Skip to main content
Erschienen in: Automatic Control and Computer Sciences 8/2020

01.12.2020

Ensuring Cyber Resilience of Large-Scale Network Infrastructure Using the Ant Algorithm

verfasst von: E. Yu. Pavlenko, K. V. Kudinov

Erschienen in: Automatic Control and Computer Sciences | Ausgabe 8/2020

Einloggen, um Zugang zu erhalten

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Application of the ant algorithm for ensuring the cyber resilience of a distributed system in conditions of various types of cyber attacks is considered. The principle of operation of the ant algorithm is described, a mathematical model of the network infrastructure is developed, and possible types of cyberattacks are determined within the framework of the model. The results of the experimental studies demonstrated the applicability of the ant algorithm for ensuring the cyber resilience of large-scale networks.
Literatur
1.
Zurück zum Zitat Markov, Y.A., Kalinin, M.O., and Zegzhda, D.P., A technique of abnormal behavior detection with genetic sequences alignment algorithms, International Conference on Enterprise Information Systems and Web Technologies, EISWT 2010, 2010, pp. 104–110. Markov, Y.A., Kalinin, M.O., and Zegzhda, D.P., A technique of abnormal behavior detection with genetic sequences alignment algorithms, International Conference on Enterprise Information Systems and Web Technologies, EISWT 2010, 2010, pp. 104–110.
2.
Zurück zum Zitat Lavrova, D.S., Maintaining cyber sustainability in industrial systems based on the concept of molecular-genetic control systems, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 1026–1028.CrossRef Lavrova, D.S., Maintaining cyber sustainability in industrial systems based on the concept of molecular-genetic control systems, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 1026–1028.CrossRef
3.
Zurück zum Zitat Zegzhda, P., Zegzhda, D., Kalinin, M., Pechenkin, A., Minin, A., and Lavrova, D., Safe integration of SIEM systems with Internet of Things: Data aggregation, integrity control, and bioinspired safe routing, ACM International Conference Proceeding Series, 2016, pp. 81–87. https://doi.org/10.1145/2947626.2947639 Zegzhda, P., Zegzhda, D., Kalinin, M., Pechenkin, A., Minin, A., and Lavrova, D., Safe integration of SIEM systems with Internet of Things: Data aggregation, integrity control, and bioinspired safe routing, ACM International Conference Proceeding Series, 2016, pp. 81–87. https://​doi.​org/​10.​1145/​2947626.​2947639
4.
Zurück zum Zitat Lavrova, D., Zaitceva, E., and Zegzhda, P., Bio-inspired approach to self-regulation for industrial dynamic network infrastructure, CEUR Workshop Proc., 2019, vol. 2603, pp. 34–39. Lavrova, D., Zaitceva, E., and Zegzhda, P., Bio-inspired approach to self-regulation for industrial dynamic network infrastructure, CEUR Workshop Proc., 2019, vol. 2603, pp. 34–39.
5.
Zurück zum Zitat Benaicha, S.E., et al., Intrusion detection system using genetic algorithm, Science and Information Conference, London, 2014, pp. 564–568. Benaicha, S.E., et al., Intrusion detection system using genetic algorithm, Science and Information Conference, London, 2014, pp. 564–568.
6.
Zurück zum Zitat Zou, Q., et al., Ant colony optimization algorithm in intrusion detection and positive, Appl. Mech. Mater., Trans Tech Publ., 2014, vol. 443, pp. 541–545. Zou, Q., et al., Ant colony optimization algorithm in intrusion detection and positive, Appl. Mech. Mater., Trans Tech Publ., 2014, vol. 443, pp. 541–545.
7.
Zurück zum Zitat Chen, H.H., et al., LDDoS attack detection by using ant colony optimization algorithms, J. Inf. Sci. Eng., 2016, vol. 32, no. 4, pp. 995–1020. Chen, H.H., et al., LDDoS attack detection by using ant colony optimization algorithms, J. Inf. Sci. Eng., 2016, vol. 32, no. 4, pp. 995–1020.
8.
Zurück zum Zitat Kalinin, M.O., Zubkov, E.A., Suprun, A.F., and Pechenkin, A.I., Prevention of attacks on dynamic routing in self-organizing adhoc networks using swarm intelligence, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 977–983.CrossRef Kalinin, M.O., Zubkov, E.A., Suprun, A.F., and Pechenkin, A.I., Prevention of attacks on dynamic routing in self-organizing adhoc networks using swarm intelligence, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 977–983.CrossRef
9.
Zurück zum Zitat Krundyshev, V., Kalinin, M., and Zegzhda, P., Artificial swarm algorithm for VANET protection against routing attacks, 2018 IEEE Industrial Cyber-Physical Systems, ICPS 2018, 2018, pp. 795–800. Krundyshev, V., Kalinin, M., and Zegzhda, P., Artificial swarm algorithm for VANET protection against routing attacks, 2018 IEEE Industrial Cyber-Physical Systems, ICPS 2018, 2018, pp. 795–800.
10.
Zurück zum Zitat Kalinin, M., Demidov, R., and Zegzhda, P., Hybrid neural network model for protection of dynamic cyber infrastructure, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 4, pp. 375–382. Kalinin, M., Demidov, R., and Zegzhda, P., Hybrid neural network model for protection of dynamic cyber infrastructure, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 4, pp. 375–382.
11.
Zurück zum Zitat Lavrova, D., Zegzhda, D., and Yarmak, A., Using GRU neural network for cyber-attack detection in automated process control systems, IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), Sochi, 2019, pp. 1–3. Lavrova, D., Zegzhda, D., and Yarmak, A., Using GRU neural network for cyber-attack detection in automated process control systems, IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), Sochi, 2019, pp. 1–3.
15.
Zurück zum Zitat Ovasapyan, T.D., Moskvin, D.A., and Kalinin, M.O., Using neural networks to detect internal intruders in vanets, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 954–958.CrossRef Ovasapyan, T.D., Moskvin, D.A., and Kalinin, M.O., Using neural networks to detect internal intruders in vanets, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 954–958.CrossRef
16.
Zurück zum Zitat Yong, S.Z., Foo, M.Q., and Frazzoli, E., Robust and resilient estimation for cyber-physical systems under adversarial attacks, American Control Conference (ACC), Boston, MA, 2016, pp. 308–315. Yong, S.Z., Foo, M.Q., and Frazzoli, E., Robust and resilient estimation for cyber-physical systems under adversarial attacks, American Control Conference (ACC), Boston, MA, 2016, pp. 308–315.
17.
Zurück zum Zitat Thiede, S., Environmental sustainability of cyber physical production systems, Procedia CIRP, 2018, vol. 69, pp. 644–649.CrossRef Thiede, S., Environmental sustainability of cyber physical production systems, Procedia CIRP, 2018, vol. 69, pp. 644–649.CrossRef
18.
Zurück zum Zitat Zegzhda, D.P., Zegzhda, P.D., and Kalinin, M.O., Clarifying integrity control at the trusted information environment, Lect. Notes Comput. Sci., 2010, vol. 6258, pp. 337–344.CrossRef Zegzhda, D.P., Zegzhda, P.D., and Kalinin, M.O., Clarifying integrity control at the trusted information environment, Lect. Notes Comput. Sci., 2010, vol. 6258, pp. 337–344.CrossRef
19.
Zurück zum Zitat Lavrova, D., Zegzhda, D., and Yarmak, A., Predicting cyber attacks on industrial systems using the Kalman filter, 3rd World Conference on Smart Trends in Systems, Security and Sustainability, WorldS4 2019, 2019, pp. 317–321. Lavrova, D., Zegzhda, D., and Yarmak, A., Predicting cyber attacks on industrial systems using the Kalman filter, 3rd World Conference on Smart Trends in Systems, Security and Sustainability, WorldS4 2019, 2019, pp. 317–321.
20.
Zurück zum Zitat Pavlenko, E.Y., Yarmak, A.V., and Moskvin, D.A., Hierarchical approach to analyzing security breaches in information systems, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 829–834.CrossRef Pavlenko, E.Y., Yarmak, A.V., and Moskvin, D.A., Hierarchical approach to analyzing security breaches in information systems, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 829–834.CrossRef
21.
Zurück zum Zitat Zegzhda, D.P. and Pavlenko, E.Y., Cyber-sustainability of software-defined networks based on situational management, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 984–992.CrossRef Zegzhda, D.P. and Pavlenko, E.Y., Cyber-sustainability of software-defined networks based on situational management, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 984–992.CrossRef
23.
Zurück zum Zitat Zegzhda, D., Lavrova, D., and Poltavtseva, M., Multifractal security analysis of cyberphysical systems, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 2, pp. 196–204. Zegzhda, D., Lavrova, D., and Poltavtseva, M., Multifractal security analysis of cyberphysical systems, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 2, pp. 196–204.
24.
Zurück zum Zitat Dorigo, M., Optimization, learning and natural algorithms, PhD Thesis, Politecnico di Milano, 1992. Dorigo, M., Optimization, learning and natural algorithms, PhD Thesis, Politecnico di Milano, 1992.
25.
Zurück zum Zitat Shtovba, S.D., Ant algorithms: Theory and application, Programmirovanie, 2005, vol. 31, no. 4, pp. 3–18.MATH Shtovba, S.D., Ant algorithms: Theory and application, Programmirovanie, 2005, vol. 31, no. 4, pp. 3–18.MATH
26.
Zurück zum Zitat Drigo, M., The ant system: Optimization by a colony of cooperating agents, IEEE Trans. Syst. Man Cybern. B, 1996, vol. 26, no. 1, pp. 1–13. Drigo, M., The ant system: Optimization by a colony of cooperating agents, IEEE Trans. Syst. Man Cybern. B, 1996, vol. 26, no. 1, pp. 1–13.
27.
Zurück zum Zitat Dorigo, M., Bonabeau, E., and Theraulaz, G., Ant algorithms and stigmergy, Future Gener. Comput. Syst., 2000, vol. 16, no. 8, pp. 851–871.CrossRef Dorigo, M., Bonabeau, E., and Theraulaz, G., Ant algorithms and stigmergy, Future Gener. Comput. Syst., 2000, vol. 16, no. 8, pp. 851–871.CrossRef
Metadaten
Titel
Ensuring Cyber Resilience of Large-Scale Network Infrastructure Using the Ant Algorithm
verfasst von
E. Yu. Pavlenko
K. V. Kudinov
Publikationsdatum
01.12.2020
Verlag
Pleiades Publishing
Erschienen in
Automatic Control and Computer Sciences / Ausgabe 8/2020
Print ISSN: 0146-4116
Elektronische ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411620080258

Weitere Artikel der Ausgabe 8/2020

Automatic Control and Computer Sciences 8/2020 Zur Ausgabe

Neuer Inhalt