Figure 2: Bayesian trust network 𝑃
𝑋
|
𝑌𝑌
.
When using the classical trust network scheme, it
is possible to specify the degree of interaction
between the signals received from the modules. In
this case, if at least one of the modules of the complex
system receives an alert, a hyper-alert is formed for
the specialist. When using the proposed scheme of
processing and alerting, the reliability of the result is
more than 80%.
5 CONCLUSIONS
In the context of cyberspace protection, it is important
to have a reliable and stable mechanisms for detecting
and predicting the likelihood of an attack in a typical
network environment. Varying network
configurations represent different activity profiles
and behavioral attributes of users and software. To
achieve an effective mechanism in this direction, a
cascade of multiple layers of non-linear processing
components is required, which can be useful for
extracting and transforming attributes to interpret
dynamic network profiles. Responding quickly to
security incidents is necessary to minimize the
damage caused by security incidents to the
organization. The primary goal of the organization is
to be as prepared as possible to handle security
incidents, and to prevent them by proactive actions.
Transitioning from reactive approach to proactive one
is currently a challenge in the sphere of cybersecurity
research.
The goal of constructing a Bayesian network was
to develop a model that, based on an attack prediction,
could determine the initial stages of an attack. The
model proposed does not only include the aggregation
of alerts, but also their correlation. We used the
proposed attack model to predict the attack itself. This
research can be extended in the future. There are
several problems left to be solved in the future work.
One of them is the processing and prediction of events
even if there are cycles in the attack graph. This case
is problematic, since many computational models
accounting for acyclic graphs cannot be used.
Therefore, it may be worthwhile to test another
method. For example, using an attack graph
simulation or a hidden Markov model. The second
problem, which this study presents, is the creation of
a complex and complete data set. To our knowledge,
no suitable dataset has been created to date that
emphasizes attacks. Therefore, it is important to form
a dataset that would contain attacks covering all
detectable attack stages.
REFERENCES
Buczak, A. L. and Guven, E. (2016). A survey of data
mining and machine learning methods for cyber
security intrusion detection, IEEE Communications
Surveys & Tutorials, 18(2): 1153-1176.
Akyazi, U. (2014). Possible scenarios and maneuvers for
cyber operational area. In European Conference on
Cyber Warfare and Security, Academic Conferences
International Limited, Greece.
Putjato, M.M. and Makarjan, A.S. (2020).
Kiberbezopasnost' kak neot#emlemyj atribut
mnogourovnevogo zaschischennogo kiberprostranstva.
Prikaspijskij zhurnal: upravlenie i vysokie tehnologii,
3(51): 94-102
Putjato, M.M., Makarjan, A.S., CHerkasov, A.N. and
Gorin, I.G. (2020). Adaptivnaja sistema kompleksnogo
obespechenija bezopasnosti kak jelement infrastruktury
situacionnogo centra. Prikaspijskij zhurnal: upravlenie
i vysokie tehnologii, 4(52): 75-84
Denning, D. E. (2014). Framework and principles for active
cyber defense. Computers & Security, 40: 108-113.
Aissa, N. B. and Guerroumi, M. (2016).Semi-supervised
statistical approach for network anomaly detection.
Procedia Computer Science, 83: 1090-1095.
Kim, G. Lee S. and Kim, S. (2014). A novel hybrid
intrusion detection method integrating anomaly
detection with misuse detection, Expert Systems with
Applications, 41(4): 1690-1700.
Yoo, S. Kim, S., Choudhary, A., Roy, O.P. and Tuithung,
T. (2014). Two-phase malicious web page detection
scheme using misuse and anomaly detection.
International Journal of Reliable Information and
Assurance, 2(1): 1-9.
Rani, M. S. and Xavier, S.B. (2015). A Hybrid Intrusion
Detection System Based on C5. 0 Decision Tree
Algorithm and One-Class SVM with CFA.
International Journal of Innovative Research in
Computer, 3(6): 5526-5537.
Lin, W. C., Ke, S. W. and Tsai, C. F. (2015). CANN: An
intrusion detection system based on combining cluster
centers and nearest neighbors. Knowledge-based
systems, 78: 13-21.
Shapoorifard, H. and Shamsinejad, P. (2017). A Novel
Cluster-based Intrusion Detection Approach
Integrating Multiple Learning Techniques.
International Journal of Computer Applications,
166(3): 13-16.
INFSEC 2021 - International Scientific and Practical Conference on Computer and Information Security