ALGORITHMS FOR THE DEVELOPMENT OF A KNOWLEDGE BASE TO ENHANCE DECISION SUPPORT SYSTEMS IN ADDRESSING CYBERSECURITY CHALLENGES

Authors

  • Kasatkin Dmytro National University of Life and Environmental Sciences of Ukraine image/svg+xml
  • Voloshyn Semen National University of Life and Environmental Sciences of Ukraine image/svg+xml
  • Gusev Borys National University of Life and Environmental Sciences of Ukraine image/svg+xml
  • Matiievskyi Volodymyr National University of Life and Environmental Sciences of Ukraine image/svg+xml

Keywords:

critical computer systems, cybersecurity, decision support system, security assessment

Abstract

This article presents the development of a modular decision support system (DSS) for cybersecurity, aimed at enhancing the protection of critical computer systems (CCS). The system is based on a fuzzy logic inference subsystem (FIS) model that utilizes data from sensors and SIEM systems to detect signs of threats, anomalies, and attacks through fuzzification of input values. A developed algorithm for forming a knowledge base of typical and emergency situations allows the system not only to effectively respond to known threats but also to analyze unforeseen situations. The application of the FIS module enables the creation of a multi-parameter image of CCS vulnerability, which ensures a more comprehensive and accurate assessment of their security.

References

1. Lakhno, V., Boiko, Y., Mishchenko, A., Kozlovskii, V., & Pupchenko, O. (2017). Development of the intelligent decision-making support system to manage cyber protection at the object of informatization. Eastern-European Journal of Enterprise Technologies, 2(9), 53–61.

2. Iasiello, E. (2013, June). Cyber attack: A dull tool to shape foreign policy. In Cyber Conflict (CyCon), 2013 5th International Conference on (pp. 1–18). IEEE.

3. Goztepe, K. (2012). Designing fuzzy rule based expert system for cyber security. International Journal of Information Security Science, 1(1), 13–19.

4. Akhmetov, B., Lakhno, V., Boiko, Y., & Mishchenko, A. (2017). Designing a decision support system for the weakly formalized problems in the provision of cybersecurity. Eastern-European Journal of Enterprise Technologies, 1(2), 4–15.

5. Hu, X., Xu, M., Xu, S., & Zhao, P. (2017). Multiple cyber attacks against a target with observation errors and dependent outcomes: Characterization and optimization. Reliability Engineering & System Safety, 159, 119–133.

6. Yang, Y., Xu, H. Q., Gao, L., Yuan, Y. B., McLaughlin, K., & Sezer, S. (2017). Multidimensional intrusion detection system for IEC 61850-based SCADA networks. IEEE Transactions on Power Delivery, 32(2), 1068–1078.

7. Wong, K., Dillabaugh, C., Seddigh, N., & Nandy, B. (2017). Enhancing Suricata intrusion detection system for cyber security in SCADA networks. In Electrical and Computer Engineering (CCECE), 2017 IEEE 30th Canadian Conference on (pp. 1–5). IEEE.

8. Elhag, S., Fernández, A., Bawakid, A., Alshomrani, S., & Herrera, F. (2015). On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on intrusion detection systems. Expert Systems with Applications, 42(1), 193–202.

9. Moustafa, N., & Slay, J. (2016). The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. Information Security Journal: A Global Perspective, 25(1–3), 18–31.

10. Villaluna, J. A., & Cruz, F. R. G. (2017). Information security technology for computer networks through classification of cyber-attacks using soft computing algorithms. In Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment and Management (HNICEM), 2017 IEEE 9th International Conference on (pp. 1–6). IEEE.

11. Lakhno, V., Kazmirchuk, S., Kovalenko, Y., Myrutenko, L., & Zhmurko, T. (2016). Design of adaptive system of detection of cyber-attacks, based on the model of logical procedures and the coverage matrices of features. Eastern-European Journal of Enterprise Technologies, 3(9), 30–38. https://doi.org/10.15587/1729-4061.2016.71769

12. Lakhno, V., Tkach, Y., Petrenko, T., Zaitsev, S., & Bazylevych, V. (2016). Development of adaptive expert system of information security using a procedure of clustering the attributes of anomalies and cyber attacks. Eastern-European Journal of Enterprise Technologies, 6(9), 32–44. https://doi.org/10.15587/1729-4061.2016.85600

13. Zhang, Y., Wang, L., Xiang, Y., & Ten, C. W. (2016). Inclusion of SCADA cyber vulnerability in power system reliability assessment considering optimal resources allocation. IEEE Transactions on Power Systems, 31(6), 4379–4394.

Published

2024-11-08

Issue

Section

All articles from the issue