RESEARCH OF THE NETWORK ATTACKS DETECTION SYSTEM (NADS) UNDER DEVELOPMENT USING MAI
DOI:
https://doi.org/10.32782/IT/2024-2-4Keywords:
network attack detection system, network security, information securityAbstract
The development of computer networks affects most areas of human activity. The functioning of networks and information systems within them depends not only on the reliability of the equipment used, but also on the ability of the network to withstand any attempts to disrupt its operation. Every year, networks are becoming more complex and large-scale. As a result, the need to improve intrusion detection systems, which are primarily responsible for detecting network attacks, unauthorised access attempts and resource use, is becoming increasingly important. The constant rapid development of methods and influence of destructive software on information systems makes it necessary to increase the level of information protection. The most effective way to achieve this goal is to conduct a comprehensive analysis of attack detection and intrusion prevention systems. The scientific novelty of the research consists in determining the efficiency of the developed system by solving the problem of multi-criteria decision-making. The main goal of the work is the study of a more effective network attack detection system under development (hereafter NADS) in comparison with already existing open systems. The work decomposes the decision-making task with the selection of the main goal and alternatives. Elements of the same levels are comparable to each other in terms of prioritization. According to Saati’s method, a hierarchy of goals is determined in order to achieve the given task. Based on this, the scheme of the current study is being built, the main purpose of which is to verify and confirm the effectiveness of the developed network attack detection system among three existing alternatives according to six criteria. The results of the analysis confirm that the developed system is effective and relevant. It demonstrates advantages in detecting and responding to network threats compared to the considered analogues.
References
Khraisat A., Alazab A. A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges. Cybersecurity. 2021. P. 1.
Cremer F., Sheehan B., Fortmann M. Cyber risk and cybersecurity: a systematic review of data availability. The Geneva Papers on Risk and Insurance – Issues and Practice. 2022. P. 716–717.
Янко А.С., Макаренко О.І. Концепція системи виявлення та запобігання вторгнень до мережі. Національний університет «Полтавська політехніка імені Юрія Кондратюка». 2022. № 2. С. 59.
Толюпа С., Лукова-Чуйко Н., Шестак Я. Засоби виявлення кібернетичних атак на інформаційні системи. Київський національний університет імені Тараса Шевченка. 2021. № 2 (2). С. 21.
Мєшков В. Аналіз систем інтелектуального моніторингу трафіку комп’ютерної мережі для систем виявлення атак. Information Technology: Computer Science, Software Engineering and Cyber Security. 2023. Вип. 1. С. 88–89.
Teixeira D., Assunção L., Pereira T. OSSEC IDS Extension to Improve Log Analysis and Override False Positive or Negative Detections. Journal of Sensor and Actuator Networks. 2019. 8, 46. P. 1–2.
Корченко А. Методи ідентифікації аномальних станів для систем виявлення вторгнень. ЦП «Компринт»: монографія / А. Корченко. Київ, 2019. С. 26–27.
Голубничий Д. Ю. Оцінка складності методів виявлення атак. Scientific Collection «InterConf», (37): with the Proceedings of the 1 st International Scientific and Practical Conference «Recent Scientific Investigation». Oslo, Norway, december 6-8 2020 y. Oslo, 2020. P. 1061–1070.
Hrynchenko P. Detection of Unauthorized Actions in Networks Using Wavelet Analysis. Theoretical and Applied Cyber Security. 2023. Vol. 5. № 2. P. 40–46.
Бєлов М. Л. Переваги та недоліки методу аналізу ієрархій в задачах прийняття рішень [https://ekmair.ukma.edu.ua/handle/123456789/18277] / Національний університет «Києво-Могилянська академія». Київ, 2020. С. 31–32.