Intelligent Algorithms for Event Processing and Decision Making on Information Protection Strategies against Cyberattacks

This paper considers the main approaches to building algorithms for the decision support systems of information protection strategies against cyberattacks in the networks of automated process control systems (the so-called recommender systems). The advantages and disadvantages of each of the conside...

Full description

Bibliographic Details
Main Authors: Grigorii Asyaev, Alexander Sokolov, Alexey Ruchay
Format: Article
Language:English
Published: MDPI AG 2023-09-01
Series:Mathematics
Subjects:
Online Access:https://www.mdpi.com/2227-7390/11/18/3939
_version_ 1827725389996228608
author Grigorii Asyaev
Alexander Sokolov
Alexey Ruchay
author_facet Grigorii Asyaev
Alexander Sokolov
Alexey Ruchay
author_sort Grigorii Asyaev
collection DOAJ
description This paper considers the main approaches to building algorithms for the decision support systems of information protection strategies against cyberattacks in the networks of automated process control systems (the so-called recommender systems). The advantages and disadvantages of each of the considered algorithms are revealed, and their applicability to the processing of the information security events of the UNSW-NB 15 dataset is analyzed. The dataset used contains raw network packets collected using the IXIA PerfectStorm software in the CyberRange laboratory of the Australian Cyber Security Centre (Canberra) in order to create a hybrid of the simulation of the real actions and the synthetic behavior of the network traffic generated during attacks. The possibility of applying four semantic proximity algorithms to partition process the data into clusters based on attack type in a distribution control system (DCS) is analyzed. The percentage of homogeneous records belonging to a particular type of attack is used as the metric that determines the optimal method of cluster partitioning. This metric was chosen under the assumption that cyberattacks located “closer” to each other in the multidimensional space have similar defense strategies. A hypothesis is formulated about the possibility of transferring knowledge about attacks from the vector feature space into a semantic form using semantic proximity methods. The percentage of homogeneous entries was maximal when the cosine proximity measure was used, which confirmed the hypothesis about the possibility of applying the corresponding algorithm in the recommender system.
first_indexed 2024-03-10T22:29:40Z
format Article
id doaj.art-194531f545f449f1b8d0cae246bbb201
institution Directory Open Access Journal
issn 2227-7390
language English
last_indexed 2024-03-10T22:29:40Z
publishDate 2023-09-01
publisher MDPI AG
record_format Article
series Mathematics
spelling doaj.art-194531f545f449f1b8d0cae246bbb2012023-11-19T11:49:41ZengMDPI AGMathematics2227-73902023-09-011118393910.3390/math11183939Intelligent Algorithms for Event Processing and Decision Making on Information Protection Strategies against CyberattacksGrigorii Asyaev0Alexander Sokolov1Alexey Ruchay2Department of Information Security, South Ural State University, Chelyabinsk 454080, RussiaDepartment of Information Security, South Ural State University, Chelyabinsk 454080, RussiaDepartment of Information Security, South Ural State University, Chelyabinsk 454080, RussiaThis paper considers the main approaches to building algorithms for the decision support systems of information protection strategies against cyberattacks in the networks of automated process control systems (the so-called recommender systems). The advantages and disadvantages of each of the considered algorithms are revealed, and their applicability to the processing of the information security events of the UNSW-NB 15 dataset is analyzed. The dataset used contains raw network packets collected using the IXIA PerfectStorm software in the CyberRange laboratory of the Australian Cyber Security Centre (Canberra) in order to create a hybrid of the simulation of the real actions and the synthetic behavior of the network traffic generated during attacks. The possibility of applying four semantic proximity algorithms to partition process the data into clusters based on attack type in a distribution control system (DCS) is analyzed. The percentage of homogeneous records belonging to a particular type of attack is used as the metric that determines the optimal method of cluster partitioning. This metric was chosen under the assumption that cyberattacks located “closer” to each other in the multidimensional space have similar defense strategies. A hypothesis is formulated about the possibility of transferring knowledge about attacks from the vector feature space into a semantic form using semantic proximity methods. The percentage of homogeneous entries was maximal when the cosine proximity measure was used, which confirmed the hypothesis about the possibility of applying the corresponding algorithm in the recommender system.https://www.mdpi.com/2227-7390/11/18/3939attack vectorcyberattackdecision support systemautomated process control systempredictive information protectioncollaborative filtering
spellingShingle Grigorii Asyaev
Alexander Sokolov
Alexey Ruchay
Intelligent Algorithms for Event Processing and Decision Making on Information Protection Strategies against Cyberattacks
Mathematics
attack vector
cyberattack
decision support system
automated process control system
predictive information protection
collaborative filtering
title Intelligent Algorithms for Event Processing and Decision Making on Information Protection Strategies against Cyberattacks
title_full Intelligent Algorithms for Event Processing and Decision Making on Information Protection Strategies against Cyberattacks
title_fullStr Intelligent Algorithms for Event Processing and Decision Making on Information Protection Strategies against Cyberattacks
title_full_unstemmed Intelligent Algorithms for Event Processing and Decision Making on Information Protection Strategies against Cyberattacks
title_short Intelligent Algorithms for Event Processing and Decision Making on Information Protection Strategies against Cyberattacks
title_sort intelligent algorithms for event processing and decision making on information protection strategies against cyberattacks
topic attack vector
cyberattack
decision support system
automated process control system
predictive information protection
collaborative filtering
url https://www.mdpi.com/2227-7390/11/18/3939
work_keys_str_mv AT grigoriiasyaev intelligentalgorithmsforeventprocessinganddecisionmakingoninformationprotectionstrategiesagainstcyberattacks
AT alexandersokolov intelligentalgorithmsforeventprocessinganddecisionmakingoninformationprotectionstrategiesagainstcyberattacks
AT alexeyruchay intelligentalgorithmsforeventprocessinganddecisionmakingoninformationprotectionstrategiesagainstcyberattacks