ATTITUDE OPTIMAL HOURS PERFORMED BY THE SPECIAL AUDIT FOR THE MIND OF ELASTICITY AND FLEXIBILITY FUNCTION INTENSITY CYBERATTACKS
DOI:
https://doi.org/10.26906/SUNZ.2019.6.038Keywords:
time series, cyber-attack intensity, elasticity, Bernoulli equation, p-transformation, filtering, special auditAbstract
Cybersecurity management can be improved by enhancing the enterprise's ability to respond to cyberattacks and incidents. At the same time, it is impossible to prevent all attacks. Therefore, the rapid identification and response and protection of critical infrastructure and functions together with powerful information sharing are key issues that need to be addressed. One aspect of addressing this is to conduct timely audits, which are not only limited to scheduled scrutiny, but also provide insight into and take appropriate steps to prevent cyberattacks. The article presents studies aimed at determining the optimal time for conducting a special audit to improve the level of cyber defense and providing priority verified measures to reduce the risk of a cyber-incident. The time series of the cyber-attack intensity of the enterprise are analyzed with analytical alignment of the time series of the cyber-attack intensity function using a logistic curve. Based on the found elasticity intervals of the analytic function of the intensity of cyber-attacks on the enterprise that satisfy the non-linear Bernoulli differential equation, the analysis of the time series of cyber-attacks on the enterprise system for the same time periods that fall in the time period from the end of the planned audit to the beginning of the next. Using the p-transformation to the function of the intensity of cyber-attacks at the enterprise, and taking into account the dimensionlessness of the variables, the sensitivity of the dimensionless function of the intensity of cyber-attacks from the parameter p for a specified time period is calculated under the condition of preliminary filtering of the time series by three points. The optimal time for a special audit after a scheduled audit has been determinedDownloads
References
Шуклін Г. В., Барабаш О. В. Метод побудови стабілізаційної функції керування кібербезпекою на основі математичної моделі коливань. Телекомунікаційні та інформаційні технології. Київ. 2018. No 2 (59). С. 110–116.
S. Zhang, X. Ou and D. Caragea (2015), “Predicting cyber risks through national vulnerability database”. Information Security Journal: A Global Perspective, Vol. 24, No. 4-6, pp. 194 – 206.
H. Park, S.-O. D. Jung, H. Lee and H. P. In (2012) “Cyber Weather Forecasting: Forecasting Unknown Internet Worms Using Randomness Analysis”, IFIP International Information Security Conference. Springer, 2012, pp. 376 – 387.
C. M. Cheung, P. Goyal, V. K. Prasanna and A. S. Tehrani (2017) “Oreonet: Deep convolutional network for oil reservoir optimization”. Big Data (Big Data), 2017 IEEE International Conference on. IEEE, pp. 1277 – 1282.
G. E. Box, G. M. Jenkins, G. C. Reinsel and G. M. Ljung (2015), Time series analysis: forecasting and control, Published by John Wiley and Sons Inc., Hoboken, New Jersey, 712 р.
J. Viinikka, H. Debar, L. Me, A. Lehikoinen and M. Tarvainen (2009) “Processing intrusion detection alert aggregates with time series modeling”, Information Fusion, Vol. 10, No. 4, pp. 312 – 324.
D. Neil, M. Pfeiffer and S.-C. Liu (2016) “Phased lstm: Accelerating recurrent network training for long or event-based sequences”. Neural Information Processing Systems, pp. 3882 – 3890.
Z. Wang, P. Chakraborty, S. R. Mekaru, J. S. Brownstein, J. Ye and N. Ramakrishnan (2015), “Dynamic poisson autoregression for influenza-like-illness case count prediction”, KDD’15. New York, NY, USA: ACM, pp. 1285 – 1294.
S. Yang, H. Du, J. Holsopple and M. Sudit (2014) “Attack Projection”. In Cyber Defense and Situational Awareness, A. Kott, C. Wang, and R.F. Erbacher (Eds.). Springer International Publishing, Cham, pp. 239 – 261.
E. Gandotra, D. Bansal and S. Sofat (2015) “Computational Techniques for Predicting Cyber Threats”. Proceedings Intelligent Computing, Communication and Devices (AISC, Vol. 308) ed J. Kacprzyk (New Delhi: Springer ) pp. 247 – 253.
B. Munkhdorj and S. Yuji (2017) “Cyber attack prediction using social data analysis”. Journal of High Speed Networks, No. 23 (2), pp. 109 – 135.