he advancement in cloud computing, mobile computing, mechatronics, net centric computing, wireless sensor network, nanotechnology and internet of things has led to the conjunction in the cyber space and even leading to the creation of fog computing. Moreover, this cyberspace is a platform where business security system, financial systems, education system, industries, power plants among others. The combination of this technology and systems has improved the functionalities of cyber space and leading to vulnerability to the cyber-attack [1]. In the recent time a lot of framework and systems are published based on the application of artificial intelligence techniques to cyber security and digital forensics. The research of [2] applied deep learning technique to design a framework for cyber forensics. [3] Uses data mining techniques in anti-cybercrime. In [4] deep learning neural network and fuzzy logic was used for abnormal traffic control in a network using CICIDS 2017 data sets. In [5] applied deep learning techniques in DOS attack and [6] applied fuzzy logic technique to protect car for cyber-attack. [7] Combined Neuro-fuzzy and genetic algorithm to implement intrusion detection system.
The data used for this work have been extracted from a series of questionnaires collected from cyber experts and system administrators. The obtained data are related especially with the headlines given below; Denial of Service (Dos) attacks, virus, malware, logic bomb, social engineering and Trojan horse and Out of service, seizing web page, attacks for protesting, seize critical systems, capture confidential information and take system control. This study evaluates cyber terrorists who might attack communications systems, financial centers, power plants, emergency services, transportation, water supply, oil and natural gas distribution stations. People capable of cyber terrorism such as dedicated special staff, hackers, cyber activists and opponents of the state are evaluated in the proposed cyber security system.
The fuzzification and defuzzification of inputs and outputsin this experiment was implemented using triangular membership function as shown in the figure below;
Author ? ?: Department of Computer Science, Adamawa State University, Mubi. e-mail: [email protected]
The major technique used by the intruders are the one that would favor him after studying the weaknesses of the system based on this we have identified the techniques they might use in table
The input variable Intruder techniques (IT) is not a fixed value they are fuzzy variables as network attack, virus, Trojan horse, malware etc. Similarly for input variable benefit of intruders (BI) has the fuzzy variables out of service, protesting, control system etc. and output variable People ware has the fuzzy variables user training, awareness and user control. Depending on the inputs the outputs take different fuzzy variables value. It can be seen that Intruder techniques (IT) criteria is in x axis, benefit of intruders (BI) criteria is in y axis, and solution criteria People ware (P) is in z axis as shown in Figure 1.
Fuzzy controller has an advantage of performing according to linguistic rules in the manner of how a human behaves. The reasoning method in the fuzzy controller is also similar to that of the cyber expert handle. After an intelligent cyber security system was carefully designed, we test the system and discuss the impact of the input variables on the output variables as shown on the rules viewers and the surface viewers.
1. |
Figure 2: Intruder Techniques Membership |
S/N | Hardware | Abbreviation |
1. | Physical control | PC |
2. | Special control | SC |
3. | Technical control | TC |
i. Software | ||
S/N | Software | Abbreviation |
1. | Special software | SPC |
2. | System update | SU |
3. | National data bank | NDB |
Applying data mining techniques in cybercrimes. anti-cybercrime (ICACC) 2017 2 nd International conference on IEEE, 2017. p. .
Diverging deep learning cognitive computing techniques into cyber forensics.Forensics science international library. Science Direct 2019. 1 p. .