Design of an intelligent module for detecting signs of information security threats and the emergence of unreliable data

Authors

DOI:

https://doi.org/10.15587/1729-4061.2024.317000

Keywords:

information-computer system, automated modeling, control, artificial intelligence, flexible production system

Abstract

At the stage of production preparation, there is an urgent need for an automated system that would timely detect signs of threats to information security and the emergence of unreliable data. To solve this problem, an intelligent module capable of detecting such threats and unreliable and/or anomalous data has been designed. The proposed intelligent module is the state-of-art, original, and effective toolkit. It can be recommended for practical use as part of the well-known information and computer system for automated modeling of the system of automatic orientation of production objects at the stage of technological preparation of machine and instrument-building production. Its application makes it possible to increase information security and reliability of important production data at the stage of technological preparation of production, in particular, when modeling systems for automatic orientation of production objects. In addition, the use of the proposed intelligent module makes it possible to obtain a number of important social and economic effects. Some of these effects are manifested in the prevention or reduction of material, intellectual and time costs for saving and restoring information, etc.

Automated analysis of important production data regarding their reliability and abnormality is carried out by machine learning methods using a specially designed advanced variational autoencoder based on classification algorithms and using wavelet transformation.

The designed intelligent module for detecting signs of a threat to information security and the emergence of unreliable and/or anomalous data works in real time with a high accuracy of 97.53 %. It meets the requirements of modern production

Author Biographies

Irina Cherepanska, National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”

Doctor of Technical Sciences, Professor

Department of Automation and Non-Destructive Testing Systems

Artem Sazonov, National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”

PhD, Associate Professor

Department of Automation Hardware and Software

Yuriy Kyrychuk, National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute

Doctor of Technical Sciences, Associate Professor

Department of Automation and Non-Destructive Testing Systems

Petro Melnychuk, Zhytomyr Polytechnic State University

Doctor of Technical Sciences, Professor

Department of Manufacturing Engineering

Dmytro Melnychuk, Zhytomyr Polytechnic State University

Doctor of Economic Sciences, Professor

Department of Psychology and Social Welfare

Nataliia Nazarenko, National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”

PhD, Senior Lecturer

Department of Automation and Non-Destructive Testing Systems

Volodymyr Pryadko, Polissia National University

Department of Electrification, Production Automation and Engineering Ecology

Serhii Bakhman, Zhytomyr Polytechnic State University

PhD Student

Department of Manufacturing Engineering

Davyd Khraban, Zhytomyr Polytechnic State University

PhD Student

Department of Manufacturing Engineering

References

  1. Cherepanska, I., Sazonov, A., Melnychuk, P., Melnychuk, D., Kalchuk, S., Pryadko, V., Yanovsky, V. (2024). Design of an information-computer system for the automated modeling of systems for automatic orientation of production objects in the machine and instrument industries. Eastern-European Journal of Enterprise Technologies, 3 (2 (129)), 6–19. https://doi.org/10.15587/1729-4061.2024.306516
  2. Gao, Y., Yin, X., He, Z., Wang, X. (2023). A deep learning process anomaly detection approach with representative latent features for low discriminative and insufficient abnormal data. Computers & Industrial Engineering, 176, 108936. https://doi.org/10.1016/j.cie.2022.108936
  3. Aschepkov, V. (2024). The use of the Isolation Forest model for anomaly detection in measurement data. Innovative technologies and scientific solutions for industries, 1 (27), 236–245. https://doi.org/10.30837/itssi.2024.27.236
  4. Vos, K., Peng, Z., Jenkins, C., Shahriar, M. R., Borghesani, P., Wang, W. (2022). Vibration-based anomaly detection using LSTM/SVM approaches. Mechanical Systems and Signal Processing, 169, 108752. https://doi.org/10.1016/j.ymssp.2021.108752
  5. Huang, X., Wen, G., Dong, S., Zhou, H., Lei, Z., Zhang, Z., Chen, X. (2021). Memory Residual Regression Autoencoder for Bearing Fault Detection. IEEE Transactions on Instrumentation and Measurement, 70, 1–12. https://doi.org/10.1109/tim.2021.3072131
  6. Panza, M. A., Pota, M., Esposito, M. (2023). Anomaly Detection Methods for Industrial Applications: A Comparative Study. Electronics, 12 (18), 3971. https://doi.org/10.3390/electronics12183971
  7. Mokhtari, S., Abbaspour, A., Yen, K. K., Sargolzaei, A. (2021). A Machine Learning Approach for Anomaly Detection in Industrial Control Systems Based on Measurement Data. Electronics, 10 (4), 407. https://doi.org/10.3390/electronics10040407
  8. Zipfel, J., Verworner, F., Fischer, M., Wieland, U., Kraus, M., Zschech, P. (2023). Anomaly detection for industrial quality assurance: A comparative evaluation of unsupervised deep learning models. Computers & Industrial Engineering, 177, 109045. https://doi.org/10.1016/j.cie.2023.109045
  9. Jaramillo-Alcazar, A., Govea, J., Villegas-Ch, W. (2023). Anomaly Detection in a Smart Industrial Machinery Plant Using IoT and Machine Learning. Sensors, 23 (19), 8286. https://doi.org/10.3390/s23198286
  10. Tang, M., Chen, W., Yang, W. (2022). Anomaly detection of industrial state quantity time-Series data based on correlation and long short-term memory. Connection Science, 34 (1), 2048–2065. https://doi.org/10.1080/09540091.2022.2092594
  11. Evangelou, M., Adams, N. M. (2020). An anomaly detection framework for cyber-security data. Computers & Security, 97, 101941. https://doi.org/10.1016/j.cose.2020.101941
  12. Ameer, S., Gupta, M., Bhatt, S., Sandhu, R. (2022). BlueSky. Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies, 235–244. https://doi.org/10.1145/3532105.3535020
  13. Szymanski, T. H. (2022). The “Cyber Security via Determinism” Paradigm for a Quantum Safe Zero Trust Deterministic Internet of Things (IoT). IEEE Access, 10, 45893–45930. https://doi.org/10.1109/access.2022.3169137
  14. Liu, R., Shi, J., Chen, X., Lu, C. (2024). Network anomaly detection and security defense technology based on machine learning: A review. Computers and Electrical Engineering, 119, 109581. https://doi.org/10.1016/j.compeleceng.2024.109581
  15. Das, T. K., Adepu, S., Zhou, J. (2020). Anomaly detection in Industrial Control Systems using Logical Analysis of Data. Computers & Security, 96, 101935. https://doi.org/10.1016/j.cose.2020.101935
  16. Patel, P., Deshpande, V. (2017). Application Of Plan-Do-Check-Act Cycle For Quality And Productivity Improvement-A Review. International Journal for Research in Applied Science & Engineering Technology, 5 (1), 197–201. Available at: https://www.researchgate.net/publication/318743952_Application_Of_Plan-Do-Check-Act_Cycle_For_Quality_And_Productivity_Improvement-A_Review
  17. Molodetska-Hrynchuk, K. (2017). The model of decision making support system for detection and assessment of the state information security threat of social networking services. Ukrainian Scientific Journal of Information Security, 23 (2). https://doi.org/10.18372/2225-5036.23.11803
  18. Gong, X., Yu, S., Xu, J., Qiao, A., Han, H. (2023). The effect of PDCA cycle strategy on pupils’ tangible programming skills and reflective thinking. Education and Information Technologies, 29 (5), 6383–6405. https://doi.org/10.1007/s10639-023-12037-4
  19. Cherepanska, I., Sazonov, A., Melnychuk, D., Melnychuk, P., Khazanovych, Y. (2023). Quaternion Model of Workpieces Orienting Movements in Manufacturing Engineering and Tool Production. Lecture Notes in Mechanical Engineering, 127–135. https://doi.org/10.1007/978-3-031-42778-7_12
  20. Voronin, A. N. (2009). Nelineynaya skhema kompromissov v mnogokriterial'nyh zadachah otsenivaniya i optimizatsii. Kibernetika i sistemniy analiz, 45 (4), 106–114. Available at: http://nbuv.gov.ua/UJRN/KSA_2009_45_4_10
  21. Nykolyuk, O. M., Martynchuk, V. (2018). A Methodology for Assessing Resource Potential of Innovation-Oriented Agricultural Enterprises. Problemy Ekonomiky, 1 (35), 207–213. Available at: https://www.proquest.com/openview/1716ad4663e51395c99da80118e1204e/1?pq-origsite=gscholar&cbl=2048964
Design of an intelligent module for detecting signs of information security threats and the emergence of unreliable data

Downloads

Published

2024-12-25

How to Cite

Cherepanska, I., Sazonov, A., Kyrychuk, Y., Melnychuk, P., Melnychuk, D., Nazarenko, N., Pryadko, V., Bakhman, S., & Khraban, D. (2024). Design of an intelligent module for detecting signs of information security threats and the emergence of unreliable data. Eastern-European Journal of Enterprise Technologies, 6(2 (132), 49–63. https://doi.org/10.15587/1729-4061.2024.317000