ABSTRACT
The paper offers an approach for implementation of intelligent agents intended for network traffic and security risk analysis in cyber-physical systems. The agents are based on the algorithm of pseudo-gradient adaptive anomaly detection and fuzzy logical inference. The suggested algorithm operates in real time. The fuzzy logical inference is used for regulation of algorithm parameters. The variants of the implementation are proposed. The experimental assessment of the approach confirms its high speed and adequate accuracy for network traffic analysis.
- ITU-T: General overview of the Global Information Infrastructure standards development. Recommendation Y.100, 1998.Google Scholar
- ITU-T: General overview of NGN. Recommendation Y.2001, 2004.Google Scholar
- ITU-T: General principles and general reference model for Next Generation Networks. Recommendation Y.2011, 2004.Google Scholar
- A. Kanáliková. 2005. Services In NGN -- Next Generation Networks. Journal of Information, Control and Management Systems, 3, 2 (2005), 97--102.Google Scholar
- N. Sefz. 2003. ITU-T QoS Standarts for IP -- Based Networks. IEEE Communication Magazine (June 2003), 82--89. Google ScholarDigital Library
- M. Wooldridge, N. R. Jennings. 1995. Intelligent Agents: Theory and Practice. The Knowledge Engineering Review, 10, 2 (1995), 115--152.Google Scholar
- M. Wooldridge, N. R. Jennings. 1995. Agent theories, architectures, and languages: a survey. In Proceedings of the workshop on agent theories, architectures, and languages on Intelligent agents (ECAI-94). SpringerVerlag New York, 1--39. Google ScholarDigital Library
- Y. Shoham and K. Leyton-Brown. 2008. Multiagent systems: algorithmic, game-theoretic, and logical foundations. Cambridge University Press, 2008. Google ScholarDigital Library
- D. Chess, B. Grosof, C. Harrison, D. Levine, C. Parris, and G. Tsudik. 2000. Itinerant Agents for Mobile Computing. Commun. Surveys Tuts. 3, 3 (July 2000), 34--49. Google ScholarDigital Library
- C. M. Jonker and J. Treur. 1997. Compositional Verification of Multi-Agent Systems: A Formal Analysis of Pro-activeness and Reactiveness. In Revised Lectures from the International Symposium on Compositionality: The Significant Difference (COMPOS'97). UK, 350--380. Google ScholarDigital Library
- R. Oppliger. 2015. Quantitative Risk Analysis in Information Security Management: A Modern Fairy Tale. IEEE Security and Privacy 13, 6 (November 2015), 18--21. Google ScholarDigital Library
- T. R. Peltier. 2010. Information Security Risk Analysis (3rd ed.). Auerbach Publications, Boston, MA, USA. Google ScholarDigital Library
- V. Gorodetski, I. Kotenko, and O. Karsaev. 2003. Multi-agent technologies for computer network security: Attack simulation, intrusion detection and intrusion detection learning. International Journal of Computer Systems Science & Engineering, 4 (2003), 191--200.Google Scholar
- V. Gorodetski, O. Karsayev, I. Kotenko, and A. Khabalov. 2002. Software Development Kit for Multi-agent Systems Design and Implementation. Lecture Notes in Artificial Intelligence, 2296 (2002), 121--130. Google ScholarDigital Library
- I. Kotenko, A. Ulanov. 2006. Simulation of internet DDoS attacks and defense. Lecture Notes in Computer Science. 4176 (2006), 327--342. Google ScholarDigital Library
- I. Kotenko, A. Ulanov. 2007. Multi-agent framework for simulation of adaptive cooperative defense against internet attacks. Lecture Notes in Artificial Intelligence, 4476 (2007), 212--228. Google ScholarDigital Library
- I. Kotenko, A. Konovalov, A. Shorov. 2012. Agent-based Simulation of Cooperative Defence against Botnets. Concurrency Computation Practice and Experience, Vol.24 (2012), No.6, 573--588. Google ScholarDigital Library
- I. Saenko, S. Ageev, and I. Kotenko. 2015. Countermeasure Security Risks Management in the Internet of Things based on Fuzzy Logic Inference. In Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2015), The 13th IEEE International Symposium on Parallel and Distributed Processing with Applications, 2015, 655--659. Google ScholarDigital Library
- I. Kotenko, I. Saenko, S. Ageev, and Y. Kopchak. 2015. Abnormal Traffic Detection in networks of the Internet of things based on fuzzy logical inference. In Proceedings of the XVIII Int. Conf. on Soft Computing and Measurements (SCM'2015), IEEE Xplore, 5--8.Google Scholar
- I. Saenko, S. Ageev, and I. Kotenko. 2016. Detection of traffic anomalies in multi-service networks based on a fuzzy logical inference. In Intelligent Distributed Computing X. Studies in Computational Intelligence, vol. 678. Proceedings of 10th International Symposium on Intelligent Distributed Computing (IDC'2016), 2016, Springer International Publishing, 79--88.Google Scholar
- C. M. Macal and M. J. North. 2009. Agent-based modeling and simulation. In Winter Simulation Conference (WSC '09). 86--98. Google ScholarDigital Library
- V. Paxson. 1998. A System for Detecting Network Intruders in Real-Time. In Proceedings of the 7th USENIX Security Symposium, 1998. Google ScholarDigital Library
- R. R. Yager and D. P. Filev. 1994. Essentials of Fuzzy Modeling and Control. Wiley-Interscience, New York, NY, USA. Google ScholarDigital Library
- Y.-C. Hsu, G. Chen, S. Tong, and H.-X. Li. 2003. Integrated fuzzy modeling and adaptive control for nonlinear systems. Inf. Sci. 153, 1 (2003), 217--236. Google ScholarDigital Library
- E. H. Mamdani. 1977. Application of Fuzzy Logic to Approximate Reasoning Using Linguistic Synthesis. IEEE Trans. Comput. 26, 12 (December 1977), 1182--1191. Google ScholarDigital Library
- K. Goztepe. 2012. Designing fuzzy rule based expert system for cyber security. International Journal of Information Security Science, Vol.1, No.1.Google Scholar
- H. Mouratidis, M. Weiss, P. Giorgini. 2006. Modeling secure systems using an agent-oriented approach and security patterns. International Journal of Software Engineering and Knowledge Engineering, Vol.16, Issue 03.Google ScholarCross Ref
- V. Loia, A. Vaccaro, K. Vaisakh. 2013. A self-organizing architecture based on cooperative fuzzy agents for smart grid voltage control. IEEE Transactions on Industrial Informatics, Vol.9, Issue 3, 1415--1422.Google ScholarCross Ref
- S. Bijani, D. Robertson. 2014. A review of attacks and security approaches in open multi-agent systems. Artificial Intelligence Review, Vol.42, Issue 4, 607--636. Google ScholarDigital Library
Index Terms
Implementation of Intelligent Agents for Network Traffic and Security Risk Analysis in Cyber-Physical Systems
Recommendations
A hybrid behavior- and Bayesian network-based framework for cyber–physical anomaly detection
AbstractIn recent years, the increasing Internet connectivity and heterogeneity of industrial protocols have been raising the number and nature of cyber-attacks against Industrial Control Systems (ICS). Such cyber-attacks may lead to cyber anomalies and ...
Highlights- Hybrid behavior- and Bayesian network-based cyber–physical anomaly detection.
- Hybrid anomaly detection framework based on both cyber and physical data from ICS.
- Identification of cyber, physical and cyber–physical anomalies in ICS.
Cloud-edge coordinated traffic anomaly detection for industrial cyber-physical systems
Highlights- A cloud-edge coordinated traffic anomaly detection approach is proposed.
- An anomalous traffic alarm model is used to detect anomalous traffic continuously.
- A feature extraction algorithm is proposed to efficiently extract traffic ...
AbstractIndustrial cyber-physical systems (ICPSs) are facing increasing cyber threats that can cause catastrophes in the physical systems. Efficient network traffic anomaly detection is essential for guaranteeing the system’s security and reliability. ...
Dependency-based security risk assessment for cyber-physical systems
AbstractA cyber-physical attack is a security breach in cyber space that impacts on the physical environment. The number and diversity of such attacks against Cyber-Physical Systems (CPSs) are increasing at impressive rates. In times of Industry 4.0 and ...
Comments