Intelligent Algorithms for Event Processing and Decision Making on Information Protection Strategies against Cyberattacks
Abstract
:1. Introduction
- Increased user awareness and engagement: by providing personalized security recommendations, users may become more aware of potential security threats and take action to protect themselves.
- Improved decision making: Recommender systems can analyze large amounts of data and identify patterns that may be difficult for humans to detect. This can lead to better decision making and improved security outcomes.
- Enhanced user experience: personalized recommendations can improve the user experience by making security advice more relevant and actionable for individual users.
- Privacy concerns: Recommender systems rely on user data to generate recommendations. As such, there may be concerns about the privacy and security of user data.
- Biases in recommendations: the recommendations generated by a recommender system may be biased if the system is trained on biased data or if it relies on outdated or incomplete information.
- Lack of human expertise: while recommender systems can analyze large amounts of data, they may lack the human expertise needed to identify complex security threats or to provide nuanced security advice.
2. Related Works
3. Materials and Methods
3.1. Approaches
- Content methods which analyze the types of attacks;
- Collaborative methods which use collaborative filtering.
- Each type of attack/anomaly is represented as a vector of a certain dimensionality.
- When an attack is detected at the input of a model that is not in the knowledge base, the attack vector is calculated according to step 1.
- Using the cosine proximity method [6], the cyberattack from the knowledge base that is closest to the newly detected one is selected.
- A protection strategy is implemented according to the information obtained in step 3.
- The simplest algorithm calculates the cosine or correlation similarity of rows (users) or columns (elements) and recommends elements that have been selected as KNN [4].
- Unknown vulnerabilities: Zero-day exploits target previously unknown vulnerabilities in software, operating systems, or applications. These vulnerabilities are not yet known to the software vendors or the security community, making it difficult to defend against them.
- No patches or fixes: Since the vulnerabilities are unknown, there are no patches or fixes available to address them. This means that organizations and individuals must find alternative solutions to mitigate the risk posed by these exploits.
- Limited visibility: Zero-day exploits can be difficult to detect and analyze, as they often use novel techniques and codes that have not been seen before. This limited visibility makes it challenging to determine the extent of the attack and the damage that has been done.
- High risk: zero-day exploits can be highly risky, as they can be used to gain unauthorized access to systems and data, to steal sensitive information, or to disrupt critical infrastructure.
- Difficult to mitigate: Zero-day exploits can be difficult to mitigate, as they often rely on novel techniques and codes that are not yet understood. This can make it challenging to develop effective defenses against them.
- Targeted attacks: Zero-day exploits are often used in targeted attacks, where the attacker specifically targets a particular organization or individual. These attacks can be highly sophisticated and difficult to detect.
- Each parameter is updated independently;
- The loss error function is calculated with respect to each parameter using the following equation [17]:
- I as the set of objects;
- D as the base of transactions;
- Smin as the minimum level of decision support;
- Amin as the minimum confidence threshold.
- Collaborative filtering of information security events;
- Matrix decomposition of the matrix “cyberattack–strategy”.
3.2. Proposed Recommender System
- Review the basic algorithms for building recommender systems, which are widely used at this moment in all areas of the information industry.
- Analyze and collect a set of data for the research. A prerequisite is that the dataset must relate specifically to the specifics of anomaly detection or attack classification in order to realize a decision support system based on it in the field of information security.
- Determine the hypothesis and possible variants of the research. Identify the algorithms that can be used to solve the problem. A hypothesis about the possibility of transferring knowledge about the attacks from the vector space of the features into semantic form using semantic similarity (cosine similarity and Pearson correlations or normalized cosine similarity [30]) was formulated.
- Formulate metrics for evaluating the quality of the developed algorithm.
- Evaluate the approaches under consideration with respect to maximizing the quality metric.
- Describe the advantages and disadvantages of the chosen approach.
4. Experiment
4.1. Exploratory Data Analyses
- Pcap files were generated using the tcpdump tool;
- The signs of network traffic were extracted with the Argus and Bgo IDS tools;
- Synthetic traces were generated, and records were stored in a database.
- Fuzzer;
- Analysis;
- Backdoors;
- DoS;
- Worm;
- Shellcode;
- Reconnaissance;
- Generic;
- Exploit.
4.2. Semantic Proximity Methods
- 1.
- When cosine similarity is used, the closeness of two attacks is calculated as the cosine of the angle between the vectors corresponding to their rows in the score matrix [32]. Thus, the cosine similarity of users u and v is defined by the following:
- 2.
- The Pearson correlation coefficient reflects the degree of linear dependence between two centered vectors. The closeness is determined by the extent to which the system parameters for the two time sections are similar to each other [33]. For the user vectors u and v, the correlation coefficient Formula (2) takes the following form:
- 3.
- The normalized cosine similarity [34] computes the user similarity like the cosine convergence but does so using the vectors of the deviation in the user ratings from the average object ratings [35]. Thus, the more similar the user ratings for some object, the less deviation there is from the “generally accepted” ratings of the object, and the more similarity the function shows between users [36].
- Setting a threshold: the user whose proximity measure exceeds a certain value is considered a neighbor.
- Finding the KNN: the set consists of k users with the greatest similarity, where k is a preselected constant.
4.3. The Reliability of the Proposed System
5. Discussion
- The insufficient accuracy of recommendations: A lack of data on users or items can lead to problems with the accuracy of recommendations. If the system does not have enough information on user preferences or item descriptions, it may give incorrect recommendations or miss relevant suggestions. For example, if the user does not have a large volume of interactions with the system or if the subjects have limited data, then the recommendations may not be too accurate.
- The problem of the “filtering bubble”: Recommendation systems can create “filtering bubbles” when recommendations are limited to the preferences and interests of the user. This means that users may be limited in their experience since the system offers them only those items or content that match their previous preferences. As a result, users may miss out on new and diverse offers that might interest them.
- The cold start problem: When a recommendation system encounters new users or new items, it may experience the cold start problem. This happens when the system does not have enough information to create relevant recommendations. This makes it difficult to create accurate recommendations in such situations.
- The problem of a lack of diversity: recommendation systems sometimes tend to offer items or content that are too similar based on the user’s previous preferences.
- The interpretation of the results: recommendation systems often do not provide explicit explanations or justifications for their recommendations, which can cause distrust and dissatisfaction among users.
- (1)
- The configured logging system automatically generates an algorithm for the information security administrator’s actions when an anomaly/attack is detected in the network and, subsequently, when a similar event is detected; it indicates in advance that event N is similar to a given percentage of an earlier event K, where the given actions were taken.
- (2)
- The security administrator, while investigating the incident, automatically records the conclusions on anomaly prevention, and, when a new, very similar event occurs, this algorithm is immediately shown to the administrator.
- The first is either setting up a good logging system or manually marking, by the information security administrator, the implemented protection strategies, forming a so-called knowledge base so that the system can be guided by this knowledge base when recommending future protection strategies.
- The second is the need for a knowledge base, as the problem of a cold start is acute.
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Griffiths, C. The Latest 2023 Cyber Crime Statistics. Available online: https://aag-it.com/the-latest-cyber-crime-statistics/ (accessed on 11 June 2023).
- Frąckiewiczin, M. The Role of Artificial Intelligence in Cybersecurity Threat Detection, Artificial Intelligence, TS2 Spaceon. 18 June 2023. Available online: https://ts2.space/en/the-role-of-artificial-intelligence-in-cybersecurity-threat-detection/ (accessed on 11 June 2023).
- Bolshev, A.K. Algorithms of Traffic Transformation and Classification for Intrusion Detection in Computer Networks; Abstracts of V.I. Ulyanov (Lenin) LETI; Saint-Petersburg State Electrotechnical University (SPbGETU): St. Petersburg, Russia, 2011; pp. 134–151. [Google Scholar]
- Vitenburg, E.A. Formalized model of intellectual decision support system in the field of information protection. Proceedings of TulSU. Technical Sciences. 2017. No. 7.
- Abdullahi, M.; Baashar, Y.; Alhussian, H.; Alwadain, A.; Aziz, N.; Capretz, L.F.; Abdulkadir, S.J. Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review. Electronics 2022, 11, 198. [Google Scholar] [CrossRef]
- Grigaliūnas, Š.; Brūzgienė, R.; Venčkauskas, A. The Method for Identifying the Scope of Cyberattack Stages in Relation to Their Impact on Cyber-Sustainability Control over a System. Electronics 2023, 12, 591. [Google Scholar] [CrossRef]
- Smirnov, A.A.; Salyp, B.Y. Analysis of software models to determine the measure of semantic proximity of natural language sentences. Student 2022, 5, 3498–3508. [Google Scholar]
- Moustafa, N.; Creech, G.; Slay, J. Anomaly Detection System Using Beta Mixture Models and Outlier Detection. In Progress in Computing, Analytics and Networking; Advances in Intelligent Systems and Computing; Springer: Singapore, 2018; Volume 710. [Google Scholar] [CrossRef]
- Mazhar, T.; Irfan, H.M.; Khan, S.; Haq, I.; Ullah, I.; Iqbal, M.; Hamam, H. Analysis of Cyber Security Attacks and Its Solutions for the Smart grid Using Machine Learning and Blockchain Methods. Future Internet 2023, 15, 83. [Google Scholar] [CrossRef]
- Alzahrani, A.; Aldhyani, T.H.H. Design of Efficient Based Artificial Intelligence Approaches for Sustainable of Cyber Security in Smart Industrial Control System. Sustainability 2023, 15, 8076. [Google Scholar] [CrossRef]
- de Azambuja, A.J.G.; Plesker, C.; Schützer, K.; Anderl, R.; Schleich, B.; Almeida, V.R. Artificial Intelligence-Based Cyber Security in the Context of Industry 4.0—A Survey. Electronics 2023, 12, 1920. [Google Scholar] [CrossRef]
- Tariq, U.; Ahmed, I.; Bashir, A.K.; Shaukat, K. A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review. Sensors 2023, 23, 4117. [Google Scholar] [CrossRef] [PubMed]
- Alqudhaibi, A.; Albarrak, M.; Aloseel, A.; Jagtap, S.; Salonitis, K. Predicting Cybersecurity Threats in Critical Infrastructure for Industry 4.0: A Proactive Approach Based on Attacker Motivations. Sensors 2023, 23, 4539. [Google Scholar] [CrossRef]
- Djenna, A.; Harous, S.; Saidouni, D.E. Internet of Things Meet Internet of Threats: New Concern Cyber Security Issues of Critical Cyber Infrastructure. Appl. Sci. 2021, 11, 4580. [Google Scholar] [CrossRef]
- Ni, W.; Du, Y.; Ma, X.; Lv, H. Research on Hybrid Recommendation Model for Personalized Recommendation Scenarios. Appl. Sci. 2023, 13, 7903. [Google Scholar] [CrossRef]
- Chertov, O.; Brun, A.; Boyer, A.; Aleksandrova, M. Comparative analysis of neighborhood-based approach and matrix factorization in Recommender systems. East.-Eur. J. Enterp. Technol. 2015, 3, 4–9. [Google Scholar]
- Zhang, Z.; Afanasiev, G.I. Basic technologies and prospects for the evolution of personalized recommender systems. E-SCIO 2022, 4, 309–320. [Google Scholar]
- Razuvaev, K.A.; Grinberg, H.E.; Maslova, A.S.; Veinskii, V.A.; Milutin, A.B. Analysis of modern approaches in the design of recommendation systems. Int. J. Appl. Sci. Technol. Integral 2021, 2, 253–261. [Google Scholar]
- Pavlov, P.S. Methods for assessing the quality of recommendation systems. Int. J. Humanit. Nat. Sci. 2018, 6, 178–182. [Google Scholar]
- Smolenchuk, T.V. Collaborative filtering method for recommendation services. Bull. Sci. Educ. 2019, 18–21. [Google Scholar]
- Smirnov, V.M.; Matveev, S.P. Methods of protection against malicious software. StudNet 2022, 5, 1595–1599. [Google Scholar]
- Fisun, V.V. Artificial Intelligence of Information Security Management of Critical Information Infrastructure Objects: A Monograph; Rusayns: Moscow, Russia, 2022; pp. 17–21. [Google Scholar]
- Fisun, V.V. Methodology of security assessment in the intellectual system of information security management of critical information infrastructure objects. NAU 2018, 2–10. [Google Scholar]
- Kalandarov, I. Assessment of Information Security Risks in Ensuring the Confidentiality of Information Resources. Probl. Comput. Sci. Energy 2017, 6, 42–48. [Google Scholar]
- Kurinnikh, D.Y.; Aidinyan, A.R.; Tsvetkova, O.L. Approach to the clustering of threats to information security of enterprises. IVD 2018, 91. [Google Scholar]
- Aydinyan, A.R.; Tsvetkova, O.L.; Kikot, I.R.; Kazantsev, A.V.; Kaplun, V.V. On the approach to assessing the information security of an enterprise. In Proceedings of the System Analysis, Management and Information Processing: Collected Works of the V International Scientific Seminar, Divnomorskoye Settlement, Tuapse, Russia, 2–6 October 2014; pp. 109–111. [Google Scholar]
- Tsvetkova, O.L.; Zaslonov, S.A. Simulation modeling of the dependence of information security of the organization on the field of activity. DSTU Bull. 2017, 116–121. [Google Scholar]
- Tsvetkova, O.L.; Aydinyan, A.R. Intellectual system of information security assessment of the enterprise from internal threats. Bull. Comput. Inf. Technol. 2014, 48–53. [Google Scholar]
- Kozunova, S.S.; Kravets, A.G. Formalized Description of Information System Risk Management Procedure. Vestn. Astrakhan State Tech. Univ. (Ser. Manag. Comput. Sci. Inform.) 2018, 2, 61–70. [Google Scholar]
- Tyurin, A.G.; Zuev, I.O. Cluster analysis, methods and algorithms of clustering. Russ. Technol. J. 2014, 2, 86–97. [Google Scholar]
- Mahruse, N. Modern trends in data mining methods: The method of clustering. Mosc. Econ. J. 2019, 359–377. [Google Scholar]
- Kadar, C.; Maculan, R.; Feuerriegel, S. Publicdecision support for low population density areas: Animbalance-aware hyper-ensemble for spatio-temporal crime prediction. Decis. Support Syst. 2019, 107–117. [Google Scholar] [CrossRef]
- Rzayev, R.R. Information system to support procedural decision making. Syst. Means Inform. 2016, 182–198. [Google Scholar]
- Duga, S.; Sebyakin, A.; Nosyreva, L. The concept of a decision support system in the preliminary investigation. Inf. Technol. Secur. 2019, 26, 45–57. [Google Scholar] [CrossRef]
- Duga, S.; Trufanov, A. The knowledge graph concept of decision support system in preliminary investigation. Secur. Inf. Technol. 2020, 22, 55–66. [Google Scholar] [CrossRef]
- Tushkanova, O.N.; Samoilov, V.V. KnowledgeNet: A model and system of accumulation, representation and use of knowledge and data. Des. Ontol. 2019, 9, 117–131. [Google Scholar] [CrossRef]
- Podruzhkina, T.A.; Fedorov, D.Y. Algorithms for Planning the Learning Process on the Basis of Semantic Knowledge Networks. Bull. St.-Petersburg Univ. State Fire Serv. EMERCOM Russ. 2017, 2, 107–116. [Google Scholar]
- Vasiliev, V.I.; Belkov, N.V. Decision support system for the security of personal data. Bull. UGATU 2011, 45–52. [Google Scholar]
- Balraj, K.; Neeraj, S. Approaches, Issues and Challenges in Recommender Systems: A Systematic Review. Indian J. Sci. Technol. 2016, 9. [Google Scholar] [CrossRef]
Method | Strengths | Limitations |
---|---|---|
Traditional IDSs | Effective against known attacks | Not effective against newly emerging threats |
Deep-learning-based IDSs | Can handle newly emerging threats | Computationally expensive, requires large amounts of training data |
KNN | High detection accuracy (99.99%) | Limited by the quality of the training data |
RF | High detection accuracy (99.99%) | Can be computationally expensive |
CNN-GRU | High detection accuracy (99.98%) | Requires large amounts of training data |
Approach | Research Gap Addressed | Limitations/Drawbacks |
---|---|---|
[3] | Improved attack identification | Limited scope and potential for false positives |
[4] | Cybersecurity recommender systems | Lack of applications and limited personalization |
[5] | Intrusion detection frameworks | Limited focus on IoT devices and potential for false positives |
[6] | Beta mixture technique for anomaly detection | Limited action after anomaly detection and potential for false positives |
Method | Strengths | Limitations |
---|---|---|
AI-based cyberattack analysis | Provides insights into potential future threats | Limited by the availability of data and the evolving nature of AI-based attacks |
Cybersecurity measures derived from AI-based cyberattack analysis | Can be used to make informed decisions regarding cybersecurity measures | May not be effective against unknown attacks |
Interdisciplinary approach to IoT security | Recognizes the complexity of IoT security and the need for a collaborative approach | Requires the involvement of multiple stakeholders, which can be challenging to coordinate |
Attack_1 | Attack_2 | … | Attack_N | |
---|---|---|---|---|
Strategy_1 | 5 | 1 | … | 3 |
Strategy_2 | 4 | 4 | … | ? |
Strategy_3 | 2 | ? | … | 4 |
Strategy_4 | ? | 2 | … | ? |
… | … | |||
Strategy_M | 1 | ? | … | ? |
Cosine Similarity | Pearson Correlation | Normalized Cosine Similarity | |
---|---|---|---|
Homogeneity | 76% | 64% | 72% |
Coverage | 68% | 44% | 60% |
Collaborative Filtering | An Event Recommendation Approach Using Cosine Proximity | |
---|---|---|
Homogeneity | 64% | 79% |
Coverage | 83% | 84% |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Asyaev, G.; Sokolov, A.; Ruchay, A. Intelligent Algorithms for Event Processing and Decision Making on Information Protection Strategies against Cyberattacks. Mathematics 2023, 11, 3939. https://doi.org/10.3390/math11183939
Asyaev G, Sokolov A, Ruchay A. Intelligent Algorithms for Event Processing and Decision Making on Information Protection Strategies against Cyberattacks. Mathematics. 2023; 11(18):3939. https://doi.org/10.3390/math11183939
Chicago/Turabian StyleAsyaev, Grigorii, Alexander Sokolov, and Alexey Ruchay. 2023. "Intelligent Algorithms for Event Processing and Decision Making on Information Protection Strategies against Cyberattacks" Mathematics 11, no. 18: 3939. https://doi.org/10.3390/math11183939
APA StyleAsyaev, G., Sokolov, A., & Ruchay, A. (2023). Intelligent Algorithms for Event Processing and Decision Making on Information Protection Strategies against Cyberattacks. Mathematics, 11(18), 3939. https://doi.org/10.3390/math11183939