SAIRF: A similarity approach for attack intention recognition using fuzzy min-max neural network

Abstract Sensitive information can be exposed to critical risks when communicated through computer networks. The ability of cybercriminals to hide their intention to attack obstructs existing protection systems causing the system to be unable to prevent any possible sabotage in network systems. In this paper, we propose a S imilarity approach for A ttack I ntention R ecognition using F uzzy Min-Max Neural Network ( SAIRF ). In particular, the proposed SAIRF approach aims to recognize attack intention in real time. This approach classifies attacks according to their characteristics and uses similar metric method to identify motives of attacks and predict their intentions. In this study, network attack intentions are categorized into specific and general intentions. General intentions are recognized by investigating violations against the security metrics of confidentiality, integrity, availability, and authenticity. Specific intentions are recognized by investigating the network attacks used to achieve a violation. The obtained results demonstrate the capability of the proposed approach to investigate similarity of network attack evidence and recognize the intentions of the attack being investigated.

[1]  Jun Wang,et al.  A primal-dual neural network for online resolving constrained kinematic redundancy in robot motion control , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[2]  Abdulghani Ali Investigation Approach for Network Attack Intention Recognition , 2017, Int. J. Digit. Crime Forensics.

[3]  Abdulghani Ali Ahmed Investigation Approach for Network Attack Intention Recognition , 2020, Digital Forensics and Forensic Investigations.

[4]  Zhiyong Zhang,et al.  A novel crowd evaluation method for security and trustworthiness of online social networks platforms based on signaling theory , 2017, J. Comput. Sci..

[5]  Patrick K. Simpson,et al.  Fuzzy min-max neural networks. I. Classification , 1992, IEEE Trans. Neural Networks.

[6]  B. Efron Bootstrap Methods: Another Look at the Jackknife , 1979 .

[7]  Chee Peng Lim,et al.  An Enhanced Fuzzy Min–Max Neural Network for Pattern Classification , 2015, IEEE Transactions on Neural Networks and Learning Systems.

[8]  Aman Jantan,et al.  AIA: Attack Intention Analysis Algorithm Based on D-S Theory with Causal Technique for Network Forensics - A Case Study , 2011 .

[9]  Arpan Kumar Kar,et al.  A hybrid group decision support system for supplier selection using analytic hierarchy process, fuzzy set theory and neural network , 2015, J. Comput. Sci..

[10]  Qingtao Wu,et al.  Intrusion Intention Identification Methods Based on Dynamic Bayesian Networks , 2011 .

[11]  Junhua Chen,et al.  Recognizing Intrusive Intention and Assessing Threat Based on Attack Path Analysis , 2009, 2009 International Conference on Multimedia Information Networking and Security.

[12]  Ali Safa Sadiq,et al.  Traceback model for identifying sources of distributed attacks in real time , 2016, Secur. Commun. Networks.

[13]  Aman Jantan,et al.  A New Algorithm to Estimate the Similarity between the Intentions of the Cyber Crimes for Network Forensics , 2013 .

[14]  Abdulghani Ali Ahmed,et al.  Analyzing Data Remnant Remains on User Devices to Determine Probative Artifacts in Cloud Environment , 2018, Journal of forensic sciences.

[15]  Mazin Abed Mohammed,et al.  Artificial neural networks for automatic segmentation and identification of nasopharyngeal carcinoma , 2017, J. Comput. Sci..

[16]  S. S. Vinod Chandra,et al.  Graft survival prediction in liver transplantation using artificial neural network models , 2016, J. Comput. Sci..

[17]  Aman Jantan,et al.  Filtration model for the detection of malicious traffic in large-scale networks , 2016, Comput. Commun..

[18]  Dr.Irshad Ahmed Sumra,et al.  Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET: A Survey , 2015 .

[19]  Wenke Lee,et al.  Attack plan recognition and prediction using causal networks , 2004, 20th Annual Computer Security Applications Conference.

[20]  Nor Ashidi Mat Isa,et al.  Feature-Based Ordering Algorithm for Data Presentation of Fuzzy ARTMAP Ensembles , 2014, IEEE Transactions on Neural Networks and Learning Systems.

[21]  Igor Kotenko,et al.  Hybridization of computational intelligence methods for attack detection in computer networks , 2017, J. Comput. Sci..

[22]  Junhua Chen,et al.  Research on Attack Intention Recognition Based on Graphical Model , 2009, 2009 Fifth International Conference on Information Assurance and Security.

[23]  Abdulghani Ali,et al.  Attack Intention Recognition: A Review , 2017, Int. J. Netw. Secur..

[24]  Chee Peng Lim,et al.  Applying a multi-agent classifier system with a novel trust measurement method to classifying medical data , 2014 .

[25]  Debasish Biswas,et al.  Soil Classification From Large Imagery Databases Using a Neuro-Fuzzy Classifier , 2016, Canadian Journal of Electrical and Computer Engineering.