NEURO-FUZZY SYSTEM FOR DETECTING INTRUSIONS INTO THE INFORMATION NETWORK OF CRITICAL INFRASTRUCTURE

Authors

DOI:

https://doi.org/10.28925/2663-4023.2025.27.750

Keywords:

information security; intrusion; information network; data mining; neuro-fuzzy system; neural network; cyberattack; critical infrastructure; artificial neural network.

Abstract

 In the situation of Russia’s military aggression against Ukraine, the safety of people and the country largely depends on the reliability of critical infrastructure. In addition to physical attacks with weapons, Russia uses cyber weapons to attack the management systems of these facilities through cyberspace. Particularly alarming is the tendency for such facilities, which use modern technologies and operate in a single information environment, to remain vulnerable to new types of cyber threats, even with great efforts to protect them. This significantly complicates the task of ensuring long-term sustainability and security. Protecting information systems at such facilities is critical for the stable development of modern society. This article considers the task of detecting intrusions into critical infrastructure information networks. The main components of an intrusion detection system are identified and their functions are described. The article analyzes various approaches to detecting information security violations. The main methods of intrusion detection are characterized, their advantages and disadvantages are highlighted. It is shown that in order to increase the efficiency of detecting situations related to possible intrusion, it is necessary to use modern technologies of data mining. The features of technologies for use in intrusion detection systems were investigated, and based on the results of their comparative analysis, hybrid tools for detecting attacks were proposed. It is shown that the most promising for the task under consideration is the use of neuro-fuzzy methods. The architecture of a neuro-fuzzy system for detecting intrusions into the information network of critical infrastructure is proposed.

Downloads

Download data is not yet available.

References

On Approval of the General Requirements for the Cyber Defense of Critical Infrastructure, Resolution of the Cabinet of Ministers of Ukraine № 518 (2022) (Ukraine). https://zakon.rada.gov.ua/laws/show/518-2019-%D0%BF#Text.

Yevseev, S. P., Zakovorotnyi, O. Y., Milov, O. V., Kuchuk, G. A., Galuza, O. A., Koval, M. V., Voitko, O. V., & Hryshchuk, R. V. (2024). Methodology for synthesizing models of intelligent control and security systems for critical infrastructure facilities: monograph. Kharkiv: Novyi Svit-2000 Publishing House.

Lukova-Chuyko, N. V, Toliupa, S. V., Nakonechnyi, V. S., & Brailovsky, M. M. (2021). Intrusion Detection Systems and Functional Resilience of Distributed Information Systems to Cyber Threats: monograph. K.: Format.

Lande, D. V., Subach, I. Y., & Boyarynova, Y. E. (2018). Fundamentals of the theory and practice of data mining in the field of cybersecurity: a textbook. K.: ISZZI KPI.

Brailovskyi, M. M., Zybin, S. V., Kobozeva, A. A., Khoroshko, V. O., & Khokhlachova, Y. E. (2021). Analysis of cybersecurity of information systems: monograph. K.: FOP Yamchynskyi O.V.

Abdalla, A., Aleshyn, G. V., Vdovychenko, I. N., et al. (2020). Cybersecurity and Information Technology: a monograph. Kh.: DISA PLUS LLC.

Tolіupa, S. V., & Nakonechnyi, V. S. (2020). Problems of protection of critical infrastructure objects. Security of Information Systems and Technologies, 1(2), 57–65. https://doi.org/10.17721/10.17721/ISTS.2020.1.31-39

Toliupa, S., Lukova-Chuyko, N., Parkhomenko, I. (2021). Intrusion Detection Methods in Modern IDS Systems. Security of information systems and technologies, 1(5), 19–26. https://doi.org/10.17721/ISTS.2021.1.17-24

Official website of the United States Computer Emergency Readiness Team. (n. d.). http://www.us-cert.gov

Official website of X-Force. (n. d.). http://xforce.iss.net

Official website of Secunia. (n. d.). http://secunia.com

Official website of BugTraq. (n. d.). http://securityfocus.com

Official website of the Open Source Vulnerabilities Data Base. (n. d.). http://osvdb.org

Official website of The MITRE Corporation. (n. d.). http://attack.mitre.org

Official website of KDD Cup 1999 Data. (n. d.). http://kdd.ics.uci.edu/databases/kddcup99/kddcup99

Dovbeshko, S. V., Toliupa, S. V., & Shestak, Y. V. (2019). Application of data mining methods for building attack detection systems. Modern Information Protection, 1, 6–15.

Toliupa, S., Pliushch, O., & Parkhomenko, I. (2020). Construction of attack detection systems in information networks on neural network structures. Electronic professional scientific publication “Cybersecurity: Education, Science, Technology”. 2(10), 169–183. https://doi.org/10.28925/2663-4023.2020.10.169183.

Subach, I. Y., Kubrak, V. O., Mykytiuk, A. V., Korotaiev, S. O. (2020). Zero-day polymorphic cyberattacks detection using fuzzy inference system. Austrian Journal of Technical and Natural Sciences, 5–6, 8–13.

Hulak, H. M., Zhiltsov, O. B., Kyrychok, R. V., Korshun, N. V., & Skladannyi, P. M. (2024). Information and cyber security of the enterprise. Textbook. Lviv: Publisher Marchenko T. V.

Downloads


Abstract views: 7

Published

2025-03-27

How to Cite

Toliupa, S., & Kulko , A. (2025). NEURO-FUZZY SYSTEM FOR DETECTING INTRUSIONS INTO THE INFORMATION NETWORK OF CRITICAL INFRASTRUCTURE. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 3(27), 233–247. https://doi.org/10.28925/2663-4023.2025.27.750