Artificial Intelligence Approach to Cyber Security

Table of contents

1. I. Introduction

he advancement in cloud computing, mobile computing, mechatronics, net centric computing, wireless sensor network, nanotechnology and internet of things has led to the conjunction in the cyber space and even leading to the creation of fog computing. Moreover, this cyberspace is a platform where business security system, financial systems, education system, industries, power plants among others. The combination of this technology and systems has improved the functionalities of cyber space and leading to vulnerability to the cyber-attack [1]. In the recent time a lot of framework and systems are published based on the application of artificial intelligence techniques to cyber security and digital forensics. The research of [2] applied deep learning technique to design a framework for cyber forensics. [3] Uses data mining techniques in anti-cybercrime. In [4] deep learning neural network and fuzzy logic was used for abnormal traffic control in a network using CICIDS 2017 data sets. In [5] applied deep learning techniques in DOS attack and [6] applied fuzzy logic technique to protect car for cyber-attack. [7] Combined Neuro-fuzzy and genetic algorithm to implement intrusion detection system.

2. II. Method

The data used for this work have been extracted from a series of questionnaires collected from cyber experts and system administrators. The obtained data are related especially with the headlines given below; Denial of Service (Dos) attacks, virus, malware, logic bomb, social engineering and Trojan horse and Out of service, seizing web page, attacks for protesting, seize critical systems, capture confidential information and take system control. This study evaluates cyber terrorists who might attack communications systems, financial centers, power plants, emergency services, transportation, water supply, oil and natural gas distribution stations. People capable of cyber terrorism such as dedicated special staff, hackers, cyber activists and opponents of the state are evaluated in the proposed cyber security system.

3. T III. System Architecture a) Inputs and Outputs Analysis

The fuzzification and defuzzification of inputs and outputsin this experiment was implemented using triangular membership function as shown in the figure below;

Author ? ?: Department of Computer Science, Adamawa State University, Mubi. e-mail: [email protected]

4. b) Intruder's Techniques

The major technique used by the intruders are the one that would favor him after studying the weaknesses of the system based on this we have identified the techniques they might use in table

5. IV. Result

The input variable Intruder techniques (IT) is not a fixed value they are fuzzy variables as network attack, virus, Trojan horse, malware etc. Similarly for input variable benefit of intruders (BI) has the fuzzy variables out of service, protesting, control system etc. and output variable People ware has the fuzzy variables user training, awareness and user control. Depending on the inputs the outputs take different fuzzy variables value. It can be seen that Intruder techniques (IT) criteria is in x axis, benefit of intruders (BI) criteria is in y axis, and solution criteria People ware (P) is in z axis as shown in Figure 1.

6. V. Conclusion

Fuzzy controller has an advantage of performing according to linguistic rules in the manner of how a human behaves. The reasoning method in the fuzzy controller is also similar to that of the cyber expert handle. After an intelligent cyber security system was carefully designed, we test the system and discuss the impact of the input variables on the output variables as shown on the rules viewers and the surface viewers.

Figure 1. Figure 8 :
8Figure 8: Peopleware Membership
Figure 2. Figure 6 :
6Figure 6: Hardware Membership
Figure 3. Figure 10 :
10Figure 10: Input variables Intruder Techniques (IT), Benefit of Intruders (BI) vs. output variable Peopleware (P) As shown in Figure 11. Intruder techniques (IT) criteria is in x axis, benefit of intruders (BI) criteria is in y axis, and solution criteria software (S) is in z axis.
Figure 4. Figure 11 :
11Figure 11: Input variables Intruder Techniques (IT), Benefit of Intruders (BI) vs. output variable Software (S).Benefit of Intruders (BI) vs. output variable Software (S).As shown in Figure12Benefit of intruders (BI) criteria is in x axis, and Target of Intruders (TI) criteria is in y axis, and solution criteria hardware (H) is in z axis.
Figure 5. Figure 12 :
12Figure 12: Benefit of intruders (BI) criteria is in x axis, and Target of Intruders (TI) criteria is in y axis, and solution criteria hardware (H) is in z axis
Figure 6. Figure 14 :
14Figure 14: Input variables Intruders (I), Intruder Techniques (IT) vs. output variable Peopleware As shoswn Figure 15 Target of Intruders (TI) criteria is in x axis and benefit of Intruder (BI) criteria is in y axis and solution criteria Software (S) is in z axis.
Figure 7. Figure 15 :
15Figure 15: Input variables Target of Intruders (I), Benefit of Intruder (BI) vs. output variable Software (S) In Figure 16 of fuzzy rule viewer for Intelligent cyber security system is shown using MATLAB. According to the proposed model, a sample solution is given in Figure 16 when IT=0.135; BI=0.32; TI=0.187; I=0.57. Here, model outputs are S=0.192; H=0.869 and P=0.839. Output of S=0.192 means that system Software Update (SU); H=0.571 means that system needs Technical support (TS); P=0.839 means that user needs user control (UC) is important.
Figure 8. Figure 16 :
16Figure 16: Fuzzy Rule viewer for intelligent cyber security system
Figure 9. Table 4 .
4
1.
Note: c) Benefit of IntrudersA cyber intruder normally has the reason his attack the table 2. Below summarize the possible benefit of the intruder.Figure 3: Benefit of Intruders d) Target of IntrudersTarget is a critical term for a cyber-intruder. According to target, a cyber-intruder may use one or more different cyber techniques. A cyber intruder's target may be as in
Figure 10. Table 1 :
1
Figure 11. Table 3 :
3
Figure 2: Intruder Techniques Membership
Note: Figure 4: Target of Intruders Membership e) IntrudersIntruders are person or group of persons responsible for the unauthorized access to the system. They are summarized in the table 5 below;Figure 5: Intruders Membership f) HardwareIn some situations network administrators has a software device to prevent attack as summarized in the table 6 below;Global Journal of Computer Science and TechnologyVolume XXII Issue I Version I
Figure 12. Table 4 :
4
Figure 13. Table 5 :
5
S/N Hardware Abbreviation
1. Physical control PC
2. Special control SC
3. Technical control TC
i. Software
S/N Software Abbreviation
1. Special software SPC
2. System update SU
3. National data bank NDB
Note: Figure 7: Software Membership People ware Users can play a vital role in combating cyber-attack if they have technical knowhow of attacks as it summarized in the table 8 below
Figure 14. Table 6 :
6
Figure 15. Table 8 :
8
Figure 16. Table 7 :
7
Note: and its Abbreviation Sometime it is possible to use software to combat intruders as summarized in the table 7 below;

Appendix A

Appendix A.1

Appendix B

  1. Applying data mining techniques in cybercrimes. M A Khan , S K Pradham , H , FatimaM . anti-cybercrime (ICACC) 2017 2 nd International conference on IEEE, 2017. p. .
  2. Diverging deep learning cognitive computing techniques into cyber forensics.Forensics science international library. M K Nickson , R K Victor , H S Venter . Science Direct 2019. 1 p. .
  3. Recognition of abnormal traffic using deep learning neural network and fuzzy logic IEEE, O S Amosov , Y S Ivanov , G Amosova . 2019. 2019.
  4. Deep Reinforcement learning for cyber security, T N Thanh , J R Vijay . arxiv: 1906.05799. 2019.
Date: 2020-05-06