DEVELOPMENT OF A METHOD FOR IDENTIFYING THE STATE OF A COMPUTER SYSTEM USING FUZZY CLUSTER ANALYSIS

Main Article Content

Svitlana Gavrylenko
https://orcid.org/0000-0002-6919-0055
Viktor Chelak
https://orcid.org/0000-0001-8810-3394
Oleksii Hornostal
https://orcid.org/0000-0001-5820-9999
Velizar Vassilev
https://orcid.org/0000-0003-1563-2353

Abstract

The subject of this article is the study of methods for identifying the state of computer systems. The purpose of the article is to develop a method for identifying the abnormal state of a computer system based on fuzzy cluster analysis. Objective: to analyze methods for identifying the state of computer systems; to conduct research on the selection of source data; to develop a method for identifying the state of a computer system with a small sample or fuzzy source data; to investigate and justify the procedure for comparing fuzzy distances between grouping centers and clustering objects; to develop a software and test. The methods used in the paper: cluster analysis, fuzzy logic tools. The following results were obtained: a method was theoretically substantiated and investigated for identifying the state of a computer system with a small sample or fuzziness of the initial data, which is distinguished by the use of the method based on fuzzy cluster analysis by the refined grouping procedure. To solve the clustering problem, we used a special procedure for comparing fuzzy distances between grouping centers and clustering objects. Software was developed and testing of the developed method was performed. The quality of classification based on the ROC analysis is assessed. Conclusions. The scientific novelty of the results is as follows: a study was conducted on the selection of source data for analysis; a method for identifying the state of a computer system based on fuzzy cluster analysis using a special procedure for comparing fuzzy distances between grouping centers and clustering objects has been developed. This allowed to improve the classification quality to 22%.

Article Details

How to Cite
Gavrylenko, S., Chelak, V., Hornostal, O., & Vassilev, V. (2020). DEVELOPMENT OF A METHOD FOR IDENTIFYING THE STATE OF A COMPUTER SYSTEM USING FUZZY CLUSTER ANALYSIS. Advanced Information Systems, 4(2), 8–11. https://doi.org/10.20998/2522-9052.2020.2.02
Section
Identification problems in information systems
Author Biographies

Svitlana Gavrylenko, National Technical University «Kharkiv Polytechnic Institute», Kharkiv

Doctor of Technical Sciences, Associate Professor, Professor of the Department of "Computer Engineering and Programming"

Viktor Chelak, National Technical University «Kharkiv Polytechnic Institute», Kharkiv

Lecturer, Department of Computer Engineering and Programming

Oleksii Hornostal, National Technical University «Kharkiv Polytechnic Institute», Kharkiv

Lecturer, Department of Computer Engineering and Programming

Velizar Vassilev, PhD, Assistant Professor

PhD, Assistant Professor, Department of Precise Engineering and Measurement Instruments

References

Shelukhin, O.I., Sakalema, D.Zh. and Filinova, A.S. (2013), Intrusion detection in computer networks, GlT, Moscow, 220 p.

Shkodyrev, P.V., Yagafarov, K.I., Bashtovenko, V.A. and Ilyin E.E. (2017), “A review of methods for detecting anomalies in data streams”, Proc. of the 2 Conf. on Software Engineering and Information Management, St. Petersburg, Russia, Vol. 18, pp. 64–70.

Agrawal, S. (2015), “Survey on Anomaly Detection using Data Mining Techniques”, Proc. Computer. Science, Vol. 60, pp. 708-713.

Chandola, V., Banerjee, A. and Kumar, V. (2012), “Anomaly detection for discrete sequences: A survey”, IEEE Transactions on Knowledge and Data Engineering, Vol. 24, No. 5, pp. 823–839.

Barseghyan, A.A., Kupriyanov, M.S., Stepanenko, V.V. and Cold, I.I. (2007), Data Analysis Technologies: Data Mining, Visual Mining, Text Mining, OLAP, 2nd ed., Revised. And add, BHV-Petersburg, S-Pb., 384 p.

Semenov, S.G. and Gavrilenko, S.Yu. (2015), “Formation and study of heuristics in antivirus analyzers using the Mamdani algorithm”, Journal of Qafqaz university, Azerbadhan, Mathematics and computer scienceVol. 3, No. 3, pp. 116-120.

Fisher, R. A. (1958), Statistical methods for researchers, Gosstatizdat, Moscow, 267 p.

Semеnov, S., Gavrilenko, S. and Chelak, V. (2016), “Developing parametrical criterion for registering abnormal behavior in computer and telecommunication systems on basis of economic test”, Actual problems of economics, Kyiv, Vol. 4(178), рр. 451-459.

Sutton, R.S. and Barto, A.G. (2020), Reinforcement Learning, 2-nd edition, DMK press, Moscow, 552 p.

Rokach, L. (2010), “Ensemble-based classifiers”, Artificial Intelligence Review, Vol. 33, release 1–2.

(2020), Methods of constructing decision trees in classification problems in Data Mining, available at: https://ami.nstu.ru/~vms/lecture/data_mining/trees.htm

Iwan, Syarif, Ed, Zaluska1, Adam, Prugel-Bennett1 and Gary, Wills (2012), Application of Bagging, Boosting and Stacking to Intrusion Detection, Springer-Verlag Berlin Heidelberg. Perner (Ed.): MLDM, LNAI 7376, pp. 593–602.

Tarkhov, D.A. (2014), Neural network models and algorithms, Radio Engineering, Moscow, 352 p.

Barsky, A.B. (2004), Neural networks: recognition, control, decision making, Finance and statistics, Moscow, 176 p.

Rutkovskaya, D.S., Pilinsky, M.V. and Rutkovsky, L.P. (2004), Neural networks, genetic algorithms and fuzzy systems, Garyachaya liniya-Telecom, Moscow, 452 p.

Korchenko A.O. (2019), Methods of identification of anomalous stations for systems of detection of intrusion, Dis. doc those. 05.13.21 - Systems for information security, Kyiv, 405 p.

Lin, W-C., Ke, W-S. and Tsai, C-F (2015), “An intrusion detection system based on combining cluster centers and nearest neighbors”, Knowledge-Based Systems, vol. 78, pp. 13-21.

Mandel, I.D. (1988), Methods of cluster analysis, Finance and Statistics, Moscow, 176 p.

Egorenko, M.V. and Bokhovko, A.G. (2016), “Cluster analysis as a means of grouping the studied variables”, Collection of St. Petersburg State University of Economics, 2016, Issue 7, p. 57-69.

Kofman, A. (1982), Introduction to the theory of fuzzy sets, Radio and communications, Moscow, 486 p.

Semenov, S., Sira, O., Gavrylenko, S. and Kuchuk N. (2019), “Identification of the state of an object under conditions of fuzzy input data”, Eastern-European Journal of Enterprise Technologies, vol. 1, no 4 (97), pp. 22-29, DOI:

https://doi.org/10.15587/1729-4061.2019.1570.

Raskin, L.G. and O.V. Sira (2008), Fuzzy math. Fundamentals of the theory. Applications, Parus, Kharkiv, 352 p.

(2019), Detector Performance Analysis Using ROC Curves, available at: https://www.mathworks. com/help/phased/examples /detector-performance-analysis-using-roc-curves.html

Fawcett, T. (2006), “An Introduction to ROC Analysis”, Pattern Recognition Letters, 27 (8), pp. 861–874.