IDEAS home Printed from https://ideas.repec.org/a/gam/jmathe/v11y2023i18p3939-d1241321.html
   My bibliography  Save this article

Intelligent Algorithms for Event Processing and Decision Making on Information Protection Strategies against Cyberattacks

Author

Listed:
  • Grigorii Asyaev

    (Department of Information Security, South Ural State University, Chelyabinsk 454080, Russia)

  • Alexander Sokolov

    (Department of Information Security, South Ural State University, Chelyabinsk 454080, Russia)

  • Alexey Ruchay

    (Department of Information Security, South Ural State University, Chelyabinsk 454080, Russia
    Department of Mathematics, Chelyabinsk State University, Chelyabinsk 454001, Russia)

Abstract

This paper considers the main approaches to building algorithms for the decision support systems of information protection strategies against cyberattacks in the networks of automated process control systems (the so-called recommender systems). The advantages and disadvantages of each of the considered algorithms are revealed, and their applicability to the processing of the information security events of the UNSW-NB 15 dataset is analyzed. The dataset used contains raw network packets collected using the IXIA PerfectStorm software in the CyberRange laboratory of the Australian Cyber Security Centre (Canberra) in order to create a hybrid of the simulation of the real actions and the synthetic behavior of the network traffic generated during attacks. The possibility of applying four semantic proximity algorithms to partition process the data into clusters based on attack type in a distribution control system (DCS) is analyzed. The percentage of homogeneous records belonging to a particular type of attack is used as the metric that determines the optimal method of cluster partitioning. This metric was chosen under the assumption that cyberattacks located “closer” to each other in the multidimensional space have similar defense strategies. A hypothesis is formulated about the possibility of transferring knowledge about attacks from the vector feature space into a semantic form using semantic proximity methods. The percentage of homogeneous entries was maximal when the cosine proximity measure was used, which confirmed the hypothesis about the possibility of applying the corresponding algorithm in the recommender system.

Suggested Citation

  • Grigorii Asyaev & Alexander Sokolov & Alexey Ruchay, 2023. "Intelligent Algorithms for Event Processing and Decision Making on Information Protection Strategies against Cyberattacks," Mathematics, MDPI, vol. 11(18), pages 1-17, September.
  • Handle: RePEc:gam:jmathe:v:11:y:2023:i:18:p:3939-:d:1241321
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2227-7390/11/18/3939/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2227-7390/11/18/3939/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Tehseen Mazhar & Hafiz Muhammad Irfan & Sunawar Khan & Inayatul Haq & Inam Ullah & Muhammad Iqbal & Habib Hamam, 2023. "Analysis of Cyber Security Attacks and Its Solutions for the Smart grid Using Machine Learning and Blockchain Methods," Future Internet, MDPI, vol. 15(2), pages 1-37, February.
    2. Ali Alzahrani & Theyazn H. H. Aldhyani, 2023. "Design of Efficient Based Artificial Intelligence Approaches for Sustainable of Cyber Security in Smart Industrial Control System," Sustainability, MDPI, vol. 15(10), pages 1-29, May.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Mousa Mohammed Khubrani & Shadab Alam, 2023. "Blockchain-Based Microgrid for Safe and Reliable Power Generation and Distribution: A Case Study of Saudi Arabia," Energies, MDPI, vol. 16(16), pages 1-34, August.
    2. Wadim Strielkowski & Andrey Vlasov & Kirill Selivanov & Konstantin Muraviev & Vadim Shakhnov, 2023. "Prospects and Challenges of the Machine Learning and Data-Driven Methods for the Predictive Analysis of Power Systems: A Review," Energies, MDPI, vol. 16(10), pages 1-31, May.
    3. Ameni Boumaiza, 2024. "A Blockchain-Based Scalability Solution with Microgrids Peer-to-Peer Trade," Energies, MDPI, vol. 17(4), pages 1-18, February.
    4. Guixiang Cao & Xintong Fang & Ying Chen & Jinghuai She, 2023. "Regional Big Data Application Capability and Firm Green Technology Innovation," Sustainability, MDPI, vol. 15(17), pages 1-29, August.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:11:y:2023:i:18:p:3939-:d:1241321. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.