An Investigation of Information Granulation Techniques in Cybersecurity

Information Granulation in the context of Granular Computing provides a viable alternative for finding solutions to complex problems using granules. Issues such as intrusions, malware exigencies, spam and user unauthorized access still remain challenging in cybersecurity. Moreover, as the prevalence of undetected attacks due to system design flaws and system development flaws become rampant in the cybersecurity systems. Although, numerous techniques that have been applied have shown very good prospects, there are several difficulties in managing cyber-attacks from the angle of biometric recognition systems which are commonly used in cybersecurity. These challenges has positioned cybersecurity issues to be regarded as complex and uncertain which requires techniques such as information granulation to unravel a sustainable solution. This paper investigates how information granulation techniques are used in cybersecurity detection models with the aim of providing a holistic view of the current status of research in this area. In this paper, we proposed a framework that applied the principle of justifiable granularity (PJG) in the feature extraction module of a finger-vein recognition system using granular support vector machines as classifier to justify the effectiveness of information granulation in strengthening a verification system in a cybersecurity setting. We benchmark our result with state-of-the-art biometric verification systems, and our approach shows promising contribution in that direction.

[1]  Yiyu Yao A triarchic theory of granular computing , 2016 .

[2]  David Hutchison,et al.  A survey of cyber security management in industrial control systems , 2015, Int. J. Crit. Infrastructure Prot..

[3]  Ali Selamat,et al.  Contactless Identification System Based on Visual Analysis of Examined Element , 2018, ACIIDS.

[4]  Arun Ross,et al.  50 years of biometric research: Accomplishments, challenges, and opportunities , 2016, Pattern Recognit. Lett..

[5]  Shahrel Azmin Suandi,et al.  Fusion of Band Limited Phase Only Correlation and Width Centroid Contour Distance for finger based biometrics , 2014, Expert Syst. Appl..

[6]  Ondrej Krejcar,et al.  A Comparative Study on Chrominance Based Methods in Dorsal Hand Recognition: Single Image Case , 2018, IEA/AIE.

[7]  Witold Pedrycz,et al.  Granular Data Description: Designing Ellipsoidal Information Granules , 2017, IEEE Transactions on Cybernetics.

[8]  Angelo Gaeta,et al.  Resilience Analysis of Critical Infrastructures: A Cognitive Approach Based on Granular Computing , 2019, IEEE Transactions on Cybernetics.

[9]  Lotfi A. Zadeh,et al.  Toward a theory of fuzzy information granulation and its centrality in human reasoning and fuzzy logic , 1997, Fuzzy Sets Syst..

[10]  Ondrej Krejcar,et al.  Online signature verification by spectrogram analysis , 2017, Applied Intelligence.

[11]  Witold Pedrycz,et al.  Building the fundamentals of granular computing: A principle of justifiable granularity , 2013, Appl. Soft Comput..

[12]  Jinfeng Yang,et al.  Hierarchical Structure Construction Based on Hyper-sphere Granulation for Finger-Vein Recognition , 2017, CCCV.

[13]  M. Jayasree,et al.  Recognizing faces from surgically altered face images using granular approach , 2017, 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).

[14]  Fushuan Wen,et al.  Quantitative vulnerability assessment of cyber security for distribution automation systems , 2015 .

[15]  Witold Pedrycz,et al.  A Design of Granular Takagi–Sugeno Fuzzy Model Through the Synergy of Fuzzy Subspace Clustering and Optimal Allocation of Information Granularity , 2018, IEEE Transactions on Fuzzy Systems.

[16]  Jianhua Zhang,et al.  Predicting electrical power output by using Granular Computing based Neuro-Fuzzy modeling method , 2015, The 27th Chinese Control and Decision Conference (2015 CCDC).

[17]  Piotr Synak,et al.  Scalable cyber-security analytics with a new summary-based approximate query engine , 2017, 2017 IEEE International Conference on Big Data (Big Data).

[18]  Ondrej Krejcar,et al.  Fuzzy Granular Classifier Approach for Spam Detection , 2015, ICCCI.

[19]  Geir M. Køien,et al.  Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks , 2015, J. Cyber Secur. Mobil..

[20]  Yihua Shi,et al.  Accurate ROI localization and hierarchical hyper-sphere model for finger-vein recognition , 2019, Neurocomputing.

[21]  Ömer Aslan,et al.  Mitigating Cyber Security Attacks by Being Aware of Vulnerabilities and Bugs , 2017, 2017 International Conference on Cyberworlds (CW).

[22]  Witold Pedrycz,et al.  An overview on the roles of fuzzy set techniques in big data processing: Trends, challenges and opportunities , 2017, Knowl. Based Syst..

[23]  Witold Pedrycz,et al.  Granulating linguistic information in decision making under consensus and consistency , 2018, Expert Syst. Appl..

[24]  Yanan Li,et al.  A Multimodal Finger-Based Recognition Method Based on Granular Computing , 2014, CCBR.

[25]  Mohammed Elmogy,et al.  Rough – Granular Computing knowledge discovery models for medical classification , 2016 .

[26]  Witold Pedrycz,et al.  Development of information granules of higher type and their applications to granular models of time series , 2018, Eng. Appl. Artif. Intell..

[27]  Lei Wang,et al.  X-ray astronomical point sources recognition using granular binary-tree SVM , 2016, 2016 IEEE 13th International Conference on Signal Processing (ICSP).

[28]  Koen Vanhoof,et al.  A Granular Intrusion Detection System Using Rough Cognitive Networks , 2016, Recent Advances in Computational Intelligence in Defense and Security.

[29]  James C. Bezdek,et al.  Pattern Recognition with Fuzzy Objective Function Algorithms , 1981, Advanced Applications in Pattern Recognition.

[30]  Sandeep K. Sood,et al.  An intelligent and secure system for predicting and preventing Zika virus outbreak using Fog computing , 2017, Enterp. Inf. Syst..

[31]  Ondrej Krejcar,et al.  Biometrie hand vein estimation using bloodstream filtration and fuzzy e-means , 2017, 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).

[32]  Maysam F. Abbod,et al.  Granular computing approach for the design of medical data classification systems , 2015, 2015 IEEE Conference on Computational Intelligence in Bioinformatics and Computational Biology (CIBCB).

[33]  Matti Pietikäinen,et al.  Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[34]  Jinfeng Yang,et al.  A new pixel-based granular fusion method for finger recognition , 2016, International Conference on Digital Image Processing.

[35]  Witold Pedrycz,et al.  Granular Data Aggregation: An Adaptive Principle of the Justifiable Granularity Approach , 2019, IEEE Transactions on Cybernetics.