Abstract
This paper presents an adaptive control system for detecting computer attacks in CII based on a neuro-fuzzy analysis of variant cyber-threat spaces and parameters of the protected object using an adaptive neuro-fuzzy inference system (ANFIS) and the Takagi–Sugeno–Kang fuzzy basis. The results of experimental studies have shown that the developed system provides high accuracy and speed of detecting computer attacks in changing decision-making conditions.
REFERENCES
Popov, V.O. and Chechulin, A.A., Investigation of the vulnerabilities distribution in the management systems of critical infrastructure, Inf. Svyaz’, 2021, no. 7, pp. 7–13. https://doi.org/10.34219/2078-8320-2021-12-7-7-13
Petrenko, S.A., Petrenko, A.A., and Kostyukov, A.D., Cyber resilience of digital ecosystems, Zashchita Inf. Insaid, 2021, no. 4, pp. 17–23.
Zima, V.M. and Kryukov, R.O., An approach to controlling the actions of privileged users in critical automated systems, Vopr. Oboronnoi Tekh. Ser. 16: Tekh. Sredstva Protivodeistviya Terrorizmu, 2021, nos. 9–10, pp. 72–82.
Tatarnikova, T.M., Sikarev, I.A., Bogdanov, P.Yu., and Timochkina, T.V., Botnet attack detection approach in IoT networks, Autom. Control Comput. Sci., 2022, vol. 56, no. 8, pp. 838–846.https://doi.org/10.3103/S0146411622080259
Ovasapyan, T.D., Using fuzzy logic to block attacks of internal intruders in WSN, Probl. Inf. Bezop. Komp’yut. Sist., 2019, no. 2, pp. 65–72.
Katasev, A.S., Methods and algorithms of generating the fuzzy models of assessing the objects under condition of uncertainty, Vestn. Tekhnol. Univ., 2019, vol. 22, no. 3, pp. 138–147.
Katasev, A.S., Models and methods of generating fuzzy rules in intelligent systems of state diagnostics of complex objects, Doctoral (Eng.) Dissertation, Kazan, 2014.
Andrievskaya, N.V., Reznikov, A.S., and Cheranev, A.A., Features of application of neuro fuzzy systems in systems of automatic control, Fundam. Issled., 2014, no. 11-7, pp. 1445–1449.
Alekseev, A.S., Methodology of modeling neuro-fuzzy systems, Vestn. Sovrem. Issled., 2019, no. 1.13, pp. 35–40.
Sechenov, M.D. and Shcheglov, S.N., The analysis of informal models of representation of knowledge in decision-making systems, Izv. Yuzhnogo Fed. Univ. Tekh. Nauki, 2010, no. 7, pp. 135–140.
Ivanov, A.S., Mathematical models and algorithms of operation of production knowledge bases, Cand. Sci. (Phys.–Math.) Dissertation, Saratove, 2007.
Avdeenko, T.V. Bakaev, M.A., Hybrid model of knowledge representation for inference realization in frame-based ontology, Nauchn. Vestn. Novosib. Gos. Tekh. Univ., 2013, no. 3, pp. 84–90.
Bolotova, L.S., Sistemy iskusstvennogo intellekta. Modeli i tekhnologii, osnovannye na znaniyakh. Uchebnik (Artificial Intelligence Systems: Knowledge-Based Models and Technologies: Textbook), Moscow: Finansy i Statistika, 2012.
Kotov, E.M., Models of knowledge representation and text representation in form of semantic network, Izv. Taganrogskogo Tekhnol. Univ., 2005, no. 6, pp. 145–147.
Jang, J.-S.R., ANFIS: Adaptive-network-based fuzzy inference system, IEEE Trans. Syst., Man, Cybern., 1993, vol. 23, no. 3, pp. 665–685. https://doi.org/10.1109/21.256541
Belenko, V., Krundyshev, V., and Kalinin, M., Synthetic datasets generation for intrusion detection in VANET, SIN ’18: Proc. 11th Int. Conf. on Security of Information and Networks, 2018, p. 9. https://doi.org/10.1145/3264437.3264479
ACKNOWLEDGMENTS
Project results are achieved using the resources of supercomputer center of Peter the Great St.Petersburg Polytechnic University—SCC Polytechnichesky (http://www.spbstu.ru).
Funding
The research is funded by the Ministry of Science and Higher Education of the Russian Federation under the strategic academic leadership program “Priority 2030” (agreement 075-15-2021-1333 dated November 30, 2021).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
The authors declare that they have no conflicts of interest.
Additional information
Translated by M. Chubarova
About this article
Cite this article
Krundyshev, V.M., Kalinin, M.O. Adaptive Control System for Detecting Computer Attacks on Objects of Critical Information Infrastructure. Aut. Control Comp. Sci. 56, 1040–1048 (2022). https://doi.org/10.3103/S0146411622080090
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411622080090