Skip to main content

Cyberattack Classificator Verification

  • Conference paper
  • First Online:
Advanced Solutions in Diagnostics and Fault Tolerant Control (DPS 2017)

Abstract

Cyber security is an integral part of security system of any advanced country. Given the fact that the number of cyber attacks constantly increase with concurrent increase of their technological complexity, the paper proposes a new classifier structure to speed up detection of unauthorized interference while maintaining the established accuracy parameters. Method of reducing input data-flow dimensions is the basis for the designed structure of cyber attacks classifier. Unlike other well-known classifier principles, this one is based on a binary type classification of event patterns and two-stage scheme of network connection input data classification. The classifier is verified on the basis of real data and compared with advanced world standards. The results have confirmed the ability of the classifier to quickly detect and classify cyber attacks without loss of accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Buryachok, V.L., Gryschuk, R.V., Horoshko, V.O.: The Policy of Information Security, 222 p. PVP « Zadruga », Кyiv (2014). ISBN 978-966-2970-87-6

    Google Scholar 

  2. ISO/IEC IS 27001:2013. Information Technology. Security Techniques. Information Security Management Systems. Requirements, Switzerland: ISO/IEC, 23 p. (2013)

    Google Scholar 

  3. Serduyk, V.A.: The New in the Corporative Systems Security against Hacking, 360 p. Technosphere, Moskva (2007). ISBN: 978-5-94836-133-8

    Google Scholar 

  4. Ostapenko, A.G., Ivanikin, M.P., Savenkov, G.A.: Attack Detection and Counteraction in the Distributed Information Systems: tutorial, 91 p. Voronezh State Technological University, Voronezh (2013). https://drive.google.com/file/d/0BxTtsLdUO4tbbUNSQXhKSzdCekE/view

  5. Sheluhin, O.I.: The Detection of the Attacks into Computer Networks (network anomalies): tutorial, 220 p. Hot Line – Telecom, Moskva (2013). ISBN 978-5-9912-0323-4

    Google Scholar 

  6. Shangin, V.F.: Computer Information Security. The Effective Methods and Means, 544 p. DMK Press, Moskva (2010). ISBN 978-5-94074-518-1

    Google Scholar 

  7. Gamayunov, D.Y.: The Computer Attack Detection on the Basis of Network Object Behavior: Ph.D. Thesis: spec. 05.13.11, 89 p. Moskva (2007)

    Google Scholar 

  8. Lukatsky, A.: The Attack Detection. The 2-nd edition, 608 p. BHV-Petersburg, Sankt-Petersburg (2003). ISBN 5-941570-54-6

    Google Scholar 

  9. Scherbakov, A.Y.: The Modern Computer Security. The Theortical Background. The Practical Aspects, 352 p. Knizhnyi Mir, Moskva (2009). ISBN 978-5-8041-0378-2

    Google Scholar 

  10. Korobiichuk, I., Ladanyuk, A., Shumyhai, D., Boyko, R., Reshetiuk, V., Kamiński, M.: How to increase efficiency of automatic control of complex plants by development and implementation of coordination control system. In: Recent Advances in Systems, Control and Information Technology. Advances in Intelligent Systems and Computing, vol. 543, pp. 189–195 (2017). doi:10.1007/978-3-319-48923-0_23

  11. Korobiichuk, I., Fedushko, S., Juś, A., Syerov, Y.: Methods of determining information support of web community user personal data verification system. In: Automation, ICA 2017. Advances in Intelligent Systems and Computing (AISC), vol. 550, pp 144–150 (2017). doi:10.1007/978-3-319-54042-9_13

  12. McAfee Official Web Site. http://www.mcafee.com/us/products/network-security-platform.aspx

  13. Check Point software technologies LTD Official Web Site. https://www.checkpoint.com/products/next-generation-threat-prevention/

  14. IBM Official Web Site. http://www-03.ibm.com/software/products/ru/network-ips

  15. Haq, N.F.: Application of machine learning approaches in intrusion detection system: A survey. http://thesai.org/Downloads/IJARAI/Volume4No3/Paper_2-Application_of_Machine_Learning_Approaches_in_Intrusion_Detection_System.pdf

  16. Syarif, I.: Application of Bagging, Boosting and Stacking to Intrusion Detection. https://core.ac.uk/download/files/34/8748111.pdf

  17. Nguyen, H.A.: Application of data mining to network intrusion detection: classifier selection model. http://arxiv.org/ftp/arxiv/papers/1007/1007.1268.pdf

  18. Sinha, N.K.: A Review on Performance Comparison of Artificial Intelligence Techniques Used for Intrusion Detection. http://www.sbsstc.ac.in/icccs2014/Papers/Paper45.pdf

  19. Ghaleb, A.M.M.: Assembly Classifier Approach to Analyze Intrusion Detection Dataset in Networks by Using Data Mining Techniques. http://www.ijsr.net/archive/v4i4/SUB153071.pdf

  20. Shrivas, A.K.: An Ensemble Model for Classification of Attacks with Feature Selection based on KDD99 and NSL-KDD Data Set. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.677.7890&rep=rep1&type=pdf

  21. Amdal’s Law. https://ru.wikipedia.org/wiki/%D0%97%D0%B0%D0%BA%D0%BE%D0%BD_%D0%90%D0%BC%D0%B4%D0%B0%D0%BB%D0%B0

  22. Gryschuk, R.V., Buryachok, V.L., Mamraev, V.M.: The State Informational Resource Attack Classificator Design. Technological Audit and the Production Reserves. Harkiv: PI «Technolog. Center» . No. 1/2 (21). pp. 38–43 (2015). doi:10.15587/2312-8372.2015.37423

  23. Dubrovin, V.I., Subbotin, S.A., Boguslaev, A.V., Yatsenko, V.K.: The Intellectual Means of Aviation Engine Reliability Forecast Diagnostics, 279 p. Motor-Sich, Zaporozhya (2003)

    Google Scholar 

  24. Mamraev, V.M.: The State Information Resource Cyber-Attack Classificator Design Method: Ph.D. thesis: spec. 21.05.01 “state information security”, 160 p. Kyiv (2015)

    Google Scholar 

  25. Voronin, A.N., Ziatdinov, Y.K., Kuklinsky, M.V.: Multicriteria Solutions: Models and Methods, 348 p. NAU, Kyiv (2011)

    Google Scholar 

  26. Weka data mining software. http://www.cs.waikato.ac.nz/ml/weka/index.html

  27. UCI Knowledge Discovery in Databases Archive. http://kdd.ics.uci.edu

  28. Pilkevich, I.A., Molodetska, K.V., Sugoniak, I.I., Lobanchikova, H.M.: The Basics of Automation Control System Design. Zhytomyr. PH of ZhSU named after Franko, I., 226 p. (2014). http://ir.znau.edu.ua/handle/123456789/2487

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Igor Korobiichuk .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Korobiichuk, I., Hryshchuk, R., Mamarev, V., Okhrimchuk, V., Kachniarz, M. (2018). Cyberattack Classificator Verification. In: Kościelny, J., Syfert, M., Sztyber, A. (eds) Advanced Solutions in Diagnostics and Fault Tolerant Control. DPS 2017. Advances in Intelligent Systems and Computing, vol 635. Springer, Cham. https://doi.org/10.1007/978-3-319-64474-5_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-64474-5_34

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-64473-8

  • Online ISBN: 978-3-319-64474-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics