High performance adaptive system for cyber attacks detection

To increase the security of intrusion detection system, generalized structure of highly performance adaptive system for cyber attacks detection was developed. To improve its robustness, methods of artificial intelligence were proposed. Neural immune detectors were used as the main tool for identifying cyber attacks. These detectors for cyber attacks identification and classification and other vulnerable subsystems were implemented in programmable logic arrays. To provide high performance, the Mamdani fuzzy inference rules were used and relevant subsystem structures were developed.

[1]  José Manuel Moya,et al.  Distributed intrusion detection system for wireless sensor networks based on a reputation system coupled with kernel self-organizing maps , 2010, Integr. Comput. Aided Eng..

[2]  Vladimir Golovko,et al.  FUSION OF RECIRCULATION NEURAL NETWORKS FOR REAL-TIME NETWORK INTRUSION DETECTION AND RECOGNITION , 2014 .

[3]  Vladimir A. Golovko,et al.  Intelligent system for detection of networking intrusion , 2011, Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems.

[4]  Igor V. Kotenko,et al.  Network Attack Detection Based on Combination of Neural, Immune and Neuro-Fuzzy Classifiers , 2015, 2015 IEEE 18th International Conference on Computational Science and Engineering.

[5]  Igor V. Kotenko,et al.  Common Framework for Attack Modeling and Security Evaluation in SIEM Systems , 2012, 2012 IEEE International Conference on Green Computing and Communications.

[6]  Ravi Ranjan,et al.  A New Clustering Approach for Anomaly Intrusion Detection , 2014, ArXiv.

[7]  Vladimir A. Golovko,et al.  Intelligent Cyber Defense System , 2016, ICTERI.

[8]  Samidha Dwivedi Sharma,et al.  Improved Algorithm for Intrusion Detection Using Genetic Algorithm and SNORT , 2014 .

[9]  Yit Yin Wee,et al.  Causal Discovery and Reasoning for Intrusion Detectionusing Bayesian Network , 2011 .

[10]  Stephanie Forrest,et al.  Immunity by design: an artificial immune system , 1999 .

[11]  Emma Ireland,et al.  Intrusion Detection with Genetic Algorithms and Fuzzy Logic , 2013 .

[12]  Dewan Md. Farid,et al.  Anomaly Network Intrusion Detection Based on Improved Self Adaptive Bayesian Algorithm , 2010, J. Comput..

[13]  Julie A. Dickerson,et al.  Fuzzy intrusion detection , 2001, Proceedings Joint 9th IFSA World Congress and 20th NAFIPS International Conference (Cat. No. 01TH8569).

[14]  Shruti B. Yagnik,et al.  A survey on RBF Neural Network for Intrusion Detection System , 2014 .

[15]  Vladimir A. Golovko,et al.  Development of neural network immune detectors for computer attacks recognition and classification , 2013, 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS).

[16]  L. Ibrahim ANOMALY NETWORK INTRUSION DETECTION SYSTEM BASED ON DISTRIBUTED TIME-DELAY NEURAL NETWORK (DTDNN) , 2010 .

[17]  Alan S. Perelson,et al.  Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[18]  Volodymyr Kochan,et al.  Improving of the security of intrusion detection system , 2016, 2016 International Conference on Development and Application Systems (DAS).

[19]  Volodymyr Kochan,et al.  Increasing the resistance of computer systems towards virus attacks , 2016, 2016 IEEE 36th International Conference on Electronics and Nanotechnology (ELNANO).

[20]  Stephanie Forrest,et al.  Infect Recognize Destroy , 1996 .

[21]  Sergey D. Shtovba,et al.  Ensuring Accuracy and Transparency of Mamdani Fuzzy Model in Learning by Experimental Data , 2007 .

[22]  S. N. Pawar GENETIC ALGORITHM APPROACH: A SURVEY , 2013 .

[23]  Ramzi Taha,et al.  Compressive Strength and Surface Absorption of High Strength Silica Fume Concrete Under Different Curing Conditions , 2007 .

[24]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[25]  Igor Kotenko,et al.  MULTI-AGENT SIMULATION OF ATTACKS AND DEFENSE MECHANISMS IN COMPUTER NETWORKS , 2008 .

[26]  S. Srinoy,et al.  Anomaly-Based Intrusion Detection using Fuzzy Rough Clustering , 2006, 2006 International Conference on Hybrid Information Technology.

[27]  Fernando Niño,et al.  Recent Advances in Artificial Immune Systems: Models and Applications , 2011, Appl. Soft Comput..

[28]  Anatoly Sachenko,et al.  THE METHODS OF ARTIFICIAL INTELLIGENCE FOR MALICIOUS APPLICATIONS DETECTION IN ANDROID OS , 2016 .