Modern scientific problems of cyber security

Authors

DOI:

https://doi.org/10.15407/visn2023.02.012

Keywords:

cyber security, cyber attack, algebraic modeling, code vulnerabilities, insertion modeling, formal verification, fuzzy testing, neural networks, machine learning, algebra of behaviors

Abstract

The article contains an overview of modern problems in cyber security and analyzes the role of scientific research in solving them. In particular, two types of research are distinguished - with the use of an algebraic approach and with the use of neural networks, which belongs to the methods of Artificial Intelligence. Algebraic methods are based on usage of automatic theorem proving and solver programs. These studies are conducted to solve two main problems of cyber security. The first problem concerns the detection of vulnerabilities in software and hardware systems and the assessment of their resistance to intrusions. The second problem is the detection of malicious intrusions in real time. The results of research that help create reliable protection against cyberattacks, which is important in modern circumstances for the protection of systems of critical infrastructure objects, are highlighted.

Cite this article:
Letychevskyi O.О. Modern scientific problems of cyber security. Visn. Nac. Akad. Nauk Ukr. 2023. (2): 12—20. https://doi.org/10.15407/visn2023.02.012

References

Khraisat A., Gonda I., Vamplew P., Kamruzzaman J. Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecur. 2019. 2: 20. https://doi.org/10.1186/s42400-019-0038-7

Meiners C.R., Patel J., Norige E., Torng E., Liu A.X. Fast regular expression matching using small TCAMs for network intrusion detection and prevention systems. In: USENIX Security'10: Proc. 19th USENIX Conf. on Security. Washington, DC, 2010.

Lin C., Lin Y.-D., Lai Y.-C. A hybrid algorithm of backward hashing and automaton tracking for virus scanning. IEEE Trans. Comput. 2011. 60(4): 594—601. https://doi.org/10.1109/TC.2010.95

Walkinshaw N., Taylor R., Derrick J. Inferring extended finite state machine models from software executions. Empirical Software Engineering. 2016. 21(3): 811—853. https://doi.org/10.1007/s10664-015-9367-7

Studnia I., Alata E., Nicomette V., Kaâniche M., Laarouchi Y. A language-based intrusion detection approach for automotive embedded networks. Int. J. Embed Syst. 2018. 10(1): 1—12. https://doi.org/10.1504/IJES.2018.089430

Le T.H.M., Chen H., Ali Babar M. A Survey on Data-driven Software Vulnerability Assessment and Prioritization. ACM Computing Surveys. 2023. 55(5): 1—39. https://doi.org/10.1145/3529757

Shen Z., Chen S. A Survey of Automatic Software Vulnerability Detection, Program Repair, and Defect Prediction Techniques. Security and Communication Networks. 2020. 2020: 8858010. https://doi.org/10.1155/2020/8858010

Cyber Grand Challenge. DARPA. https://www.darpa.mil/program/cyber-grand-challenge

Godefroid P., Levin M.Y., Molnar D. SAGE: Whitebox Fuzzing for Security Testing. Queue. 2012. 10(1): 20—27. https://doi.org/10.1145/2090147.2094081

American Fuzzy Lop. https://lcamtuf.coredump.cx/afl/

Kapitonova J., Letichevsky A. Algebraic programming in the APS system. In: ISSAC 90: Proc. Int. Symp. on Symbolic and Algebraic Computation. ACM, New York, 1990. P. 68—75. https://doi.org/10.1145/96877.96896

Gilbert D., Letichevsky A. A model for interaction of agents and environments. In: Bert D., Choppy C. (eds). Recent Trends in Algebraic Development Techniques. LNCS 1827. Cham, Switzerland: Springer-Verlag, 1999. P. 311—328. https://doi.org/10.1007/978-3-540-44616-3_18

Letichevsky A., Letychevskyi O., Peschanenko V., Weigert T. Insertion modeling and symbolic verification of large systems. In: Fischer J., Scheidgen M., Schieferdecker I., Reed R. (eds). SDL 2015: Model-Driven Engineering for Smart Cities. Cham, Switzerland: Springer International Publishing, 2015. P. 3—18. https://doi.org/10.1007/978-3-319-24912-4_1

Letichevsky A. Algebra of behavior transformations and its applications. In: Kudryavtsev V.B., Rosenberg I.G. (eds). Structural Theory of Automata, Semigroups, and Universal Algebra. NATO Science Series II. Mathematics, Physics and Chemistry. Vol. 207. Springer, 2005. P. 241—272. https://doi.org/10.1007/1-4020-3817-8_10

Letychevskyi O. Two-level algebraic method for detection of vulnerabilities in binary code. In: 10th IEEE Int. Conf. on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2019. https://doi.org/10.1109/IDAACS.2019.8924255

Z3 decision procedure. https://github.com/Z3Prover/z3

Pulapaka H. Windows sandbox. Windows OS Platform Blog. https://techcommunity.microsoft.com/t5/windows-kernel-internals-blog/windows-sandbox/ba-p/301849

Horbatyuk V.O., Horbatyuk S.O. Methods for Checking the Resistance to http Attacks on a Smart Home by Algebraic Comparison. Control Systems and Computers. 2022. (4): 13—23. https://doi.org/10.15407/csc.2022.04.013

Letychevskyi O.O., Peschanenko V.S., Hryniuk Y.V. Fuzz Testing Technique and its Use in Cybersecurity Tasks. Cybernetics and Systems Analysis. 2022. 58(1): 157—163. https://doi.org/10.1007/s10559-022-00445-2

Published

2023-02-20