Design of an intelligent module for detecting signs of information security threats and the emergence of unreliable data
DOI:
https://doi.org/10.15587/1729-4061.2024.317000Keywords:
information-computer system, automated modeling, control, artificial intelligence, flexible production systemAbstract
At the stage of production preparation, there is an urgent need for an automated system that would timely detect signs of threats to information security and the emergence of unreliable data. To solve this problem, an intelligent module capable of detecting such threats and unreliable and/or anomalous data has been designed. The proposed intelligent module is the state-of-art, original, and effective toolkit. It can be recommended for practical use as part of the well-known information and computer system for automated modeling of the system of automatic orientation of production objects at the stage of technological preparation of machine and instrument-building production. Its application makes it possible to increase information security and reliability of important production data at the stage of technological preparation of production, in particular, when modeling systems for automatic orientation of production objects. In addition, the use of the proposed intelligent module makes it possible to obtain a number of important social and economic effects. Some of these effects are manifested in the prevention or reduction of material, intellectual and time costs for saving and restoring information, etc.
Automated analysis of important production data regarding their reliability and abnormality is carried out by machine learning methods using a specially designed advanced variational autoencoder based on classification algorithms and using wavelet transformation.
The designed intelligent module for detecting signs of a threat to information security and the emergence of unreliable and/or anomalous data works in real time with a high accuracy of 97.53 %. It meets the requirements of modern production
References
- Cherepanska, I., Sazonov, A., Melnychuk, P., Melnychuk, D., Kalchuk, S., Pryadko, V., Yanovsky, V. (2024). Design of an information-computer system for the automated modeling of systems for automatic orientation of production objects in the machine and instrument industries. Eastern-European Journal of Enterprise Technologies, 3 (2 (129)), 6–19. https://doi.org/10.15587/1729-4061.2024.306516
- Gao, Y., Yin, X., He, Z., Wang, X. (2023). A deep learning process anomaly detection approach with representative latent features for low discriminative and insufficient abnormal data. Computers & Industrial Engineering, 176, 108936. https://doi.org/10.1016/j.cie.2022.108936
- Aschepkov, V. (2024). The use of the Isolation Forest model for anomaly detection in measurement data. Innovative technologies and scientific solutions for industries, 1 (27), 236–245. https://doi.org/10.30837/itssi.2024.27.236
- Vos, K., Peng, Z., Jenkins, C., Shahriar, M. R., Borghesani, P., Wang, W. (2022). Vibration-based anomaly detection using LSTM/SVM approaches. Mechanical Systems and Signal Processing, 169, 108752. https://doi.org/10.1016/j.ymssp.2021.108752
- Huang, X., Wen, G., Dong, S., Zhou, H., Lei, Z., Zhang, Z., Chen, X. (2021). Memory Residual Regression Autoencoder for Bearing Fault Detection. IEEE Transactions on Instrumentation and Measurement, 70, 1–12. https://doi.org/10.1109/tim.2021.3072131
- Panza, M. A., Pota, M., Esposito, M. (2023). Anomaly Detection Methods for Industrial Applications: A Comparative Study. Electronics, 12 (18), 3971. https://doi.org/10.3390/electronics12183971
- Mokhtari, S., Abbaspour, A., Yen, K. K., Sargolzaei, A. (2021). A Machine Learning Approach for Anomaly Detection in Industrial Control Systems Based on Measurement Data. Electronics, 10 (4), 407. https://doi.org/10.3390/electronics10040407
- Zipfel, J., Verworner, F., Fischer, M., Wieland, U., Kraus, M., Zschech, P. (2023). Anomaly detection for industrial quality assurance: A comparative evaluation of unsupervised deep learning models. Computers & Industrial Engineering, 177, 109045. https://doi.org/10.1016/j.cie.2023.109045
- Jaramillo-Alcazar, A., Govea, J., Villegas-Ch, W. (2023). Anomaly Detection in a Smart Industrial Machinery Plant Using IoT and Machine Learning. Sensors, 23 (19), 8286. https://doi.org/10.3390/s23198286
- Tang, M., Chen, W., Yang, W. (2022). Anomaly detection of industrial state quantity time-Series data based on correlation and long short-term memory. Connection Science, 34 (1), 2048–2065. https://doi.org/10.1080/09540091.2022.2092594
- Evangelou, M., Adams, N. M. (2020). An anomaly detection framework for cyber-security data. Computers & Security, 97, 101941. https://doi.org/10.1016/j.cose.2020.101941
- Ameer, S., Gupta, M., Bhatt, S., Sandhu, R. (2022). BlueSky. Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies, 235–244. https://doi.org/10.1145/3532105.3535020
- Szymanski, T. H. (2022). The “Cyber Security via Determinism” Paradigm for a Quantum Safe Zero Trust Deterministic Internet of Things (IoT). IEEE Access, 10, 45893–45930. https://doi.org/10.1109/access.2022.3169137
- Liu, R., Shi, J., Chen, X., Lu, C. (2024). Network anomaly detection and security defense technology based on machine learning: A review. Computers and Electrical Engineering, 119, 109581. https://doi.org/10.1016/j.compeleceng.2024.109581
- Das, T. K., Adepu, S., Zhou, J. (2020). Anomaly detection in Industrial Control Systems using Logical Analysis of Data. Computers & Security, 96, 101935. https://doi.org/10.1016/j.cose.2020.101935
- Patel, P., Deshpande, V. (2017). Application Of Plan-Do-Check-Act Cycle For Quality And Productivity Improvement-A Review. International Journal for Research in Applied Science & Engineering Technology, 5 (1), 197–201. Available at: https://www.researchgate.net/publication/318743952_Application_Of_Plan-Do-Check-Act_Cycle_For_Quality_And_Productivity_Improvement-A_Review
- Molodetska-Hrynchuk, K. (2017). The model of decision making support system for detection and assessment of the state information security threat of social networking services. Ukrainian Scientific Journal of Information Security, 23 (2). https://doi.org/10.18372/2225-5036.23.11803
- Gong, X., Yu, S., Xu, J., Qiao, A., Han, H. (2023). The effect of PDCA cycle strategy on pupils’ tangible programming skills and reflective thinking. Education and Information Technologies, 29 (5), 6383–6405. https://doi.org/10.1007/s10639-023-12037-4
- Cherepanska, I., Sazonov, A., Melnychuk, D., Melnychuk, P., Khazanovych, Y. (2023). Quaternion Model of Workpieces Orienting Movements in Manufacturing Engineering and Tool Production. Lecture Notes in Mechanical Engineering, 127–135. https://doi.org/10.1007/978-3-031-42778-7_12
- Voronin, A. N. (2009). Nelineynaya skhema kompromissov v mnogokriterial'nyh zadachah otsenivaniya i optimizatsii. Kibernetika i sistemniy analiz, 45 (4), 106–114. Available at: http://nbuv.gov.ua/UJRN/KSA_2009_45_4_10
- Nykolyuk, O. M., Martynchuk, V. (2018). A Methodology for Assessing Resource Potential of Innovation-Oriented Agricultural Enterprises. Problemy Ekonomiky, 1 (35), 207–213. Available at: https://www.proquest.com/openview/1716ad4663e51395c99da80118e1204e/1?pq-origsite=gscholar&cbl=2048964
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Irina Cherepanska, Artem Sazonov, Yuriy Kyrychuk, Petro Melnychuk, Dmytro Melnychuk, Nataliia Nazarenko, Volodymyr Pryadko, Serhii Bakhman, Davyd Khraban
This work is licensed under a Creative Commons Attribution 4.0 International License.
The consolidation and conditions for the transfer of copyright (identification of authorship) is carried out in the License Agreement. In particular, the authors reserve the right to the authorship of their manuscript and transfer the first publication of this work to the journal under the terms of the Creative Commons CC BY license. At the same time, they have the right to conclude on their own additional agreements concerning the non-exclusive distribution of the work in the form in which it was published by this journal, but provided that the link to the first publication of the article in this journal is preserved.
A license agreement is a document in which the author warrants that he/she owns all copyright for the work (manuscript, article, etc.).
The authors, signing the License Agreement with TECHNOLOGY CENTER PC, have all rights to the further use of their work, provided that they link to our edition in which the work was published.
According to the terms of the License Agreement, the Publisher TECHNOLOGY CENTER PC does not take away your copyrights and receives permission from the authors to use and dissemination of the publication through the world's scientific resources (own electronic resources, scientometric databases, repositories, libraries, etc.).
In the absence of a signed License Agreement or in the absence of this agreement of identifiers allowing to identify the identity of the author, the editors have no right to work with the manuscript.
It is important to remember that there is another type of agreement between authors and publishers – when copyright is transferred from the authors to the publisher. In this case, the authors lose ownership of their work and may not use it in any way.