D0%BD_%D0%90%D0%BC%D0%B4%D0%B0%D0%BB%D0%B0
Gryschuk, R.V., Buryachok, V.L., Mamraev, V.M.: The State Informational Resource Attack Classificator Design. Technological Audit and the Production Reserves. Harkiv: PI «Technolog. Center» . No. 1/2 (21). pp. 38–43 (2015). doi:10.15587/2312-8372.2015.37423
Dubrovin, V.I., Subbotin, S.A., Boguslaev, A.V., Yatsenko, V.K.: The Intellectual Means of Aviation Engine Reliability Forecast Diagnostics, 279 p. Motor-Sich, Zaporozhya (2003)
Mamraev, V.M.: The State Information Resource Cyber-Attack Classificator Design Method: Ph.D. thesis: spec. 21.05.01 “state information security”, 160 p. Kyiv (2015)
Voronin, A.N., Ziatdinov, Y.K., Kuklinsky, M.V.: Multicriteria Solutions: Models and Methods, 348 p. NAU, Kyiv (2011)
Weka data mining software. http://www.cs.waikato.ac.nz/ml/weka/index.html
UCI Knowledge Discovery in Databases Archive. http://kdd.ics.uci.edu
Pilkevich, I.A., Molodetska, K.V., Sugoniak, I.I., Lobanchikova, H.M.: The Basics of Automation Control System Design. Zhytomyr. PH of ZhSU named after Franko, I., 226 p. (2014). http://ir.znau.edu.ua/handle/123456789/2487
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Korobiichuk, I., Hryshchuk, R., Mamarev, V., Okhrimchuk, V., Kachniarz, M. (2018). Cyberattack Classificator Verification. In: Kościelny, J., Syfert, M., Sztyber, A. (eds) Advanced Solutions in Diagnostics and Fault Tolerant Control. DPS 2017. Advances in Intelligent Systems and Computing, vol 635. Springer, Cham. https://doi.org/10.1007/978-3-319-64474-5_34
Download citation
DOI: https://doi.org/10.1007/978-3-319-64474-5_34
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-64473-8
Online ISBN: 978-3-319-64474-5
eBook Packages: EngineeringEngineering (R0)