Application of Bioinformatics Algorithms for 3RO\PRUSKLF Cyberattacks Detection

The functionality of any system can be represented as a set of commands that lead to a change in the state of the system. The intrusion detection problem for signature-based intrusion detection systems is equivalent to matching the sequences of operational commands executed by the protected system to known attack signatures. Various mutations in attack vectors (including replacing commands with equivalent ones, rearranging the commands and their blocks, adding garbage and empty commands into the sequence) reduce the effectiveness and accuracy of the intrusion detection. The article analyzes the existing solutions in the field of bioinformatics and considers their applicability for solving the problem of identifying polymorphic attacks by signature-based intrusion detection systems. A new approach to the detection of polymorphic attacks based on the suffix tree technology applied in the assembly and verification of the similarity of genomic sequences is discussed. The use of bioinformatics technology allows us to achieve high accuracy of intrusion detection at the level of modern intrusion detection systems (more than 0.90), while surpassing them in terms of cost-effectiveness of storage resources, speed and readiness to changes in attack vectors. To improve the accuracy indicators, a number of modifications of the developed algorithm have been carried out, as a result of which the accuracy of detecting attacks increased by up to 0.95 with the level of mutations in the sequence up to 10%. The developed approach can be used for intrusion detection both in conventional computer networks and in modern reconfigurable network infrastructures with limited resources (Internet of Things, networks of cyber-physical objects, wireless sensor networks).

[1]  Webb Miller An Introduction to Bioinformatics Algorithms , 2006 .

[2]  V. V. Platonov,et al.  An adaptive model of a distributed intrusion detection system , 2017, Automatic Control and Computer Sciences.

[3]  Nasseh Tabrizi,et al.  A Survey of Intrusion Detection Techniques , 2019, 2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA).

[4]  Martin Kay,et al.  Substring Alignment Using Suffix Trees , 2004, CICLing.

[5]  Roland Wittler Alignment- and reference-free phylogenomics with colored de Bruijn graphs , 2020, Algorithms for Molecular Biology.

[6]  Zoltán Balogh,et al.  Analysis and experimental evaluation of the Needleman-Wunsch algorithm for trajectory comparison , 2021, Expert Syst. Appl..

[7]  Rb Ahmad,et al.  Performance Analysis Of Needleman-Wunsch Algorithm (Global) And Smith-Waterman Algorithm (Local) In Reducing Search Space And Time For Dna Sequence Alignment , 2018 .

[8]  Krishna Kant,et al.  Higher accuracy protein multiple sequence alignments by genetic algorithm , 2017, ICCS.

[9]  Shadi Aljawarneh,et al.  Investigations of automatic methods for detecting the polymorphic worms signatures , 2016, Future Gener. Comput. Syst..

[10]  Wan Fokkink,et al.  Tailor-made multiple sequence alignments using the PRALINE 2 alignment toolkit , 2019, Bioinform..

[11]  Alexandre d'Aspremont,et al.  A spectral algorithm for fast de novo layout of uncorrected long nanopore reads , 2016, Bioinform..

[12]  Ke Chen,et al.  Pairwise alignment for very long nucleic acid sequences. , 2018, Biochemical and biophysical research communications.

[13]  Iqbal Gondal,et al.  Survey of intrusion detection systems: techniques, datasets and challenges , 2019, Cybersecurity.

[14]  Roger Luis Uy,et al.  Serial and parallel implementation of Needleman-Wunsch algorithm , 2020 .

[15]  Biswanath Chowdhury,et al.  A review on multiple sequence alignment from the perspective of genetic algorithm. , 2017, Genomics.

[16]  Adam M. Phillippy,et al.  MUMmer4: A fast and versatile genome alignment system , 2018, PLoS Comput. Biol..

[17]  Eric Lee,et al.  Beginners Guide To Bioinformatics For High Throughput Sequencing , 2018 .

[18]  V. V. Platonov,et al.  Detection of Abnormal Traffic in Dynamic Computer Networks with Mobile Consumer Devices , 2018, Autom. Control. Comput. Sci..