You are on page 1of 4

International Conference on Computing, Communication and Automation (ICCCA2015)

CSAAES: An Expert System for Cyber Security


Attack Awareness

Cheshta Rani Shivani Goel


Computer Science and Engineering Department Computer Science and Engineering Department
Thapar University Thapar University
Patiala, India Patiala, India
mehtacheshta@gmail.com shivani@thapar.edu

Abstract— Internet today is used by almost all the people, the system that will provide the users the information about
organizations etc. With this vast usage of internet, a lot of the reasons of the problem (due to attack) and how the
information is exposed on the internet. This information is problem can be solved. For this an expert system CSAAES is
available to the hackers. So a lot of attacks occur in the computer designed that will provide the required information from its
systems through internet. These attacks may destroy the rules and databases by querying it. The aim of the expert
information present on a particular system or use the system to
system is twofold. To make the user know about important
perform other type of attacks. We need to provide protection
from these attacks. User faces some problem in the functioning of information about various cyber attacks and also to provide
the computer but has no means of identifying and solving the awareness about all possible symptoms and countermeasures.
problems. Knowledge about different type of attacks and their
effects on the system is available from various sources. The II. LITERATURE REVIEW
handling of various attacks is also available, but the way to
identify which attack is being performed on the computer system As proposed by [1] an expert system called OPENSke that
is difficult. The expert system designed here can identify which was designed by using Drool’s tool. This system took system
type of attack is being performed on the system, their symptoms information as input and identified the vulnerability found.
and ways to solve these attacks i.e. countermeasures. It is a System information was the information of the network such
platform for cyber attacks security awareness among internet as hosts present in the system, user account, assets and
users. applications running on them. Vulnerabilities found was the
output of any vulnerability scanner such as OVAL scanner or
Keywords—expert system; security; attacks; countermeasures; NESSUS etc. that provides the vulnerability found in the
security framework. system [1]. This gave as output weaknesses found
compromised software or assets and executed attack pattern.
Weaknesses found in described by the CWE (Common
I. INTRODUCTION Weakness Enumeration) that have satisfied current
With the development of internet and communication vulnerability in the system. It also told about the software or
system cyber movement started into new era. Internet is used the assets that have been compromised were risky to use.
by all people and government agencies for their business Executed attack pattern constitute a list of CAPEC (Common
activities, personal affairs etc. this information system has Attack Pattern Enumeration and Classification) attack
improved the efficiency to a large extent but the risk of cyber patterns. This system was experimented on several different
threats and computer security attacks is increased. The systems and identified the vulnerability present. The major
attackers find the vulnerabilities present in the system drawback of the system was that it had not taken into
application or operating system and use that to exploit the consideration the role of time in execution of attacks. In this
system. system information about the network needed to be entered
manually, so could also be automated to detect the network
topology and run the system on frequent basis. Rules in this
Most of these attacks occur due to misconfigured software, system were executed arbitrarily and this could be improved
vulnerable software or open ports present in the system. This by going through the workflow process.
led the computer user and organization to use security tools to
prevent the system from the security attacks. They provide the Kerim Goztepe[2] designed fuzzy rule based expert system
information but that is scattered. When user faces problems in for cyber security named as Fuzzy Rule Based Cyber Expert
the computer he/she does not know the reason due to which System(FRBCES). Major parts in this were data collection,
the problems is occurring and what should be done to remove defining variables i.e. input and output and then
the problems from the computer. For removing the attack we implementation. Input variables used in this were cyber
need to identify the attack and then apply the appropriate technique, cyber intruder’s target, cyber intruder, aim of cyber
countermeasure to remove that. So there is a need to design intruder. Techniques used for this were DOS attack, network

ISBN:978-1-4799-8890-7/15/$31.00 ©2015 IEEE 242


International Conference on Computing, Communication and Automation (ICCCA2015)
attacks, worm, malware, social engineering, Trojan horse etc. A. Structure of an expert system
Cyber intruder could be inside or outside the organization, Knowledge must be presented in a comprehensible format
special staff, hacker or any enemy. Aim of the intruder was to perform any kind of reasoning in the expert system this is
identified as to gain control of the system, block web pages, known as knowledge representation. Expert system consists of
capturing critical information, etc. Output provided by this two components: knowledge base and logical reasoner.
was hardware, software or user i.e. what needed to be done Knowledge base is first component of an expert system and it
with these components. For example in case of software- is collection of information that is in a well defined
provide solution such as use special software or update representation. The second component of an expert system is
system. This system uses Mamdani fuzzy inference engine or the logical reasoner which performs all of the necessary
system. reasoning over the previously built knowledge base. With this
logical reasoner we conclude new information from previous
In expert system for computer security presented in this built knowledge base.
paper, data about cyber attacks, their symptoms and
countermeasures is collected from the different papers of the B. Rule chaining
journals and conferences online sources. Different authors The logical reasoned of the expert system operates over
classify the security and security threat each has its own view. well defined rules. The rules in this are represented as IF-
K Ahmed et.al [3] define the security attack as active and THEN statements as shown below. Once the IF condition is
passive attack and these attack use technique such as satisfied THEN part is executed.
interruption, interception, modifications and fabrications.
Attacks that use interception as technique are traffic analysis,
release of message content and sniffing. Modification IF
technique include MITM (Man-In-The Middle). Similarly <conditional expression>
other technique fabrications include attacks such as replay THEN
attack and identify spoofing. DOS attack and its variants <knowledge insert, update or retract
(DDOS and DRDOS) and SQL injection comes under statement>
Interruption.

Fig. 1. Expert system’s rule syntax


D. Welch [4] defined wireless network attack taxonomy. This
was designed based upon the security principles they affect
and their countermeasures. For example threat violating Rule chaining can be in two modes:
confidentiality, integrity and availability. Threats that affect • Forward chaining
the confidentiality of the system are traffic analysis, active and • Backward chaining
passive sniffing. The threats or attack that affect integrity of
the system are session hijacking, replay attack, unauthorized When IF part of the statement is satisfied the THEN part is
access to the computer or network. The solutions to remove executed which may be addition of new information or
these attacks are implement firewall to block undesirable manipulation of the knowledge base. This is called forward
traffic, mutual authentication and encryption. chaining. Other type is backward chaining in which it proves
that whether goal can be reached from the current
According to [5], DOS attack in networks can occur at understanding of situation or system.
different layers like physical layer, network layer and transport
layer. Simplest of the DOS attack is to consume all the C. Inputs and output of the system
resources of the victim by sending a large number of packets.
For the expert system developed here, inputs and outputs of
the system are shown in figure 2.
In [6] security threats in wireless sensor networks are
defined and these are classified as attack on the different Inputs:
layers. The attacks can be broadly classified as modification, • Symptoms: These are the observed patterns in the
interruption and fabrication. system.
• Attack type: These are the attack about which the
user want to get information
III. LAVERAGING THE EXPERT SYSTEM
Expert system is very popular branch of artificial
Outputs :
intelligence research. It is popular because of its ability to
reason over a problem based upon its current understanding of • Problem (possible attack) present: It is problem
the situation. Reasoning means a system has some information or type of possible attack present in the system
and is required to provide the information that it was not that is analyzed based upon the observed
informed explicitly. symptom(s) entered.

243
International Conference on Computing, Communication and Automation (ICCCA2015)
• Remedies: These refer to the countermeasures to or the problems faced while using the system. The problems
be used for handling attacks proactively as well listed are abnormal program termination, computer shutdown
as reactively. abruptly, loss of access to the network, cannot get information,
get false information etc. These are the problems faced while
working on the computer system or network. The expert
system asks for entering the observed symptoms by clicking
the checkboxes against the problem you faced. In figure 4 two
symptoms are selected these are abnormal program
termination and computer shutdown.

The expert system here can identify 18 possible types of


attacks and total symptoms observed in this are 25.

Fig. 2. Inputs and outputs of expert system

D. Data collection
Data for this system is collected from different sources
like books, paper from journals and conferences and
online sources. Various cyber attacks about which
awareness is provided in CSAAES is shown in figure 3.

Fig. 4. Selecting symptoms faced

After that it shows attack present in the system. According


to the symptoms selected DOS (Denial Of Service) attack is
present in the system.

Fig. 3. Potential cyber attacks

Denial of Service(DOS) attack, mole, data theft, malware,


control over a system, data modification, packet sniffing,
Trojan horse, eavesdropping is potential attacks present in the
system or network [7-9]. These attacks harm the
confidentiality, integrity and availability of the information.
Fig. 5. Attack present in system
IV. IMPLEMENTATION
This expert system is implemented using Visual Studio If user wants to see how to solve the attack present in the
10.0 framework and ASP.NET to manage interfaces and SQL system then click on countermeasures. This will show the
server 2008 to manage the database. Rules for this are countermeasures e.g. figure 6 shows countermeasures to DOS
managed in dot net framework at backend. It has two subparts attack.
in menu at left: attack identifier and information. Attack
identifier provides the prompt to enter the observed symptoms

244
International Conference on Computing, Communication and Automation (ICCCA2015)
In future this system can be modified to provide the
attacks based upon frequency that is problem that is faced
more by the users will be asked first and based upon the
symptom that user has entered it will ask for the next
symptom. The system can be made dynamic as the user can
enter problem faced by him if that is not present in the list.
That symptom will be later analyzed and user is provided with
the solution of that problem. This way the system can be
improved further.
REFERENCES

Fig. 6. Countermeasures of DOS attack. [1] M.M. Gamal, B. Hasan, and A.F. Hegazy, “A Security Analysis
Framework Powered by an Expert System,” International Journal of
Computer Science and Security (IJCSS), Vol. 4, no. 6, pp. 505-527, Feb.
V. CONCLUSION 2011.
[2] K. Goztepe, “Designing a Fuzzy Rule Based Expert System for Cyber
Security is essential for safe working of any system. Many Security,” International Journal Of Information Security Science, vol.1,
types of attacks have been identified by various researchers at no.1, 2012
various levels. Though users know about the attacks, seldom [3] K. Ahmad, S. Verma, N. Kumar, and J. Shekhar, “Classification of
they know the symptoms by which they can identify the attack Internet Security Attacks,” Proceedings of the 5th National Conference,
being performed on their systems. The expert system designed March 2011.
here can provide this information in detail to the user. [4] D. Welch, “Wireless Security Threat Taxonomy,” Information
Moreover, the knowledge about different type of attacks, their Assurance Workshop. IEEE Systems, Man and Cybernetics Society, pp
76-83, June 2003.
symptoms, their effects on the system and how these can be
handled is collected and included in the expert system. This [5] G. Kulkarni, R. Shelk , K. Gaikwad, V. Solanke , S. Gujar, and P.
Khatawkar, “Wireless Sensor Network Security Threats,”
system takes two types of input from the users namely
[6] M. Panda “Security Threats at Each Layer of Wireless Sensor
observed symptoms and the attack type. It provides the Networks,” International Journal of Advanced Research in Computer
possible suspects for attacks based on the observed symptoms. Science and Software Engineering, vol. 3, no. 11, Nov. 2013.
It also provides the remedies for the identified attack if [7] C. Wilson, “Computer Attack and Cyber Terrorism: Vulnerabilities and
required by the user. Users can also select an attack type and Policy Issues for Congress”, Congressional Research Service Report for
get detailed information about it. The system is tested against Congress, Oct. 17 2003.
various inputs and is identifying various attacks correctly. The [8] J. Moteff, and P. Parfomak, “Critical Infrastructure and Key Assets:
expert system is capable of identifying many possible security Definition and Identification”, Congressional Research Service Report
for Congress, Oct. 1, 2004.
attacks based on observed symptoms. By also providing the
countermeasures for all the attacks, it is surely a platform for [9] J. A. Chandler, “Security in Cyberspace: Combatting Distributed Denial
of Service Attacks,” University of Ottawa Law & Technology Journal,
security awareness. pp. 231-261, 2004.

245

You might also like