Skip to main content
Top
Published in: Automatic Control and Computer Sciences 8/2020

01-12-2020

Ensuring Cybersecurity of Digital Production Using Modern Neural Network Methods

Author: V. M. Krundyshev

Published in: Automatic Control and Computer Sciences | Issue 8/2020

Login to get access

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The transition from the information economy to the digital one presents new challenges for society associated with the development of disruptive technologies, a network of cyber-physical systems, artificial intelligence and big data. When creating digital platforms, a number of difficulties arise: the large size of the digital infrastructure and its heterogeneity, poorly established information interaction between segments, the lack of a unified approach to ensuring cybersecurity and a high dependence on the qualifications of personnel and equipment reliability. The introduction of the digital economy leads to an increase in the risk of cyber threats associated with access control problems between information flow regulation and control systems. To solve the problems of detecting cyber threats, it is proposed to use generative adversarial neural networks. Algorithms for learning and testing a neural network were presented. The results of the experiments have demonstrated that the proposed solution is highly accurate in detecting cyberattacks.
Literature
1.
go back to reference Schwab, K., The Fourth Industrial Revolution, Penguin UK, 2017. Schwab, K., The Fourth Industrial Revolution, Penguin UK, 2017.
2.
go back to reference Klau, T., As the boards of directors of companies decide on the introduction of advanced technologies, Joint Stock Co.: Corp. Governance Issues, 2017, vol. 1, no. 2, pp. 30–31. Klau, T., As the boards of directors of companies decide on the introduction of advanced technologies, Joint Stock Co.: Corp. Governance Issues, 2017, vol. 1, no. 2, pp. 30–31.
3.
go back to reference Belov, V.B., A new paradigm for industrial development in Germany – the Industry 4.0 strategy, Sovrem. Evr., 2016, no. 5, pp. 11–22. Belov, V.B., A new paradigm for industrial development in Germany – the Industry 4.0 strategy, Sovrem. Evr., 2016, no. 5, pp. 11–22.
4.
go back to reference Zhou, L., Yeh, K., Hancke, G., Liu, Z., and Su, C., Security and privacy for the industrial Internet of Things: An overview of approaches to safeguarding endpoints, IEEE Signal Process. Mag., 2018, vol. 35, no. 5, pp. 76–87.CrossRef Zhou, L., Yeh, K., Hancke, G., Liu, Z., and Su, C., Security and privacy for the industrial Internet of Things: An overview of approaches to safeguarding endpoints, IEEE Signal Process. Mag., 2018, vol. 35, no. 5, pp. 76–87.CrossRef
5.
go back to reference Global, M.K., The Internet of Things: Mapping the Value Beyond the Hype, New York: McKinsey & Company, 2015. Global, M.K., The Internet of Things: Mapping the Value Beyond the Hype, New York: McKinsey & Company, 2015.
6.
go back to reference Huawei Global Industry Vision, Unfolding the Industry Blueprint of an Intelligent World, 2018. Huawei Global Industry Vision, Unfolding the Industry Blueprint of an Intelligent World, 2018.
7.
8.
go back to reference Ovasapyan, T., Moskvin, D., and Kalinin, M., Using neural networks to detect internal intruders in vanets, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 954–958.CrossRef Ovasapyan, T., Moskvin, D., and Kalinin, M., Using neural networks to detect internal intruders in vanets, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 954–958.CrossRef
9.
go back to reference Lavrova, D., Zegzhda, D., and Yarmak, A., Using GRU neural network for cyber-attack detection in automated process control systems, IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), Sochi, 2019, pp. 1–3. Lavrova, D., Zegzhda, D., and Yarmak, A., Using GRU neural network for cyber-attack detection in automated process control systems, IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), Sochi, 2019, pp. 1–3.
11.
go back to reference Kalinin, M.O., Zubkov, E.A., Suprun, A.F., and Pechenkin, A.I., Prevention of attacks on dynamic routing in self-organizing adhoc networks using swarm intelligence, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 977–983.CrossRef Kalinin, M.O., Zubkov, E.A., Suprun, A.F., and Pechenkin, A.I., Prevention of attacks on dynamic routing in self-organizing adhoc networks using swarm intelligence, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 977–983.CrossRef
12.
go back to reference Stepanova, T., Kalinin, M., Baranov, P., and Zegzhda, D., Homogeneity analysis of power consumption for information security purposes, Proceedings of the 3rd International Conference of Security of Information and Networks, 2010, pp. 113–117. Stepanova, T., Kalinin, M., Baranov, P., and Zegzhda, D., Homogeneity analysis of power consumption for information security purposes, Proceedings of the 3rd International Conference of Security of Information and Networks, 2010, pp. 113–117.
13.
go back to reference Kalinin, M.O., Lavrova, D.S., and Yarmak, A.V., Detection of threats in cyberphysical systems based on deep learning methods using multidimensional time series, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 912–917.CrossRef Kalinin, M.O., Lavrova, D.S., and Yarmak, A.V., Detection of threats in cyberphysical systems based on deep learning methods using multidimensional time series, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 912–917.CrossRef
14.
go back to reference Lavrova, D., Poltavtseva, M., and Shtyrkina, A., Security analysis of cyber-physical systems network infrastructure, 2018 IEEE Industrial Cyber-Physical Systems, ICPS 2018, 2018, pp. 818–823. Lavrova, D., Poltavtseva, M., and Shtyrkina, A., Security analysis of cyber-physical systems network infrastructure, 2018 IEEE Industrial Cyber-Physical Systems, ICPS 2018, 2018, pp. 818–823.
15.
go back to reference Zegzhda, D., Lavrova, D., and Poltavtseva, M., Multifractal security analysis of cyberphysical systems, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 2, pp. 196–204. Zegzhda, D., Lavrova, D., and Poltavtseva, M., Multifractal security analysis of cyberphysical systems, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 2, pp. 196–204.
16.
go back to reference Lavrova, D., Pechenkin, A., and Gluhov, V., Applying correlation analysis methods to control flow violation detection in the Internet of Things, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 735–740.CrossRef Lavrova, D., Pechenkin, A., and Gluhov, V., Applying correlation analysis methods to control flow violation detection in the Internet of Things, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 735–740.CrossRef
17.
go back to reference Zegzhda, P., Zegzhda, D., Kalinin, M., Pechenkin, A., Minin, A., and Lavrova, D., Safe integration of siem systems with Internet of Things: Data aggregation, integrity control, and bioinspired safe routing, ACM International Conference Proceeding Series, 2016, pp. 81–87. https://doi.org/10.1145/2947626.2947639 Zegzhda, P., Zegzhda, D., Kalinin, M., Pechenkin, A., Minin, A., and Lavrova, D., Safe integration of siem systems with Internet of Things: Data aggregation, integrity control, and bioinspired safe routing, ACM International Conference Proceeding Series, 2016, pp. 81–87. https://​doi.​org/​10.​1145/​2947626.​2947639
18.
go back to reference With QuickType, Apple wants to do more than guess your next text. It wants to give you an AI. https://www.wired.com/2016/06/apple-bringing-ai-revolution-iphone/. Accessed September 31, 2019. With QuickType, Apple wants to do more than guess your next text. It wants to give you an AI. https://​www.​wired.​com/​2016/​06/​apple-bringing-ai-revolution-iphone/​.​ Accessed September 31, 2019.
19.
go back to reference Xiong, W., et al., The Microsoft 2017 Conversational Speech Recognition System: Technical Report. https://www.microsoft.com/en-us/research/publication/microsoft-2017-conversational-speech-recognition-system/. Accessed September 31, 2019. Xiong, W., et al., The Microsoft 2017 Conversational Speech Recognition System: Technical Report. https://​www.​microsoft.​com/​en-us/​research/​publication/​microsoft-2017-conversational-speech-recognition-system/​.​ Accessed September 31, 2019.
21.
go back to reference Kalinin, M., Demidov, R., and Zegzhda, P., Hybrid neural network model for protection of dynamic cyber infrastructure, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 4, pp. 375–382. Kalinin, M., Demidov, R., and Zegzhda, P., Hybrid neural network model for protection of dynamic cyber infrastructure, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 4, pp. 375–382.
22.
go back to reference Demidov, R.A., Zegzhda, P.D., and Kalinin, M.O., Threat analysis of cyber security in wireless adhoc networks using hybrid neural network model, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 971–976.CrossRef Demidov, R.A., Zegzhda, P.D., and Kalinin, M.O., Threat analysis of cyber security in wireless adhoc networks using hybrid neural network model, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 971–976.CrossRef
23.
go back to reference Cui, Y. and Wang, W., Colorless video rendering system via generative adversarial networks, IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA), Dalian, 2019, IEEE, 2019, pp. 464–467. Cui, Y. and Wang, W., Colorless video rendering system via generative adversarial networks, IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA), Dalian, 2019, IEEE, 2019, pp. 464–467.
24.
go back to reference Goodfellow, I., et al., Generative adversarial nets, Advances in Neural Information Processing Systems, 2014, pp. 2672–2680. Goodfellow, I., et al., Generative adversarial nets, Advances in Neural Information Processing Systems, 2014, pp. 2672–2680.
25.
go back to reference Zhu, J.Y., et al., Unpaired image-to-image translation using cycle-consistent adversarial networks, Proceedings of the IEEE International Conference on Computer Vision, 2017, pp. 2223–2232. Zhu, J.Y., et al., Unpaired image-to-image translation using cycle-consistent adversarial networks, Proceedings of the IEEE International Conference on Computer Vision, 2017, pp. 2223–2232.
26.
go back to reference Schlegl, T., et al., Unsupervised anomaly detection with generative adversarial networks to guide marker discovery, International Conference on Information Processing in Medical Imaging, Boone, 2017; Lect. Notes Comput. Sci., 2017, pp. 146–157. Schlegl, T., et al., Unsupervised anomaly detection with generative adversarial networks to guide marker discovery, International Conference on Information Processing in Medical Imaging, Boone, 2017; Lect. Notes Comput. Sci., 2017, pp. 146–157.
27.
go back to reference Anderson, H., Woodbridge, J., and Filar, B., DeepDGA: Adversarially-tuned domain generation and detection, Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, Vienna, 2016, 2016, pp. 13–21. Anderson, H., Woodbridge, J., and Filar, B., DeepDGA: Adversarially-tuned domain generation and detection, Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, Vienna, 2016, 2016, pp. 13–21.
28.
go back to reference Tensorflow. https://www.tensorflow.org/. Accessed September 31, 2019. Tensorflow. https://​www.​tensorflow.​org/​.​ Accessed September 31, 2019.
29.
go back to reference Keras. https://keras.io/. Accessed September 31, 2019. Keras. https://​keras.​io/​.​ Accessed September 31, 2019.
30.
go back to reference Hodo, E., et al., Threat analysis of IoT networks using artificial neural network intrusion detection system, 2016 International Symposium on Networks, Computers and Communications (ISNCC), Yasmine Hammamet, 2016, pp. 1–6. Hodo, E., et al., Threat analysis of IoT networks using artificial neural network intrusion detection system, 2016 International Symposium on Networks, Computers and Communications (ISNCC), Yasmine Hammamet, 2016, pp. 1–6.
31.
go back to reference Itano, F., de Abreu de Sousa, M., and Del-Moral-Hernandez, E., Extending MLP ANN hyper-parameters optimization by using genetic algorithm, International Joint Conference on Neural Networks (IJCNN), Rio de Janeiro, 2018, pp. 1–8. Itano, F., de Abreu de Sousa, M., and Del-Moral-Hernandez, E., Extending MLP ANN hyper-parameters optimization by using genetic algorithm, International Joint Conference on Neural Networks (IJCNN), Rio de Janeiro, 2018, pp. 1–8.
32.
go back to reference Ingre, B. and Yadav, A., Performance analysis of NSL-KDD dataset using ANN, International Conference on Signal Processing and Communication Engineering Systems, Guntur, 2015, pp. 92–96. Ingre, B. and Yadav, A., Performance analysis of NSL-KDD dataset using ANN, International Conference on Signal Processing and Communication Engineering Systems, Guntur, 2015, pp. 92–96.
33.
go back to reference Beigh, B. and Peer, V., Performance evaluation of different intrusion detection system: An empirical approach, International Conference on Computer Communication and Informatics, Coimbatore, 2014, pp. 1–7. Beigh, B. and Peer, V., Performance evaluation of different intrusion detection system: An empirical approach, International Conference on Computer Communication and Informatics, Coimbatore, 2014, pp. 1–7.
34.
go back to reference Network Simulator NS-3. https://www.nsnam.org/. Accessed September 31, 2019. Network Simulator NS-3. https://​www.​nsnam.​org/​.​ Accessed September 31, 2019.
35.
go back to reference Kalinin, M.O., Zubkov, E.A., Suprun, A.F., and Pechenkin, A.I., Prevention of attacks on dynamic routing in self-organizing adhoc networks using swarm intelligence, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 977–983.CrossRef Kalinin, M.O., Zubkov, E.A., Suprun, A.F., and Pechenkin, A.I., Prevention of attacks on dynamic routing in self-organizing adhoc networks using swarm intelligence, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 977–983.CrossRef
36.
go back to reference Fawcett, T., An introduction to ROC analysis, Pattern Recognit. Lett., 2006, vol. 27, no. 8, pp. 861–874.CrossRef Fawcett, T., An introduction to ROC analysis, Pattern Recognit. Lett., 2006, vol. 27, no. 8, pp. 861–874.CrossRef
Metadata
Title
Ensuring Cybersecurity of Digital Production Using Modern Neural Network Methods
Author
V. M. Krundyshev
Publication date
01-12-2020
Publisher
Pleiades Publishing
Published in
Automatic Control and Computer Sciences / Issue 8/2020
Print ISSN: 0146-4116
Electronic ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411620080179

Other articles of this Issue 8/2020

Automatic Control and Computer Sciences 8/2020 Go to the issue