Skip to main content
Log in

Detection of Network Attacks Using the Tsetlin Machine

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

In the paper, an approach to the detection of cyber-attacks is proposed that involves detecting anomalous network traffic using the Tsetlin machine. The experimental studies carried out for different types of network attacks have demonstrated the efficiency of this proposed approach.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.
Fig. 2.
Fig. 3.
Fig. 4.

Similar content being viewed by others

REFERENCES

  1. Belenko, V., Chernenko, V., Krundyshev, V., and Kalinin, M. Data-driven failure analysis for the cyber physical infrastructures, 2019 IEEE International Conference on Industrial Cyber Physical Systems, 2019, pp. 775–779. https://doi.org/10.1109/ICPHYS.2019.8854888

  2. Krundyshev, V. and Kalinin, M., Prevention of false data injections in smart infrastructures, 2019 IEEE International Black Sea Conference on Communications and Networking, BlackSeaCom 2019, 2019. https://doi.org/10.1109/BlackSeaCom.2019.8812786

  3. Belenko, V., Krundyshev, V., and Kalinin, M., Synthetic datasets generation for intrusion detection in VANET, ACM International Conference Proceeding Series, 2018. https://doi.org/10.1145/3264437.3264479

  4. Konoplev, A.S. and Kalinin, M.O., Graphanalytical model of key distribution in networks with dynamic architecture, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 3, pp. 277–284.

  5. Busygin, A.G., Konoplev, A.S., and Kalinin, M.O., Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 743–748.

    Article  Google Scholar 

  6. Topical Cyber Threats: Q2 2018. http://blog.ptsecurity.ru/2018/09/cyberthreats-II-quarter-2018.html. Accessed November 1, 2019.

  7. Zegzhda, D., Lavrova, D., and Poltavtseva, M., Multifractal security analysis of cyberphysical systems, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 2, pp. 196–204.

  8. Pavlenko, E., Zegzhda, D., and Styrkina, A., Estimating the sustainability of cyber-physical systems based on spectral graph theory, 2019 IEEE International Black Sea Conference on Communications and Networking, 2019. https://doi.org/10.1109/BlackSeaCom.2019.8812826

  9. Zegzhda, D.P. and Pavlenko, E.Yu., Digital manufacturing security indicators, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1150–1159. https://doi.org/10.3103/S0146411618080333

    Article  Google Scholar 

  10. Pavlenko, E.Y., Yarmak, A.V., and Moskvin, D.A., Application of clustering methods for analyzing the security of Android applications, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 867–873.

    Article  Google Scholar 

  11. Kalinin, M.O. and Pavlenko, E.Y., Increasing the fault tolerance and availability of software defined networks using network equipment control based on multiobjective optimization by service quality parameters, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 673–678.

    Article  Google Scholar 

  12. Ivanov, D.V. and Moskvin, D.A., Application of fractal methods to ensure the cyber-resilience of self-organizing networks, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 4, pp. 336–341.

  13. Kalinin, M.O. and Minin, A.A., Security evaluation of a wireless ad-hoc network with dynamic topology, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 899–901.

    Article  Google Scholar 

  14. Ovasapyan, T.D., Moskvin, D.A., and Kalinin, M.O., Using neural networks to detect internal intruders in vanets, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 954–958.

    Article  Google Scholar 

  15. Zegzhda, P.D., Zegzhda, D.P., Kalinin, M.O., and Konoplev, A.S., Security modeling of grid systems using Petri nets, Lect. Notes Comput. Sci., 20012, vol. 7531, pp. 299–308.

  16. Zegzhda, D.P. and Kalinin, M.O., Logical security evaluation of real-world operating systems, International Conference on Enterprise Information Systems and Web Technologies, EISWT 2007, 2007, pp. 234–241.

  17. Kalinin, M., Demidov, R., and Zegzhda, P., Hybrid neural network model for protection of dynamic cyber infrastructure, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 4, pp. 375–382.

  18. Demidov, R.A., Pechenkin, A.I., Zegzhda, P.D., and Kalinin, M.O., Application model of modern artificial neural network methods for the analysis of information systems security, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 965–970.

    Article  Google Scholar 

  19. Demidov, R.A., Zegzhda, P.D., and Kalinin, M.O., Threat analysis of cyber security in wireless adhoc networks using hybrid neural network model, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 971–976.

    Article  Google Scholar 

  20. Kalinin, M., Krundyshev, V., and Zubkov, E., Estimation of applicability of modern neural network methods for preventing cyberthreats to self-organizing network infrastructures of digital economy platforms, SHS Web Conf., 2018, vol. 44. https://doi.org/10.1051/shsconf/20184400044

  21. Krundyshev, V. and Kalinin, M., Hybrid neural network frame work for detection of cyber attacks at smart infrastructures, Proceedings of the 3rd World Conference on Smart Trends in Systems, Security and Sustainability, 2019, pp. 129–135.

  22. Kalinin, M.O., Zubkov, E.A., Suprun, A.F., and Pechenkin, A.I., Prevention of attacks on dynamic routing in self-organizing adhoc networks using swarm intelligence, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 977–983.

    Article  Google Scholar 

  23. Krundyshev, V., Kalinin, M., and Zegzhda, P., Artificial swarm algorithm for VANET protection against routing attacks, 2018 IEEE Industrial Cyber-Physical Systems, ICPS 2018, 2018, pp. 795–800.

    Google Scholar 

  24. Lavrova, D., Zegzhda, D., and Yarmak, A., Using GRU neural network for cyber-attack detection in automated process control systems, IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), Sochi, 2019, pp. 1–3.

  25. Zegzhda, P.D., Malyshev, E.V., and Pavlenko, E.Y., The use of an artificial neural network to detect automatically managed accounts in social networks, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 874–880.

    Article  Google Scholar 

  26. Markov, Y.A., Kalinin, M.O., and Zegzhda, D.P., A technique of abnormal behavior detection with genetic sequences alignment algorithms, International Conference on Enterprise Information Systems and Web Technologies, 2010, pp. 104–110.

  27. Markov, Y.A. and Kalinin, M.O., Intellectual intrusion detection with sequences alignment methods, Lect. Notes Comput. Sci., 2010, vol. 6258, pp. 217–228.

    Article  Google Scholar 

  28. Belenko, V., Krundyshev, V., and Kalinin, M., Intrusion detection for Internet of Things applying metagenome fast analysis, Proceedings of the 3rd World Conference on Smart Trends in Systems, Security and Sustainability, 2019, pp. 129–135.

  29. Tsetlin, M.L., Finite automata and modeling of the simplest forms of behavior. http://www.mathnet.ru/ links/c1ca113149b47d4bb64696f39f37e058/rm6373.pdf. August 21, 2019.

  30. Libin, P. and Verstraeten, T., Bayesian Best-Arm Identification for Selecting Influenza Mitigation Strategies, 2017. https://arxiv.org/pdf/1711.06299.pdf. Accessed November 18, 2019.

  31. Granmo, O.-C., The Tsetlin Machine, A Game Theoretic Bandit Driven Approach to Optimal Pattern Recognition with Propositional Logic, 2018. https://arxiv.org/pdf/1804.01508.pdf. Accessed September 3, 2019.

  32. Andersen, P.-A. and Granmo, O.-C., Implementation of the Tsetlin Machine. https://github.com/cair/ pyTsetlinMachine. Accessed September 15, 2019.

  33. The UNSW-NB15 Dataset Description. http://foxdata.fr/wp-content/uploads/2018/12/UNSW_NB15_features.pdf. Accessed June 28, 2019.

  34. Branitskii, A.A., Detection of abnormal network connections based on hybridization of computational intelligence methods. http://www.spiiras.nw.ru/dissovet/wp-content/uploads/2018/06/branitskiy_dissertation.pdf. Accessed September 15, 2019.

  35. Dussel, P. and Gehl, C., Cyber-Critical Infrastructure Protection Using Real-time Payload-based Anomaly Detection. http://hss.ulb.uni-bonn.de/2018/5133/5133.pdf. Accessed September 15, 2019.

Download references

Funding

The study was supported by the Russian President’s scholarship for young scientists and postgraduates, project no. SP-1932.2019.5.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to D. S. Lavrova.

Ethics declarations

The authors declare that they have no conflicts of interest.

Additional information

Translated by N. Semenova

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lavrova, D.S., Eliseev, N.N. Detection of Network Attacks Using the Tsetlin Machine. Aut. Control Comp. Sci. 54, 871–878 (2020). https://doi.org/10.3103/S0146411620080209

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411620080209

Keywords:

Navigation