Open Access Open Access  Restricted Access Subscription Access

A Bayesian Network Model for a Zimbabwean Cybersecurity System


Affiliations
1 Atlantic International University 900 Fort Street Mall 40 Honolulu, Hawaii 96813, United States
 

The purpose of this research was to develop a structure for a network intrusion detection and prevention system based on the Bayesian Network for use in Cybersecurity. The phenomenal growth in the use of internet-based technologies has resulted in complexities in cybersecurity subjecting organizations to cyberattacks. What is required is a network intrusion detection and prevention system based on the Bayesian Network structure for use in Cybersecurity. Bayesian Networks (BNs) are defined as graphical probabilistic models for multivariate analysis and are directed acyclic graphs that have an associated probability distribution function. The research determined the cybersecurity framework appropriate for a developing nation; evaluated network detection and prevention systems that use Artificial Intelligence paradigms such as finite automata, neural networks, genetic algorithms, fuzzy logic, support-vector machines or diverse data-mining-based approaches; analysed Bayesian Networks that can be represented as graphical models and are directional to represent cause-effect relationships; and developed a Bayesian Network model that can handle complexity in cybersecurity. The theoretical framework on Bayesian Networks was largely informed by the NIST Cybersecurity Framework, General deterrence theory, Game theory, Complexity theory and data mining techniques. The Pragmatism paradigm used in this research, as a philosophy is intricately related to the Mixed Method Research (MMR). A mixed method approach was used in this research, which is largely quantitative with the research design being a survey and an experiment, but supported by qualitative approaches where Focus Group discussions were held. The performance of Support Vector Machines, Artificial Neural Network, K-Nearest Neighbour, Naive-Bayes and Decision Tree Algorithms was discussed. Alternative improved solutions discussed include the use of machine learning algorithms specifically Artificial Neural Networks (ANN), Decision Tree C4.5, Random Forests and Support Vector Machines (SVM).

Keywords

Autonomous Robotic Vehicle, Artificial Neural Networks, Bayesian Network, Cybersecurity, Decision Tree C4.5, Fuzzy Logic, Machine Learning Methods, Random Forests and Support Vector Machines (Svm).
User
Notifications
Font Size

  • ALJEBREEN, M.J., (2018). Towards Intelligent Intr usion Detection Systems for Cloud Computing, Ph.D. Dissertation, Florida Institute of Technology, 2018.
  • ALANEZI, A.A., (2014). Development of an Orally Disintegrating Mini-Tablet (ODMTs) Containing Metoclopramide HCl to Enhance Patient Compliance, Master of Science Thesis, University of Toledo, 2014, http://rave.ohiolink.edu/etdc/view?acc_num=mco1417861431.
  • ALMUTAIRI, A., (2016). Improving intrusion detection systems using data mining techniques, Ph.D Thesis, Loughborough University, 2016.
  • BANDE S., (2018).Legislating against Cyber Crime in Southern African Development Community: Balancing International Standards with Country-Specific Specificities.International Journal of Cyber Criminology Volume 12 Issue 1 January-June 2018.
  • BOLZONI, D., (2009). Revisiting Anomaly-based Network Intrusion Detection Systems, Ph.D Thesis, University of Twente, The Netherlands, ISBN: 978-90-365-2853-5, ISSN: 1381-3617, DOI: 10.3990/1.9789036528535.
  • BRINGAS, P.B., and Santos, I., (2010). Bayesian Networks for Network Intrusion Detection, Bayesian Network, Ahmed Rebai (Ed.), ISBN: 978-953-307-124-4, InTech, Available from: http://www.intechopen.com/books/bayesian-network/bayesian-networks-for-network-intrusion-detection.
  • CHUKWUDI, L., Lopez R., Wager, T.D., Silvers, J.A., and Buhle, J.T., (2014), Cognitive Reappraisal of Emotion: A Meta-Analysis of Human Neuroimaging Studies, Cerebral Cortex, Volume 24, Issue 11, 1 November 2014, Pages 2981–2990, https://doi.org/10.1093/cercor/bht154 https://academic.oup.com/cercor/ article/24/11/2981/301871.
  • DEMIR, N., and Dalkilic, G., (2017). Modified stacking ensemble approach to detect network intrusion, Turkish Journal of Electrical Engineering & Computer Sciences, Accepted/ Published Online: 15.11.2017, http://journals.tubitak.gov.tr/elektrik/
  • International Telecommunication Union, (2009).Global Security Report.
  • Inter national Telecommunication Union, (2012). http://www.itu.int/net/pressoffice/press_releases/2012/70.aspx#.XI-UZoyxWfA
  • JABBARI, F., Visweswaran, S., and Cooper, G.F., (2018), Instance-Specific Bayesian Network Structure Learning, Proceedings of Machine Learning Research vol 72, 169-180, 2018, PGM 2018.
  • KABANDA, G., (2013). "African context for technological futures for digital learning and the endogenous growth of a knowledge economy", Basic Journal of Engineering Innovation (BRJENG), Volume 1(2), April 2013, pages 32-52, http://basicresearchjournals.org/engineering/PDF/Kabanda.pdf
  • KARIMPOUR, J., Lotfi, S., and Siahmarzkooh, A.T., (2016). Intrusion detection in network flows based on an optimized clustering criterion, Turkish Journal of Electrical Engineering & Computer Sciences, Accepted/Published Online: 17.07.2016, http://journals.tubitak.gov.tr/elektrik
  • KESSLER, G.C., (2019). An Overview of Cryptography. [Online]. Available from: https:// www.gar ykessler.net/librar y/cr ypto.html [Accessed: 30 April 2019].
  • KIVUNJA, C., and Kuyini, A.B., (2017). Understanding and Applying Research Paradigms in Educational Contexts, International Journal of Higher Education, Vol. 6, No. 5, September 2017, Published by Sciedu Press 26, ISSN 1927-6044, E-ISSN 1927-6052, http:// ijhe.sciedupress.com; doi:10.5430/ijhe.v6n5p26 URL: https://doi.org/10.5430/ijhe.v6n5p26.
  • KUMAR, R., (2011). Research Methodology: A step by step guide for beginners 3rd ed. London: Sage Publishers.
  • KYLILI, A., Fokaides, P.A., Ioannides, A., and Kalogirou, S., (2018). Environmental assessment of solar thermal systems for the industrial sector, Journal of Cleaner Production, 176, 99-109.
  • MADIGAN, D., (2008). Data Mining: An Overview, http://www.stat.columbia.edu/~madigan, retrieved on 6th April, 2019.
  • MOHAJAN, H.K., (2018). Qualitative Research Methodology in Social Sciences and Related Subjects. Journal of Economic Development, Environment and People.Volume 7 Issue 1, 2018 pp 23-48.
  • MORGAN, D.L., (2013). Pragmatism as a Paradigm for Social Research, Qualitative Inquiry, 201X, Vol XX(X) 1–9, © The Author(s) 2013, http://www. sagepub.com/journalsPermissions. nav, DOI: 10.1177/1077800413513733,
  • MULLER, P.L., (2015). Cybersecurity Capacity Building in Developing Countries. Opportunities and Challenges. Norwegian Institute of International Affairs.
  • MURUGAN, S., and Rajan, M.S., (2014). Detecting Anomaly IDS in Network using Bayesian Network, IOSR Journal of Computer Engineering (IOSR-JCE), e-ISSN: 2278-0661, p- ISSN: 2278-8727, Volume 16, Issue 1, Ver. III (Jan. 2014), PP 01-07, www.iosrjournals.org
  • National Institute of Standards and Technology, (2018). Framework for Improving Critical Infrastructure Cybersecurity Version 1.1.
  • NIELSEN, R. (2015). CS651 Computer Systems Security Foundations 3d Imagination Cyber Security Management Plan, Technical Report January 2015, Los Alamos National Laboratory, USA.
  • PETER, G.R., Ar tur, P., and Peter, H.F., (2005). "A Pragmatic Research Philosophy for Applied Sport Psychology", Ph.D Dissertation, Kinesiology, Spor t Studies and Physical Education Faculty Publications, 80, 2005, https://digitalcommons.brockport.edu/pes_facpub/80.
  • SAUNDERS, M.N.K., Thornhill, A., and Lewis, P., (2009). Research Methods for Business Students (5th Edition),Publisher: Pearson; ISBN-13: 978-0273716860, ISBN-10: 0273716867, https://www.amazon.com/Research-Methods-Business-Students-5th/dp/0273716867.
  • SCHIA, N.N., (2018), The cyber frontier and digital pitfalls in the Global South, Third World Quarterly,39:5, 821-837, DOI: 10.1080/01436597.2017.1408403, pages 821-837, https://www.tandfonline.com/doi/abs/10.1080/01436597.2017.1408403
  • SINGH, R., Ahlawat, M., and Shar ma, D., (2017). A Review on Radio over Fiber communication System, International Journal of Enhanced Research in Management & Computer Applications, ISSN: 2319-7471, Vol. 6, Issue 4, April-2017.
  • SMITHERMAN, S., (2014). Chaos and Complexity Theories: Creating Holes and Wholes in Curr iculum, The Chaos and Complexity Theories SIG at the AERA Annual Meeting, San Diego, CA, on Thursday, April 15, 2004.
  • STALLINGS, W., (2015). Operating System Stability. Accessed on 27th March, 2019. https:// www.unf.edu/public/cop4610/ree/Notes/PPT/PPT8E/CH15-OS8e.pdf.
  • THE Mauritius Cybercrime Strategy 2017-2019, (2017). http://certmu.govmu.org/English/Documents/Cybercrime%20Strategy/National%20Cybercrime%20Strategy-%20 August%202017.pdf.
  • UNITED Nations Economic Commission for Africa. (2014).Tackling the challenges of cybersecurity in Africa.
  • XIAO, L., (2016). Intrusion detection using probabilistic graphical models, PhD Dissertation, Iowa State University,
  • WU, L.Y., Li, S.L., and Gan, X.S., (2017). Network anomaly intrusion detection CVM model based on PLS feature extraction, Control and Decision, 32(4), 755-758.
  • WU, H., Wang, Z., and Wang, C., (2016). Study on the recognition method of airport perimeter intrusion incidents based on laser detection technology, Turkish Journal of Electrical Engineering & Computer Sciences,Accepted/ Published Online: 20.10.2016, http://journals.tubitak.gov.tr/elektrik.
  • WU, W., (2018). Ship communication network intrusion signal identification based on Hidden Markov model, In: Liu, Z.L. and Mi, C. (eds.), Advances in Sustainable Port and Ocean Engineering, Journal of Coastal Research, Special Issue No. 83, pp. 868–871. Coconut Creek (Florida), ISSN 0749-0208.
  • WU, S., Zhu, W., Li, H., Yu, I.T., Lin, S., Wang, X., and Yang, S., (2010). Quality of life and its influencing factors among medical professionals in China, International Archives of Occupational and Environmental Health, 83(7), 753-761.

Abstract Views: 320

PDF Views: 0




  • A Bayesian Network Model for a Zimbabwean Cybersecurity System

Abstract Views: 320  |  PDF Views: 0

Authors

Gabriel Kabanda
Atlantic International University 900 Fort Street Mall 40 Honolulu, Hawaii 96813, United States

Abstract


The purpose of this research was to develop a structure for a network intrusion detection and prevention system based on the Bayesian Network for use in Cybersecurity. The phenomenal growth in the use of internet-based technologies has resulted in complexities in cybersecurity subjecting organizations to cyberattacks. What is required is a network intrusion detection and prevention system based on the Bayesian Network structure for use in Cybersecurity. Bayesian Networks (BNs) are defined as graphical probabilistic models for multivariate analysis and are directed acyclic graphs that have an associated probability distribution function. The research determined the cybersecurity framework appropriate for a developing nation; evaluated network detection and prevention systems that use Artificial Intelligence paradigms such as finite automata, neural networks, genetic algorithms, fuzzy logic, support-vector machines or diverse data-mining-based approaches; analysed Bayesian Networks that can be represented as graphical models and are directional to represent cause-effect relationships; and developed a Bayesian Network model that can handle complexity in cybersecurity. The theoretical framework on Bayesian Networks was largely informed by the NIST Cybersecurity Framework, General deterrence theory, Game theory, Complexity theory and data mining techniques. The Pragmatism paradigm used in this research, as a philosophy is intricately related to the Mixed Method Research (MMR). A mixed method approach was used in this research, which is largely quantitative with the research design being a survey and an experiment, but supported by qualitative approaches where Focus Group discussions were held. The performance of Support Vector Machines, Artificial Neural Network, K-Nearest Neighbour, Naive-Bayes and Decision Tree Algorithms was discussed. Alternative improved solutions discussed include the use of machine learning algorithms specifically Artificial Neural Networks (ANN), Decision Tree C4.5, Random Forests and Support Vector Machines (SVM).

Keywords


Autonomous Robotic Vehicle, Artificial Neural Networks, Bayesian Network, Cybersecurity, Decision Tree C4.5, Fuzzy Logic, Machine Learning Methods, Random Forests and Support Vector Machines (Svm).

References