ADAPTIVE DECISION SUPPORT SYSTEMS FOR CYBER SECURITY
Main Article Content
Abstract
The subject of the research is the principles and models of adaptive decision support systems in cyber security. The purpose is to develop basic principles and models underlying the operation of adaptive decision support systems in the field of cybersecurity. The methods of research are methods of system analysis, control theory, decision theory, and artificial intelligence. The result of the study. The basic principles and models are proposed, the consideration and use of which in decision support systems will allow the formation of adaptive properties of the described systems. It is shown that the properties of adaptability can be formulated as a learning task. Presents optimization algorithms that underlie learning processes. Conclusion. The combined use of mathematical modeling methods, the theory of adaptation and artificial intelligence methods (training, pattern recognition and problem solving planning) with the corresponding creation of ontologies of cybersecurity systems that ensure the filling of databases, models and knowledge will allow you to implement an effective adaptive decision support system that will be useful a tool for managers at any level at all stages of decision making and implementation. The presented approaches can be used as a basis for building and operating decision support systems, increasing the area of application of such systems due to the formation of their adaptability properties.
Article Details
References
Adiel, Aviad, Krzysztof, Węcel and Witold, Abramowicz (2018), “A Concept for Ontology-Based Value of Cybersecurity Knowledge”, International Journal of Management and Economics, No. 54 (1), pp. 50–57.
Md Mehedi Hassan Onik, Nasr Al-Zaben, Hung Phan Hoo and Chul-Soo Kim (2018), “A Novel Approach for Network Attack Classification Based on Sequential Questions”, Annals of Emerging Technologies in Computing, Vol. 2, No. 2, pp. 1–14, available at: http://aetic.theiaer.org/archive/v2n2/p1.html.
Atymtayeva, L., Kozhakhmet, K. and Bortsova, G. (2014), “Building a Knowledge Base for Expert System in Information Security”, Chapter Soft Computing in Artificial Intelligence, Vol. 270, pp. 57–76, DOI: http://doi.org/10.1007/978-3-319-05515-2_7
Bezerra, S., Cherruault, Y., Fourcade, Y. and Verron, G. (1996), “A Mathematical Model for the Human Decision-Making Process”, Elsevier Mathematical and Computer Modelling, No. 24 (10), pp. 21–26.
Kotenko, I.V. (2005), “Agent Based Modelling and Simulation of Cyber Warfare between Malefactors and Security Agents in Internet”, Proceedings of 19th European Simulation Multiconference.
Stytz, M.R. and Banks S.B. (2010), “Addressing Simulation Issues Posed by Cyber Warfare Technologies”, SCSM&S Magazine, No. 3.
Sarvapali, D. (2016), “A Disaster Response System based on Human-Agent Collectives”, Journal of Artificial Intelligence Research, No. 57, pp. 661–708.
Kulikova, O., Heil, R., Berg, J. and Pieters W. (2012), “Cyber Crisis Management: A decision-support framework for disclosing security incident information”, 2012 International Conference on Cyber Security, IEEE Society, pp.103–112.
Gabriela del Rocío Roldán Molina (2017), A Decision Support System for Corporations Cyber Security Risk Management, Dissertation Master´s Degree in Computer Engineering, Leiria, September 2017, 101 р.
Amin Salih, M., Yuvaraj, D., Sivaram, M. and Porkodi, V. (2018), “Detection And Removal Of Black Hole Attack In Mobile Ad Hoc Networks Using Grp Protocol”, International Journal of Advanced Research in Computer Science, Vol. 9, No 6, pp. 1–6, DOI: http://dx.doi.org/10.26483/ijarcs.v9i6.6335
Roldan, G., Almache, M., Rabadao, C., Yevseyeva I. and Fernandes V. (2017), “A Decision Support System for Corporations Cybersecurity Management”, 12th Iberian Conference on Information Systems and Technologies, Lisboa.
Amin Salih M. and Potrus M.Y. (2015), “A Method for Compensation of Tcp Throughput Degrading During Movement Of Mobile Node”, ZANCO Journal of Pure and Applied Sciences, Vol. 27, No 6, pp. 59-68.
Saravanan, S., Hailu, M., Gouse, G.M., Lavanya, M. and Vijaysai, R. (2019), “Optimized Secure Scan Flip Flop to Thwart Side Channel Attack in Crypto-Chip”, International Conference on Advances of Science and Technology, ICAST 2018. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 274, Springer, Cham, DOI: https://doi.org/10.1007/978-3-030-15357-1_34
Porkodi, V., Sivaram, M., Mohammed, A.S. and Manikandan, V. (2018), “Survey on White-Box Attacks and Solutions”, Asian Journal of Computer Science and Technology, Vol. 7, Issue 3, 2018, pp. 28–32.
Ravishankar, M., Rao, D.V. and Kumar, C.R.S. (2018), “A Game Theoretic Software Test-bed for Cyber Security Analysis of Critical Infrastructure”, Defence Science Journal, Vol. 68, No. 1, pp. 54-63, DOI: https://doi.org/10.14429/dsj.68.11402
Ibidunmoy, E.O., Alese, B.K. and Ogundele, O.S. (2014), “A Game-theoretic Scenario for Modelling the Attacker-Defender Interaction”, J. of Comp. Eng. and Information Technology, Vol. 2, No. 1, DOI: https://doi.org/10.4172/2324-9307.1000103
Konkarikoski, K. and Ritala, R. (2009), “Elements of Statistical Decision Making”, XIX IMEKO World Congress Fundamental and Applied Metrology 11, Lisabon, Portugal, September 6, pp. 1042–1047.
Massel, L.V. and Massel, A.G. (2017), “Intelligent system of semiotic type for decisionmaking support in Russia energy sector based on situational management conception”, Advances in Computer Science Research (ACSR), Vol. 72, pp. 423–429.
Gachet, A. and Haettenschwiler, P. (2003), “Distributed Decision Support Systems - A Federalis Model of Cooperation”, Human Centered Processes - Distributed Decisio Making and Man-Machine Cooperation, proceedings of the 14th MINI EURO Conference, Luxembourg, pp. 211–216.
Akhmetov, B., Lakhno, V., Boiko, Y. and Mishchenko A. (2017), “Designing a Decision Support System for the Weakly Formalized Problems in the Provision of Cybersecurity”, Eastern-European Journal of Enterprise Technologies, No. 1/2 (85), pp. 4–15.
Lakhno, V.A. (2017), “Development of a System for Supporting Solutions for Managing Cyber Security”, Radio Electronics, Computer Science, Control, No. 2, pp. 109–116.