Bayesian Network Model for a Zimbabwean Cybersecurity System

G. Kabanda
{"title":"Bayesian Network Model for a Zimbabwean Cybersecurity System","authors":"G. Kabanda","doi":"10.13005/ojcst12.04.02","DOIUrl":null,"url":null,"abstract":"The purpose of this research was to develop a structure for a network intrusion detection and prevention system based on the Bayesian Network for use in Cybersecurity. The phenomenal growth in the use of internet-based technologies has resulted in complexities in cybersecurity subjecting organizations to cyberattacks. What is required is a network intrusion detection and prevention system based on the Bayesian Network structure for use in Cybersecurity. Bayesian Networks (BNs) are defined as graphical probabilistic models for multivariate analysis and are directed acyclic graphs that have an associated probability distribution function. The research determined the cybersecurity framework appropriate for a developing nation; evaluated network detection and prevention systems that use Artificial Intelligence paradigms such as finite automata, neural networks, genetic algorithms, fuzzy logic, support-vector machines or diverse data-mining-based approaches; analysed Bayesian Networks that can be represented as graphical models and are directional to represent cause-effect relationships; and developed a Bayesian Network model that can handle complexity in cybersecurity. The theoretical framework on Bayesian Networks was largely informed by the NIST Cybersecurity Framework, General deterrence theory, Game theory, Complexity theory and data mining techniques. The Pragmatism paradigm used in this research, as a philosophy is intricately related to the Mixed Method Research (MMR). A mixed method approach was used in this research, which is largely quantitative with the research design being a survey and an experiment, but supported by qualitative approaches where Focus Group discussions were held. The performance of Support Vector Machines, Artificial Neural Network, K-Nearest Neighbour, Naive-Bayes and Decision Tree Algorithms was discussed. Alternative improved solutions discussed include the use of machine learning algorithms specifically Artificial Neural Networks (ANN), Decision Tree C4.5, Random Forests and Support Vector Machines (SVM). CONTACT Gabriel Kabanda gabrielkabanda@gmail.com Atlantic International University 900 Fort Street Mall 40 Honolulu,","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Oriental journal of computer science and technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.13005/ojcst12.04.02","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

The purpose of this research was to develop a structure for a network intrusion detection and prevention system based on the Bayesian Network for use in Cybersecurity. The phenomenal growth in the use of internet-based technologies has resulted in complexities in cybersecurity subjecting organizations to cyberattacks. What is required is a network intrusion detection and prevention system based on the Bayesian Network structure for use in Cybersecurity. Bayesian Networks (BNs) are defined as graphical probabilistic models for multivariate analysis and are directed acyclic graphs that have an associated probability distribution function. The research determined the cybersecurity framework appropriate for a developing nation; evaluated network detection and prevention systems that use Artificial Intelligence paradigms such as finite automata, neural networks, genetic algorithms, fuzzy logic, support-vector machines or diverse data-mining-based approaches; analysed Bayesian Networks that can be represented as graphical models and are directional to represent cause-effect relationships; and developed a Bayesian Network model that can handle complexity in cybersecurity. The theoretical framework on Bayesian Networks was largely informed by the NIST Cybersecurity Framework, General deterrence theory, Game theory, Complexity theory and data mining techniques. The Pragmatism paradigm used in this research, as a philosophy is intricately related to the Mixed Method Research (MMR). A mixed method approach was used in this research, which is largely quantitative with the research design being a survey and an experiment, but supported by qualitative approaches where Focus Group discussions were held. The performance of Support Vector Machines, Artificial Neural Network, K-Nearest Neighbour, Naive-Bayes and Decision Tree Algorithms was discussed. Alternative improved solutions discussed include the use of machine learning algorithms specifically Artificial Neural Networks (ANN), Decision Tree C4.5, Random Forests and Support Vector Machines (SVM). CONTACT Gabriel Kabanda gabrielkabanda@gmail.com Atlantic International University 900 Fort Street Mall 40 Honolulu,
津巴布韦网络安全系统的贝叶斯网络模型
本研究的目的是开发一种基于贝叶斯网络的网络入侵检测和防御系统的结构,用于网络安全。基于互联网的技术使用的显著增长导致了网络安全的复杂性,使组织遭受网络攻击。因此,需要一个基于贝叶斯网络结构的网络入侵检测与防御系统。贝叶斯网络(BNs)被定义为用于多变量分析的图形概率模型,并且是具有相关概率分布函数的有向无环图。研究确定了适合发展中国家的网络安全框架;评估使用人工智能范例的网络检测和预防系统,如有限自动机、神经网络、遗传算法、模糊逻辑、支持向量机或各种基于数据挖掘的方法;分析了贝叶斯网络,可以表示为图形模型,并有方向性地表示因果关系;并开发了一个可以处理网络安全复杂性的贝叶斯网络模型。贝叶斯网络的理论框架主要受NIST网络安全框架、一般威慑理论、博弈论、复杂性理论和数据挖掘技术的影响。本研究中使用的实用主义范式作为一种哲学与混合方法研究(MMR)有着复杂的关系。在本研究中使用了混合方法方法,这在很大程度上是定量的,研究设计是一个调查和一个实验,但支持定性方法,焦点小组讨论举行。讨论了支持向量机、人工神经网络、k近邻、朴素贝叶斯和决策树算法的性能。讨论的替代改进解决方案包括使用机器学习算法,特别是人工神经网络(ANN),决策树C4.5,随机森林和支持向量机(SVM)。联系Gabriel Kabanda gabrielkabanda@gmail.com大西洋国际大学900 Fort Street Mall 40檀香山,
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信