Open Access Open Access  Restricted Access Subscription or Fee Access

Intelligent Systems for Monitoring and Recognition of Cyber Attacks on Information and Communication Systems of Transport


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/irecos.v11i12.9108

Abstract


To improve the information security of transportation systems, it is necessary that co research is aimed at the further development of models for the recognition of cyber threats in information and communication environment of transport (ICET) and decision making with vaguely specified inputted information. It was offered a new approach of decision making for cyber security of critically important information systems and automated control systems of ground transportation. It was reviewed the ICET case of cyber defense based on fuzzy regression of logical inference mechanisms for decision support with fuzzy input data.
Copyright © 2016 Praise Worthy Prize - All rights reserved.

Keywords


Information and Communications Environment of Transport; Cyber Security; Information Protection; Identification of Threats

Full Text:

PDF


References


Transport Logistics. Shared solution to common challenges/ ODSE. (2002). 53 p.
http://dx.doi.org/10.1787/9789264171190-sum-es

Transportation & Logistics 2030. (2014). Vol. 4: Securing the supply. pp. 254–286.
http://dx.doi.org/10.1016/j.trpro.2016.12.088

Alcaraz, C., Zeadally, S. (2013). Critical Control System Protection in the 21st Century. Computer, vol. 46, 74–83.
http://dx.doi.org/10.1109/mc.2013.69

Korchenko O., Vasiliu Y., Gnatyuk S. (2010). Modern quantum technologies of information security against cyber-terrorist attacks. Aviation, 14 (2), p. 58–69.
http://dx.doi.org/10.3846/aviation.2010.10

John R. Vacca. Managing Information Security. Syngress. (2010). 320 pp.
http://dx.doi.org/10.1016/b978-0-12-416688-2.00020-9

Hassani, A., El Kalam, A.A., Bouhoula, A. Abassi, R. Ouahman, A.A. (2015). Integrity–OrBAC: a new model to preserve Critical Infrastructures integrity. International Journal of Information Security, Vol. 14, 367–385.
http://dx.doi.org/10.1007/s10207-014-0254-9

Transportation Security Administration (TSA), Pipeline Security Guidelines, April 2011, pp. 16-19, and Pipeline Security Smart Practice Observations, September 19, 2011, pp. 4-8.
http://dx.doi.org/10.1016/s1353-4858(11)70006-x

Lopez, M. Aguado, (2015). Cyber security analysis of the European train control system. Communications Magazine, IEEE, Vol. 53, Issue 10, pp. 110-116.
http://dx.doi.org/10.1109/mcom.2015.7295471

K. Sampigethaya, R. Poovendran, S. Shetty, T. Davis, C. Royalty (2011). Future e-enabled aircraft communications and security: The next 20 years and beyond, Proceedings of the IEEE, Vol. 99, Issue 11, pp. 2040-2055.
http://dx.doi.org/10.1109/jproc.2011.2162209

M. Theoharidou, M. Kandias, D. Gritzalis (2012). Securing Transportation-Critical Infrastructures: Trends and Perspectives. Chapter Global Security, Safety and Sustainability & e-Democracy Volume 99 of the series Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering pp. 171-178.
http://dx.doi.org/10.1007/978-3-642-33448-1_24

Hugh A. Boyes, (2014). Maritime Cyber Security – Securing the Digital Seaways, Engineering & Technology Reference, pp. 8.
http://dx.doi.org/10.1049/etr.2014.0009

R. Baskervillea, P. Spagnolettib, J. Kim (2014). Incident-centered information security: Managing a strategic balance between prevention and response, Information & Management, Volume 51, Issue 1, pp. 138–151.
http://dx.doi.org/10.1016/j.im.2013.11.004

A. V. Ostroukh, M. B. Polgun (2014). Automation of processes supervisory control urban passenger transport, International Journal of Advanced Studies, Vol. 3, No 3, pp. 3-9.
http://dx.doi.org/10.12731/2227-930x-2013-3-1

S. Standard, R. Greenlaw, A. Phillips, D. Stahl, J. Schultz (2013). Network reconnaissance, attack, and defense laboratories for an introductory cyber-security course, ACM Inroads, Vol. 4 Issue 3, pp. 52-64.
http://dx.doi.org/10.1145/2505990.2506002

V. J. Gurbani, and A. R. McGee. (2007). An early application of the Bell Labs Security framework to analyze vulnerabilities in the Internet telephony domain, Bell Labs Technical Journal - Information Technology/Network Security, Vol. 12, No. 3, pp. 7-19.
http://dx.doi.org/10.1002/bltj.20246

H. I. Liu, and K. C. Chang. (2011). Defending systems Against Tilt DDoS attacks, Telecommunication Systems, Services, and Applications (TSSA), pp. 22-27.
http://dx.doi.org/10.1109/tssa.2011.6095400

Jegede, A.J., Aimufua, G.I.O., Salami, H.O. (2007). Information Security Policy: Relevance, Creation and Enforcement. International Journal of Soft Computing, Vol. 2, 408–410.
http://dx.doi.org/ijscomp.2007.408.410

Abidar, R., Moummadi, K., Moutaouakkil, F., Medromi, H., Intelligent and Pervasive Supervising Platform for Information System Security Based on Multi-Agent Systems, (2015) International Review on Computers and Software (IRECOS), 10 (1), pp. 44-51.
http://dx.doi.org/10.15866/irecos.v10i1.4699

Manap, N., Basir, S., Hussein, S., Tehrani, P., Rouhani, A. (2013). Legal Issues of Data Protection in Cloud Computing. International Journal of Soft Computing, Vol. 8, 371–376.
http://dx.doi.org/10.3923/ijscomp.2013.371.376

George, J., Hemalatha, M., Improving Authentication and Authorization for Identity Based Cloud Environment Using OAUTH with Fuzzy Based Blowfish Algorithm, (2015) International Review on Computers and Software (IRECOS), 10 (7), pp. 783-788.
http://dx.doi.org/10.15866/irecos.v10i7.7062

He-Hua, L., Chun-Ling, W., Study of Network Access Control System Featuring Collaboratively Interacting Network Security Components, (2013) International Review on Computers and Software (IRECOS), 8 (2), pp. 527-532.

Kim, G. Kim, S. (2015). Applying Need Pull and Technology Push Theory to Organizational Information Security Management. International Business Management, Vol. 9, 524–531.
http://dx.doi.org/10.3923/ibm.2015.524.531

Shamshirband, S., Anuar, N.B., Kiah, M.L., Patel, A. (2013). An appraisal and design of a multiagent system based cooperative wireless intrusion detection computational intelligence technique. Engineering Applications of Artificial Intelligence, Vol. 26, pp. 2105–2127.
http://dx.doi.org/10.1016/j.engappai.2013.04.010

Dilek, S., Çakır, H., Aydın, M. (2015). Applications of artificial intelligence techniques to combating cyber crimes: A review. International Journal of Artificial Intelligence & Applications, Vol. 6, pp. 21–39.
http://dx.doi.org/10.5121/ijaia.2015.6102

Patel, A., Taghavi, M., Bakhtiyari, K., Celestino Junior, J. (2013). An intrusion detection and prevention system in cloud computing: A systematic review. Journal of Network and Computer Applications, Vol. 36, pp. 25–41.
http://dx.doi.org/10.1016/j.jnca.2012.08.007

Barman, D.K., Khataniar, G. (2012). Design of Intrusion Detection System Based On Artificial Neural Network and Application of Rough Set. International Journal of Computer Science and Communication Networks, Vol. 2, pp. 548-552. ISSN: 2249–5789.
http://dx.doi.org/10.4018/9781591409021.ch015

Jamal Raiyn. (2014). A survey of Cyber Attack Detection Strategies. International Journal of Security and Its Applications, Vol.8, pp. 247–256.
http://dx.doi.org/10.14257/ijsia.2014.8.1.23

Al-Sarayreh, K., Hasan, L., Almakadmeh, K., A Trade-Off Model of Software Requirements for Balancing Between Security and Usability Issues, (2015) International Review on Computers and Software (IRECOS), 10 (12), pp. 1157-1168.
http://dx.doi.org/10.15866/irecos.v10i12.8094

Wainakh, A., Wabbi, A., Alkhatib, B., Design and Develop Misconfiguration Vulnerabilities Scanner for Web Applications, (2014) International Review on Computers and Software (IRECOS), 9 (10), pp. 1682-1691.
http://dx.doi.org/10.15866/irecos.v9i10.3840

Search CVE and CCE Vulnerability Database - http://cve.mitre.org/about/index.html

2015 Cyber Attacks Statistics (2016). Available at:http://www.hackmageddon.com/2016/01/11/2015-cyber-attacks-statistics/

V. Lahno, 2014, Ensuring of information processes’ reliability and security in critical application data processing systems. MEST Journal, Vol. 2, pp. 71–79.
http://dx.doi.org/10.12709/mest.02.02.01.07

Nazura Abdul Manap, Salawati Mat Basir, Safinaz Mohd Hussein, Pardis Moslemzadeh Tehrani and Abdolhamid Rouhani, 2013. Legal Issues of Data Protection in Cloud Computing. International Journal of Soft Computing, Vol. 8, pp. 371-376.
http://dx.doi.org/10.1016/j.clsr.2013.07.009

Jae-Pyo Park, Jong-Hee Lee and Keun-Wang Lee, 2005. A Digital Right Management System Using Shared Key Pool for Multimedia Data Protection. Asian Journal of Information Technology, Vol. 4, Is. 4, pp. 742-750.
http://dx.doi.org/10.1007/11538356_83

Rony Hasinur Rahman, Nusrat Nowsheen, Mahbubul Azam Khan and Asif Hossain Khan, 2007. Wireless Lan Security: An In-Depth Study of the Threats and Vulnerabilities. Asian Journal of Information Technology, Vol. 6, Is. 4, pp. 441-446.
http://dx.doi.org/10.4018/ijisp.2014010101

Abidar, R., Moummadi, K., Moutaouakkil, F., Medromi, H., Intelligent and Pervasive Supervising Platform for Information System Security Based on Multi-Agent Systems, (2015) International Review on Computers and Software (IRECOS), 10 (1), pp. 44-51.
http://dx.doi.org/10.15866/irecos.v10i1.4699

Enshaei, M., Mohd Hanapi, Z., Othman, M., A Review: Mobile Ad Hoc Networks Challenges, Attacks, Security, Vulnerability and Routing Protocols, (2014) International Journal on Communications Antenna and Propagation (IRECAP), 4 (5), pp. 168-179.
http://dx.doi.org/10.15866/irecap.v4i5.3001

Geetha, R., Kannan, E., Secure Communication Against Framing Attack in Wireless Sensor Network, (2015) International Review on Computers and Software (IRECOS), 10 (4), pp. 393-398.
http://dx.doi.org/10.15866/irecos.v10i4.5520

Li He-Hua, Wu Chun-Ling, Study of Network Access Control System Featuring Collaboratively Interacting Network Security Components, (2013) International Review on Computers and Software (IRECOS), 8 (2), pp. 527-532.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize