Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Article type: Research Article
Authors: de Campos Souza, Paulo Vitora; b; *; ** | Rezende, Thiago Silvab | Guimaraes, Augusto Juniob | Araujo, Vanessa Souzab | Batista, Lucas Oliveirab | da Silva, Gabriel Adrianob | Silva Araujo, Vinicius Jonathanb
Affiliations: [a] Federal Center for Technological Education of Minas Gerais, CEFET-MG, Av. Amazonas, 5.253, Nova Suica, Belo Horizonte. zip code 30.421-169, Minas Gerais, Brazil | [b] Una Faculty, Av. Gov. Valadares, 640 - Center, Betim - MG, zip code: 32510-010, Brazil
Correspondence: [*] Corresponding author. Paulo Vitor de Campos Souza, E-mail: goldenpaul@informatica.esp.ufmg.br.
Abstract: The growth of the computerization of processes and services has changed human relations and, as a consequence, have created new forms of attacks and frauds for users of digital equipment. Because many people use computers, smartphones, and e-mail to perform day-to-day tasks, various data traffic is susceptible to attack. This can undermine the competitiveness of a company that may have breached strategic information. Therefore, security and information management are fundamental factors for companies to keep due control and management of their business knowledge. Cyber attacks are represented by a growing worldwide scale of secrecy breach of relevant information and are characterized as one of the significant challenges of the contemporary world. This article aims to propose a computational system based on intelligent hybrid models, which through fuzzy rules allows the construction of expert systems in attacks on cybernetic data of diverse natures. The tests were carried out with real bases of attacks on the database of governmental computerized devices. The model proposed in this paper uses fuzzy evolving data grouping concepts. The extreme learning machine performs the training and the logical neurons of the unineuron type are responsible for creating fuzzy rules capable of transforming the knowledge acquired by the model into a database for employee training in companies, construction of other computer systems and awareness of elements which may harm the integrity of the data of individuals and companies. The novelty of the intelligent technique presented in the paper is that the nature of cyber attacks defines the structure of the model because the techniques of fuzzification and regularization are based entirely on the complexity of the cybernetic invasions. The binary pattern classification tests confronted with traditional models of the literature prove that the proposal of this paper can maintain the accuracy of detection of cyber attacks and still manages to construct a set of rules that serve as knowledge for the companies that wish to protect their information from attacks devices.
Keywords: Evolving fuzzy neural network, cyber attack, cyber protection, knowledge management
DOI: 10.3233/JIFS-190229
Journal: Journal of Intelligent & Fuzzy Systems, vol. 36, no. 6, pp. 6743-6763, 2019
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl