WSEAS Transactions on Business and Economics


Print ISSN: 1109-9526
E-ISSN: 2224-2899

Volume 14, 2017

Notice: As of 2014 and for the forthcoming years, the publication frequency/periodicity of WSEAS Journals is adapted to the 'continuously updated' model. What this means is that instead of being separated into issues, new papers will be added on a continuous basis, allowing a more regular flow and shorter publication times. The papers will appear in reverse order, therefore the most recent one will be on top.


Volume 14, 2017


An Adequate Response to New Cyber Security Challenges through Artificial Intelligence Methods. Applications in Business and Economics

AUTHORS: Roumen Trifonov, Slavcho Manolov, Radoslav Yoshinov, Georgi Tsochev, Galya Pavlova

Download as PDF

ABSTRACT: According to the opinion of the leading experts in the field of Cyber Security over the last few years there has been a transition from the stage of Cyber Criminality to the stage of Cyber War. In order to respond adequately to the new challenges, the expert community has two main approaches: to adopt the philosophy and methods of Military Intelligence, and to use Artificial Intelligence methods for counteraction of Cyber Attacks in business and economics. The present paper describes some of the results obtained in the Faculty of Computer Systems and Technology at Technical University of Sofia in the implementation of project related to the application of intelligent methods for increasing the security in computer networks. These results are shown separately in the sphere of Tactical Cyber Threats Intelligence and Operational Cyber Threats Intelligence.

KEYWORDS: Cyber Security, Advanced Persistent Threats, Cyber Intelligence, Intelligent Agents, Echo State Networks, Network Gateway Monitoring System

REFERENCES:

[1] ENISA Threats Landscape Report 2016: 15 Top Cyber-Threats and Trends, January 2017

[2]

[2] Eric M. Hutchins, Michael J. Cloppert, Rohan M. Amin Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains Lockheed Martin Corporation 2015

[3] Republic of Bulgaria: National Cyber Security Strategy “Cyber Resilient Bulgaria 2020” 2016-03 NCSS Bulgaria final draft v 5 3

[4] Cyber Intelligence: Setting the Landscape for an emerging Discipline, Intelligence and National Security Alliance (INSA), 2011

[5] Operational Level of Cyber Intelligence, INSA, 2013

[6] Operational Cyber Intelligence, INSA, 2014

[7] Brian P. Kime Threat Intelligence: Planning and Direction, SANS Institute, 2015

[8] Advanced cyber-security intelligence, Quocirca, 2012

[9] Michael Luck, Peter McBurney, Christ Preist Agent Technology: Next Generation Computing, AgentLink II, January 2003

[10] S. D. Chi, J.S. Park, K.C. Jung and J.S. Lee Network Security Modeling and Cyber Attack Simulation Methodology, Lecture Notes in Computer Science, Vol. 2119, 2001

[11] V. Gorodetski, O. Karsayev, I. Kotenko, I. Khabalov Software Development Kit for MultiAgent System Design and Implementation, Lecture Notes in Artifical Intelligence, Vol. 2296, Springer Verlag, 2002

[12] Molesini, A., Omicini, A., and Viroli, M. Environment in agent-oriented software engineering methodologies, International Journal on Multiagent and Grid Systems, 2007

[13] G. Gai, L. Rui, H. Wu, X. Hu An Improved Collaborative Method for Recommendation and Rating Prediction, IEEE International Conference on Data Mining Workshop, 2014

[14] Jai Sundar Balasubramaniyan, Jose Omar Garcia-Fernandez.An Architecture for Intrusion Detection using Autonomous Agents, Purdue University West Lafayette, 2007

[15] Taraka D. Peddireddy Multiagent Network Security System using FIPA-OS, University of South Carolina, 2011

[16] D. Dasgupta, F. Gonzalez, K. Yallapu, J. Gomez, R. Yarramsettii CIDS: An agent-based intrusion detection system, The University of Memphis, 2014

[17] Trifonov R., Manolov S. Tsochev G. Application of multi-agent systems for network and information protection, 28th International Conference on Information Technologies (InfoTech 2014), Varna, Bulgaria

[18] Tsochev G, Trifonov R., Yoshinov R. Multiagent framework for intelligent networks, 29th International Conference on Information Technologies (Info-Tech 2015), Varna, Bulgaria

[19] Tsochev G, Trifonov R., Naydenov G. Agent Communication Languages Comparison, 7th International Scientific Conference COMPUTER SCIENCE’2015, Durres, Albania

[20] Tsochev G, Trifonov R., Popov G. A Security Model based on Multi-agent systems, 30th International Conference on Information Technologies (Info-Tech 2016), Varna, Bulgaria

[21] Liu Y., Sourina O. and Nguyen M. K. Realtime EEG-based human emotion recognition and visualization, Proceedings of the Int. Conf. on Cyberworlds (CW ’10), Singapore, 2010

[22] RFC 1757 Remote Network Monitoring Management Information Base, Carnegie Mellon University, February 1995

[23] L. Bozhkov, P. Georgieva Classification models of emotional biosignals evoked while viewing affective pictures, International Conference on Simulation and Modeling Methodologies, Technologies and Applications (SIMULTECH), Vienna, 2014

[24] Hammon P.S. and Sa V.R. de Preprocessing and meta-classification for brain-computer interfaces, IEEE Transactions on Biomedical Engineering, 54(3), 2007.

[25] Lukosevicius M. and Jaeger H. Reservoir computing approaches to recurrent neural network training, Computer Science Review, vol. 3, 2009

[26] Koprinkova-Hristova P., Bozhkov L. and Georgieva P. Echo State Networks for feature selection in affective computing 13th Int. Conf. on Practical Applications of Agents and MultiAgent Systems (PAAMS), Spain, 3-5 June 2015

[27] Guyon I. and Elisseeff A. An Introduction to Variable and Feature Selection, Journal of Machine Learning Research, vol. 3, 2003

[28] Ljubomir Lazic, Nikos Mastorakis 'Cost effective software test metrics ' in WSEAS Transactions on Computers, Volume 7, Issue 6, pp 599-619

[29] Ljubomir Lazic, Nikos Mastorakis, 'Orthogonal Array application for optimal combination of software defect detection techniques choices' in WSEAS Transactions on Computers, Volume 7, Issue 8, pp 1319- 1336

WSEAS Transactions on Business and Economics, ISSN / E-ISSN: 1109-9526 / 2224-2899, Volume 14, 2017, Art. #30, pp. 272-281


Copyright © 2017 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution License 4.0