SELF-ADAPTIVE METHOD FOR THE COMPUTER SYSTEMS RESILIENCE IN THE PRESENCE OF CYBERTHREADS
Abstract
Keywords
Full Text:
PDF (Українська)References
NEXUSGUARD. DDoS Threat Report 2019 Q3. Available at: https://www.nexusguard.com /threat-report-q3-2017 (аccessed 9.11.2019).
Oxford Dictionaries. Available at: http://www. oxforddictionaries.com/definition/english/botnet?q=botnet (аccessed 9.11.2019).
SearchDataCenter. Data center resiliency. Available at: http://searchdatacenter.techtarget. com/definition/resiliency (аccessed 9.11.2019).
Giudice, M., Wilkinson, C. Crowe Horwath. Resilience Going Beyond Security to a New Level of Readiness, 2016. Available at: https://www. crowehorwath.com/insights/asset/cyber-resilience-readiness-level (аccessed 9.11.2019).
Knapp, E. D., Langill, J. T. Industrial Network Security: Securing critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems. Syngress, 2014. 460 p.
Cheng, B. H., De Lemos, R., Giese, H., Inverardi, P., Magee, J., Andersson, J., Serugendo, G. D. M. Software engineering for self-adaptive systems: A research roadmap. In: Software engineering for self-adaptive systems, Springer Berlin Heidelberg, 2009, pp. 1-26.
Macas-Escriv, F. D., Haber, R., Del Toro, R., Hernandez, V. Self-adaptive systems: A survey of current approaches, research challenges and applications. Expert Systems with Applications, 2013, vol. 40, no. 18, pp. 7267-7279.
Zuzcak, M., Sochor, T. Behavioral analysis of bot activity in infected systems using honeypots. In: Communications in Computer and Information Science: Springer, Cham, 2017, vol. 718, pp. 118-133.
Sochor, T., Zuzcak, M. Attractiveness Study of Honeypots and Honeynets in Internet Threat Detection. In: 22nd Int. Conf. Computer Networks: Communications in Computer and Information Science: Springer International, Cham, 2015, pp. 69-81.
Wang, H., Jia, Q., Fleck, D., Powell, W., Li, F., Stavrou, A. A moving target DDoS defense mechanism. Computer Communications, vol. 46, 2014, pp. 10-21.
Javadianasl, Y., Manaf, A. A., Zamani, M. A Practical Procedure for Collecting More Volatile Information in Live Investigation of Botnet Attack. In: Multimedia Forensics and Security, Springer, 2017, pp. 381-414.
Khattak, S., Ramay, N. R., Khan, K. R., Syed, A. A., Khayam, S. A. A taxonomy of botnet behavior, detection, and defense. IEEE communications surveys & tutorials, 2014, vol. 16, no. 2, pp. 898-924.
Wang, P., Wu, L., Aslam, B., Zou, C. C. Analysis of Peer-to-Peer botnet attacks and defenses. In: Propagation phenomena in real world networks, Springer International Publishing, 2015, pp. 183-214.
Bhuyan, M. H., Bhattacharyya, D. K., Kalita, J. K. An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection. Pattern Recognition Letters, vol. 51, 2015, pp. 1-7.
Hoque, N., Bhuyan, M. H., Baishya, R. C., Bhattacharyya, D. K., Kalita, J. K. Network attacks: Taxonomy, tools and systems. Journal of Network and Computer Applications, vol. 40, 2014, pp. 307-324.
Wang, B., Zheng, Y., Lou, W., Hou, Y. T. DDoS attack protection in the era of cloud computing and software-defined networking. Computer Networks, vol. 81, 2015, pp. 308-319.
Pathan, A. S. K. (Ed.). Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC press, 2016. 638 p.
Branitskiy, A., Kotenko, I. Network Attack Detection Based on Combination of Neural, Immune and Neuro-Fuzzy Classifiers. In: 2015 IEEE 18th International Conference on Computational Science and Engineering (CSE), 2015, pp. 152-159.
Komar, M., Sachenko, A., Bezobrazov, S., Golovko, V. Intelligent Cyber Defense System Using Artificial Neural Network and Immune System Techniques. In: Ginige A. et al. (eds) Information and Communication Technologies in Education, Research, and Industrial Applications. ICTERI 2016. Communications in Computer and Information Science: Springer, Cham, vol. 783, 2017, pp. 36-55.
Bezobrazov, S., Sachenko, A., Komar, M., Rubanau, V. The methods of artificial intelligence for malicious applications detection in Android OS. International Journal of Computing, 2016, vol. 15, no. 3, pp. 184-190.
Lysenko, S., Savenko, O., Kryshchuk, A., Kljots, Y. Botnet detection technique for corporate area network. In: Proceedings of the 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS), 2013, pp. 363-368.
Savenko, O., Lysenko, S., Kryshchuk, A. Multi-agent Based Approach for Botnet Detection in a Corporate Area Network Using Fuzzy Logic. In: International Conference on Computer Networks: Springer, 2013, pp. 146-156.
Pomorova, O., Savenko, O., Lysenko, S., Kryshchuk, A., Bobrovnikova, K. Antievasion technique for the botnets detection based on the passive DNS monitoring and active DNS probing. In: International Conference on Computer Networks: Springer International Publishing, 2016, pp. 83-95.
Lysenko, S., Savenko, O., Bobrovnikova, K., Kryshchuk, A., Savenko, B. Information Technology for Botnets Detection Based on Their Behaviour in the Corporate Area Network. In: International Conference on Computer Networks: Springer, Cham, 2017, pp. 166-181.
IMPERVA INCAPSULA. Available at: https://www.incapsula.com/ddos/attack-glossary
(аccessed 9.11.2019).
Najafabadi, M. M., Khoshgoftaar, T. M., Napolitano, A., Wheelus, C. RUDY Attack: Detection at the Network Level and Its Important Features. In: FLAIRS Conference, 2016, pp. 288-293.
Alejandre, F. V., Corts, N. C., Anaya, E. A. Botnet Detection using Clustering Algorithms. Research in Computing Science, vol. 118, 2016, pp. 65-75.
Pedrycz, W., Waletzky, J. Fuzzy clustering with partial supervision. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), 1997, vol. 27, no. 5, pp. 787-795.
VIRUS BULLETIN. Grooten, M. VB2017 videos on attacks against Ukraine, 2017. Available at: https://www.virusbulletin.com/blog/2017/12/vb2017-videos-attacks-against-ukraine/ (аccessed 9.11.2019).
SOURCE FORGE. R-U-Dead-Yet? (RUDY) Original source code files. Available at: https:// sourceforge.net/projects/r-u-dead-yet/ (аccessed 9.11.2019).
SOURCE FORGE. Hyenae. Available at: https://sourceforge.net/projects/hyenae/ (аccessed 9.11.2019).
dsniff. Available at: https://www.monkey.org/ ~dugsong/dsniff (аccessed 9.11.2019).
Linkov, I., Palma-Oliveira, J. M. (Eds.) Resilience and risk: Methods and application in environment, cyber and social domains. Springer, 2017. 580 p.
DOI: https://doi.org/10.32620/reks.2019.4.01
Refbacks
- There are currently no refbacks.