An Automated Cyber Intrusion Prediction Model Using Deep Learning to Resilient in Cyber Threat for the Royal Thai Air Force

Main Article Content

Somboon Udnan
Prasong Praneetplograng
Payap Sirinam

Abstract

The Royal Thai Air Force was one of the nation’s Critical Information Infrastructure (CII) Organizations and has a record of cyber intrusions continue throughout the year. Therefore, researchers presented a new automated cyber intrusion prediction model using deep learning to resilient in cyber threat for the Royal Thai Air Force. It was an extension of the Looking Back Algorithm to increase the accuracy of the  predictive model. In order to predict the future of the Air Force’s cyber threat patterns, researchers used cyber intrusion datasets from the Air Force that ranging from January 2021 to December 2021 with a total of 241,148 entries. We applied techniques such as RNN, LSTM, GRU, Bi-LSTM Deep Learning (DL). We developed the new cyber intrusion prediction model with name Bi-LSTM Looking Back Risk: Bi-LSTM-LBR.  However, the developed model had high accurate result on test dataset that compared to other predictive models. In addition, prediction results had a Mean Absolute Error (MAE) was 0.038, a Mean Square Error (MSE) was 0.010 and a Root Mean Square Error (RMSE) was at 0.102.

Article Details

Section
บทความวิจัย

References

K. Shaukat et al. "A Survey on Machine Learning Techniques for Cyber Security in the Last Decade." IEEE Access, Vol. 8, pp. 222310-222354, 2020.

C. Liu et al. "A Hybrid Intrusion Detection System Based on Scalable K-Means+ Random Forest and Deep Learning." IEEE Access, Vol. 9, pp. 75729-75740, 2021.

R. Ali et al. "Deep Learning Methods for Malware and Intrusion Detection: A Systematic Literature Review." Security and Communication Networks, Vol. 2022, pp. 1-31, 2022.

M. Husak et al. "Survey of Attack Projection, Prediction, and Forecasting in Cyber Security." IEEE Communications Surveys & Tutorials, Vol. 21, No. 1, pp. 640-660, 2019.

Z. Li, D. Zou, J. Tang, Z. Zhang, M. Sun, and H. Jin. "A Comparative Study of Deep Learning-Based Vulnerability Detection System." IEEE Access, Vol. 7, pp. 103184-103197, 2019.

K. Pranomkorn et al. "Development of a Model and Forecasting of Hourly UV Index Using Artificial Neural Network (ANN) at Songkhla." RMUTP Research Journal, Vol. 15, No. 2, pp. 81-82, July-December, 2021.

R. Angela and Borisova. "NEURAL NETWORK FOR CYBERSECURITY." Proceedings of International Scientific Conference-Defense Technologies DefTech 2023, Bulgaria, pp. 513-514, 2024.

I. R. Widiasari, L. E. Nugroho, and Widyawan. "Deep Learning Multilayer Perceptron (MLP) for Flood Prediction Model Using Wireless Sensor Network Based Hydrology Time Series Data Mining." International Conference on Innovative and Creative Information Technology, Indonesia, pp. 1-2, 2017.

Wei, Yuanyuan et al. "Ae-mlp: A hybrid deep learning approach for ddos detection and classification." IEEE Access, Vol. 9, pp. 146810-146821, 2021.

Y. Javed et al. "Multi-layer perceptron artificial neural network based IoT botnet traffic classification." Springer International Publishing, Proceedings of the Future Technologies Conference (FTC), USA, Vol. 1, 2020.

C. Wang et al. "A dependable time series analytic framework for cyber-physical systems of IoT-based smart grid." ACM Transactions on Cyber-Physical Systems, Vol. 3, No. 1, pp. 1-18, 2018.

X. Fang, M. Xu, S. Xu, and P. Zhao. "A Deep Learning Framework for Predicting Cyber Attacks Rates." EURASIP Journal on Information Security, Vol. 2019, No. 1, pp. 3-4, 2019.

H. Ye et al. "Web Services Classification Based on Wide & Bi-LSTM Model." IEEE Access, Vol. 7, pp. 43697-43706, 2019.

K. Cho, B.V. Merrienboer et al. "Learning phrase representations using RNN encoder-decoder for statistical machine translation." In Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), Doha, Qatar, pp. 1724-1734, 2014.

T. Phaladisailoed and Thanisa Numnonda. "Comparison of Learning Models of Various Uniforms for Bitcoin Price Prediction." Journal of Information Technology Ladkrabang, No. 1, pp. 4-7, January-June, 2017.

Aldalbahi, A., F. Shahabi, and M. Jasim. "BRNN-LSTM for Initial Access in Millimeter Wave Communications." Electronics 2021, Vol.10, pp. 8-10, 2021.

Ben Fredj, Ouissem, et al. "CyberSecurity attack prediction: a deep learning approach." 13th international conference on security of information and networks, Association for Computing Machinery, Merkez, Turkey, 2020.

Mihoub, Alaeddine, et al. "Denial of service attack detection and mitigation for internet of things using looking-back-enabled machine learning techniques." Computers & Electrical Engineering, Vol. 98, pp. 3-5, 2022.

D.R. Mérette et al. "Introduction to Anaconda and Python: Installation and setup." TEMP, Methods Psychol, Vol. 16, No. 5, pp. 3-11, 2016.

E. Monday et al. "Program-Based Construction of Scientific Visualization." World Journal of Advanced Research and Reviews, Vol. 11, No. 3, pp. 413-423, 2021.

J. Ott, et al. "A Fortran-Keras Deep Learning Bridge for Scientific Computing." Scientific Programming, Vol. 2020, pp. 1-13, 2020.

C. B. Taha and A. B. Sallow. "A comprehensive survey of deep learning models based on Keras framework. J" ournal of Soft Computing and Data Minin, Vol. 2, No. 2, pp. 49-62, July 2021.

M. Abadi et al. "TensorFlow: A System for Large-Scale Machine Learning." Proceedings of 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16), pp. 265-283, 2016.

P. Victor, et al. "Trieste: Efficiently exploring the depths of black-box functions with Tensor Flow." Ghent University – imec, Ghent, Belgium, pp. 1-4, 2023.

K. Sraubon. AI: Deep Learning by Python. SE-ED Publishing, 2021.

I. A. Kandhro et al. "Detection of Real-Time Malicious Intrusions and Attacks in IoT Empowered Cybersecurity Infrastructures." IEEE Access, Vol. 11, pp. 9136-9148, 2023.

S. Liu et al. "Model-Free Data Authentication for Cyber Security in Power Systems." in IEEE Transactions on Smart Grid, Vol. 11, No. 5, pp. 4565-4568, September, 2020.

M. Uzair and N. Jamil. "Effects of Hidden Layers on the Efficiency of Neural Networks." IEEE International Multitopic Conference, Islamabad, Pakistan, pp. 2-6, 2020.

T. Kaewwijit. The Improvement of Support Vector Regression to Forecast Time Series. Master Thesis, Computer Engineering, Suranaree University of Technology, 2016.

A. A. Mir. "An Improved Imputation Method for Accurate Prediction of Imputed Dataset Based Radon Time Series." IEEE Access, Vol. 10, pp. 6-7, 2022.

Q. Zhang et al. "Multimodel-Based Incident Prediction and Risk Assessment in Dynamic Cybersecurity Protection for Industrial Control Systems." IEEE Transactions on Systems, Man, and Cybernetics: Systems, Vol. 46, No. 10, pp. 1429-1444, 2016.

L. Allodi and F. Massacci. "Security Events and Vulnerability Data for Cybersecurity Risk Estimation." Risk Analysis, Vol. 37, No. 8, pp. 1606-1627, 2017.

V. Malamas, P. Kotzanikolaou, and C. Douligeris. "Risk Assessment Methodologies for the Internet of Medical Things: A Survey and Comparative Appraisal." IEEE Access, Vol. 9, pp. 40049-40075, 2021.

L. Silanoi and K. Chindaprasert. "The Use of Rating Scale in Quantitative Research on Social Sciences, Humanities, Hotel and Tourism Study." Journal of Management Science, Ubon Ratchathani University, Vol. 8, No. 15, pp. 112-126, January-June, 2019.

A. Hemanidhi and S. Chimmanee. "Military-based Cyber Risk Assessment Framework for Supporting Cyber Warfare in Thailand." Journal of Information and Communication Technology, Vol. 16, No. 2, pp. 192-222, December, 2017.

S. Ariyani and M. Sudarma. "Implementation of the ISO/IEC 27005 in Risk Security Analysis of Management Information Systems." Journal of Engineering Research and Application, Vol. 6, No. 8, pp. 1-6, August, 2016.

M. A. Fikri et al. "Risk Assessment Using NIST SP 800-30 Revision 1 and ISO 27005 Combination Technique in Profit-Based Organization: Case Study of ZZZ Information System Application in ABC Agency." Procedia Computer Science, Vol. 161, pp. 1206-1215, 2019.

D. Dudorov et al. "Probability analysis of cyber attack paths against business and commercial enterprise systems." IEEE European Intelligence and Security Informatics Conference, London, United Kingdom, pp. 38-44, 2013.

M.X. He. and X. An. "Information security risk assessment based on analytic hierarchy process." Indonesian Journal of Electrical Engineering and Computer Science 1.3, Vol. 1, No. 3, pp. 656-664, March, 2016.