Adaptive Expert Systems Development for Cyber Attacks Recognition in Information Educational Systems on the Basis of Signs’ Clustering

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 754)

Abstract

The article proposes a new approach to solving the issue of efficiency in systems of cyberattacks intelligent recognition, anomalies and threats for the educational and informational environment of universities and colleges. The solution is based on models and methodology of creating an adaptive expert system capable of self-learning. Unlike the existing ones, the model proposed in the article, takes into account the known statistical and remote parameters of cyberattacks signs’ clustering, as well as third-type errors during the machine learning process. It is proposed to evaluate the quality of signs’ space partitioning recognition of objects in an adaptive expert system with the use of a modified information performance condition as an evaluation indicator. It is proved that model and application of the method of clustering of signs based on the entropy and information-distance Kullback–Leibler criterion, allows getting the input fuzzy classified educational matrix which is used as an object of study.

Keywords

Adaptive expert system Recognition Cyberattack Anomaly Clustering of signs 

References

  1. 1.
    Rezgui, Y., Marks, A.: Information security awareness in higher education: an exploratory study. Comput. Secur. 27(7), 241–253 (2008)Google Scholar
  2. 2.
    Sultan, N.: Cloud computing for education: a new dawn? Int. J. Inf. Manag. 30, 109–116 (2010). http://dx.doi.org/10.1016/j.ijinfomgt.2009.09.004
  3. 3.
    Robles, A.C.M.O.: Evaluating the use of Toondoo for Collaborative E-Learning of Selected pre-service teachers. Int. J. Mod. Educ. Comput. Sci. (IJMECS) 9(11), 25–32 (2017).  https://doi.org/10.5815/ijmecs.2017.11.03
  4. 4.
    Schneider, F.B.: Cybersecurity education in universities. IEEE Secur. Priv. 11(4), 3–4 (2013)Google Scholar
  5. 5.
    Conklin, A.: Cyber defense competitions and information security education: an active learning solution for a capstone course. In: 2006 Proceedings of the 39th Annual Hawaii International Conference on System Sciences, HICSS 2006, vol. 9. IEEE (2006)Google Scholar
  6. 6.
    Schuett, M., Rahman, M.: Information Security Synthesis in Online Universities. arXiv preprint arXiv:1111.1771 (2011)
  7. 7.
    Azka, S.R., Geetha, A.: A survey of applications and security issues in software defined networking. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 9(3), 21–28 (2017).  https://doi.org/10.5815/ijcnis.2017.03.03
  8. 8.
    Jalali, M., Siegel, M., Madnick, S.: Decision Making and Biases in Cybersecurity Capability Development: Evidence from a Simulation Game Experiment [Electronic resource] (2017). https://arxiv.org/ftp/arxiv/papers/1707/1707.01031.pdf
  9. 9.
    Gordon, L.A., Loeb, M.P., Zhou, L.: Investing in cybersecurity: insights from the Gordon-Loeb model. J. Inf. Secur. 7(02), 49 (2016).  https://doi.org/10.4236/jis.2016.72004
  10. 10.
    Goztepe, K.: Designing fuzzy rule based expert system for cyber security. Int. J. Inf. Secur. Sci. 1(1), 13–19 (2012)Google Scholar
  11. 11.
    Akhmetov, B., Lakhno, V., Boiko, Y., Mishchenko, A.: Designing a decision support system for the weakly formalized problems in the provision of cybersecurity. East.-Eur. J. Enterp. Technol. 1(2(85)), 4–15 (2017)Google Scholar
  12. 12.
    Lakhno, V., Boiko, Y., Mishchenko, A., Kozlovskii, V., Pupchenko, O.: Development of the intelligent decision-making support system to manage cyber protection at the object of informatization. East.-Eur. J. Enterp. Technol. 2/9(86), 53–61 (2017)Google Scholar
  13. 13.
    Keerthi Vasan, K., Arun Raj Kumar, P.: Taxonomy of SSL/TLS attacks. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 8(2), 15–24 (2016).  https://doi.org/10.5815/ijcnis.2016.02.02
  14. 14.
    Lakhno, V., Tkach, Y., Petrenko, T., Zaitsev, S., Bazylevych, V.: Development of adaptive expert system of information security using a procedure of clustering the attributes of anomalies and cyber attacks. East.-Eur. J. Enterp. Technol. 6/9(84), 32–44 (2016).  https://doi.org/10.15587/1729-4061.2016.85600
  15. 15.
    Melese, S.Z., Avadhani, P.S.: Honeypot system for attacks on SSH protocol. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 8(9), 19–26 (2016).  https://doi.org/10.5815/ijcnis.2016.09.03

Copyright information

© Springer International Publishing AG, part of Springer Nature 2019

Authors and Affiliations

  1. 1.European UniversityKyivUkraine
  2. 2.Chernihiv National University of TechnologyChernihivUkraine

Personalised recommendations