[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

A Review and Analysis of Cybersecurity Threats and Vulnerabilities, by Development of a Fuzzy Rule-Based Expert System

  • Conference paper
  • First Online:
Pan-African Conference on Artificial Intelligence (PanAfriConAI 2023)

Abstract

Over the past decade, cybersecurity threats and vulnerabilities have significantly increased, primarily due to the widespread adoption of IoT and the expanding use of systems and networks. As technology advances, cyber attackers continually improve their attack methods. Cybersecurity professionals employ the same technologies as cyber attackers for defense purposes. Effectively addressing this challenge requires the development of reliable and comprehensive cybersecurity systems for detection and mitigation. To tackle this issue, a GNS3-Fuzzy Rule-Based Expert System was created, focusing on assessing the risk of each threat over time. The system involved simulating a Local Area Network in GNS3, where attacks were executed using Kali Linux. Throughout the attacks, key metrics such as PC to Server ping time, PC-to-PC ping time, and Download time were recorded and averaged. These metrics were then utilized as inputs and ranges in the fuzzy rule-based expert system. The fuzzy rule-based expert system was developed using the MATLAB software, the fuzzy logic toolbox, and the Simulink tool. The system’s output was the risk level associated with different threats. Based on the collected data and the developed system, it was observed that as the PC-to-server time, PC-to-PC time, and download time increase, there is a corresponding elevation in the risk level of the system. Implementing this proposed system provides a dependable and precise solution for detecting the risk level of threats posed to systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 47.99
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 59.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Abdymanapov, S., Muratbekov, M., Altynbek, S., Barlybaye, A.: Fuzzy expert system of information security risk assessment on the example of analysis learning management systems (2021)

    Google Scholar 

  2. Ahsan, M., et al.: Cybersecurity threats and their mitigation approaches using machine learning- a review. J. Cybersecur. Priv 2, 527–555 (2022)

    Article  Google Scholar 

  3. Alali, M., et al.: Improving risk assessment of cyber security using fuzzy logic inference system. Comput. Secur. 74, 323–339 (2017)

    Article  Google Scholar 

  4. Amna, A., Raul, V.: Cybercrime prevention in the kingdom of Bahrain via IR security audit plans. J. Theor. Appl. Inf. Technol. 65, 274–292 (2014)

    Google Scholar 

  5. Cai, K.: System failure engineering and fuzzy methodology: an introductory overview. Fuzzy Sets Syst. 83, 113–133 (1996)

    Article  Google Scholar 

  6. Chakraborty, A., Biswas, A., Khan, A.K.: Artificial intelligence for cybersecurity: threats, attacks and mitigation. Computer Science\(>\)Cryptograph and Security (2022)

    Google Scholar 

  7. Chauhan, K.: Fuzzy approach for designing security framework, pp. 173–195 (2021)

    Google Scholar 

  8. Ding, S., Bunn, J.: Machine learning for cybersecurity: network-based botnet detection using time-limited flows. California Institute of Technology (2017)

    Google Scholar 

  9. Douligeris, C., Mitrokotsa, A.: DDoS attacks and defense mechanisms: classification and state-of-the-art. IEEE Comput. Netw. 44, 643–666 (2004)

    Article  Google Scholar 

  10. Feng, B., et al.: Stopping the cyberattack in the early stage: assessing the security risks of social network users. Security and Communication Networks (2019)

    Google Scholar 

  11. Gao, M., Zhou, M.: Fuzzy intrusion detection based on fuzzy reasoning petri nets, pp. 1272–1277 (2003)

    Google Scholar 

  12. Goztepe, K.: Designing a fuzzy rule-based expert system for cyber security. Int. J. Inf. Secur. Sci. 1, 13–19 (2015)

    Google Scholar 

  13. Mirkovic, J., Reiher, P.: A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Comput. Commun. Rev. 34(2), 39–54 (2004)

    Article  Google Scholar 

  14. Mlakic, D., Majdandzic, L.: Fuzzy rule based expert system for SCADA cyber security (2016)

    Google Scholar 

  15. Mudassar, M., Kankale, P.A., Gawande, P.: Computing the impact of security attack on network using fuzzy logic. Int. Res. J. Eng. Technol. (2016)

    Google Scholar 

  16. Obotivere, B., Nwaezeigwe, A.: Cybersecurity threats on the internet and possible solutions. IJARCEE 9, 92–97 (2020)

    Article  Google Scholar 

  17. Riyaz, B., Ganapathy, S.: An intelligent fuzzy rule-based feature selection for effective intrusion detection. In: International Conference on Recent Trends in Advance Computing (ICRTAC), pp. 206–211 (2018)

    Google Scholar 

  18. Riyaz, B., Ganapathy, S.: An intelligent fuzzy rule-based feature selection for effective intrusion detection, pp. 206–211 (2018)

    Google Scholar 

  19. Riza, L.S., Bergmeir, C., Herrera, F., Benitez, J.: Fuzzy rule-based systems for classification and regression tasks (2019)

    Google Scholar 

  20. Shrestha, J.M., Noll, C., Roverso, J., Davide, A.: A methodology for security classification applied to smart grid infrastructures. Int. J. Crit. Infrastruct. Prot. 28, 100–342 (2020)

    Article  Google Scholar 

  21. Tubis, A., et al.: Cyber-attacks risk analysis method for different levels of automation of mining processes in mines based on fuzzy theory use. Sensors 20, 7210 (2020)

    Article  Google Scholar 

  22. Yasli, F., Bolat, B.: A risk analysis model for mining accidents using a fuzzy approach based on fault tree analysis. J. Enterp. Inf. Manag. 31, 577–594 (2018)

    Article  Google Scholar 

  23. Zadeh, L.: Fuzzy sets. Inf. Control 8(3), 338–353 (1965)

    Article  Google Scholar 

  24. Zhang, Y.: Optimization-time analysis for cybersecurity. IEEE Trans. Dependable Secure Comput. 19(4), 2365–2383 (2022)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Matida Churu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Churu, M., Blaauw, D., Watson, B. (2024). A Review and Analysis of Cybersecurity Threats and Vulnerabilities, by Development of a Fuzzy Rule-Based Expert System. In: Debelee, T.G., Ibenthal, A., Schwenker, F., Megersa Ayano, Y. (eds) Pan-African Conference on Artificial Intelligence. PanAfriConAI 2023. Communications in Computer and Information Science, vol 2069. Springer, Cham. https://doi.org/10.1007/978-3-031-57639-3_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-57639-3_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-57638-6

  • Online ISBN: 978-3-031-57639-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics