<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Rule-oriented method of cyber incidents detection by SIEM based on fuzzy logical inference</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>© Ihor Subach</string-name>
          <email>igor_subach@ukr.net</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>© Volodymyr Kubrak</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>© Artem Mykytiuk</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>© Stanislav Korotayev</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute of Special Communication and Information Protection of the National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”</institution>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>210</fpage>
      <lpage>219</lpage>
      <abstract>
        <p>We consider the role of SIEM in the protection circuit of information and telecommunication system for proactive cyber incident management. We provide the main mechanisms of the process of correlation of events on the detection of cyber-attacks, malicious activity, and violations of security policy. We analyze identification methods of signs of deletion, integration, and connection of the processed information, as well as the establishment of its reasons and priorities. We outline the main disadvantages of the rule-oriented method. We propose the implementation of the model and method of cyber incident recognition under incompleteness or inaccuracy of information about the incidents based on the application of fuzzy set theory and fuzzy inference. We present the formal statement of the problem of cyber incident detection by the SIEM and propose its solution. The problem of incident identification is solved by finding a mapping between the set of signs of cyber incidents and the set of their possible classes. Graphical interpretation of the problem of cyber incident identification is presented and the main difficulties that arise during its solution are formulated. Emphasis is placed on the expediency of creating a subsystem of intelligent decision support in the SIEM, which should be based on the model of cyber incident identification based on fuzzy rules and fuzzy inference, where the causal relationship between a cyber incident and its features are described by an expert in natural language, and then formalized as a set of fuzzy logical rules. An algorithm for deciding on cyber incident identification is proposed. The data on the practical effectiveness of the proposed method is presented.</p>
      </abstract>
      <kwd-group>
        <kwd>cybersecurity</kwd>
        <kwd>cyber defense</kwd>
        <kwd>cyber-attack</kwd>
        <kwd>cyber incident</kwd>
        <kwd>SIEM</kwd>
        <kwd>fuzzy set theory</kwd>
        <kwd>tuple recognition model</kwd>
        <kwd>rule-oriented method</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Building of an effective cyber defense system should be based on proactive Security
Information and Event Management (SIEM) [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. The use of SIEM in the protection
circuit allows for effective proactive management of cyber incidents, based on
automated mechanisms that use information about events that have already occurred in the
system, predict future events that will occur in it, and adapt system protection
parameters to its current status.
      </p>
      <p>
        A cyber incident is an event or a series of adverse events that bear signs of a possible
cyberattack, which threaten the security of electronic communications systems, process
control systems, create a possibility of violation of the normal operation of such
systems, including failure and/or blocking of the system and/or unauthorized management
of its resources, and endanger the security of electronic information resources [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        The architecture and functional model of the proactive SIEM were considered in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
According to the tasks performed by this system (collection, processing, and analysis
of security events coming to it from many disparate distributed sources), the basis of
its operation includes the following mechanisms: normalization, filtering,
classification, aggregation, correlation, prioritization, and analysis of events and cyber incidents
and their consequences, as well as generation of various reports, messages and visual
presentation of data for prompt and informed decision-making [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. The methodology
of rational selection of SIEM for the construction of SOC (Security Operation Center)
is given in [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>
        In some sources [
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ] these mechanisms are considered as stages of the general
process, which is called the correlation process. It has a special place in the SIEM, as
its purpose is to detect cyberattacks, malicious activity, security policy violations, and
others [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. This purpose is achieved by addressing a wide range of tasks that it covers:
identifying potential relationships between disparate security information; grouping
low-level events into higher-level events; detecting potential incidents based on
analysis of the behavior of various infrastructure objects, and others.
      </p>
      <p>
        Technologically, as part of the SIEM, the correlation method includes a sequence of
actions on the data, which aims to identify, in a certain way, signs of deletion,
integration, and linking of processed information, as well as establishing its causality and
priority [
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ]. These features are called correlation features.
      </p>
      <p>
        To achieve these objectives, at different stages of the correlation process, a wide
variety of methods are used [
        <xref ref-type="bibr" rid="ref10 ref11 ref7 ref8 ref9">7, 8, 9, 10, 11</xref>
        ], such as: the method based on finite
machine states (finite state machines), which is used to identify dangerous states of the
system; rule-oriented method, which is based on rules that have clear syntax and
semantics; the method of reasoning based on precedents; Bayesian network method,
which is used at the stage of multi-step event correlation, loss analysis, and
prioritization; artificial neural networks, which are also used for event correlation, loss analysis,
and prioritization, and others.
      </p>
      <p>Analysis shows that the most common method is the rule-oriented method, but due
to the fact that it is based on classical production rules, which do not always give the
expected result in terms of incomplete and inaccurate information about cyber
incidents, its application is not always effective.</p>
      <p>Therefore, the task of developing models and methods for recognizing cyber
incidents in conditions of incompleteness or inaccuracy of information about them is
relevant.</p>
      <p>The aim of the work is to develop a model and rule-oriented method of detecting
cyber incidents by SIEM based on fuzzy inference.</p>
      <p>Statement of the problem of cyber incident detection by SIEM
Let</p>
      <p>Any cyber incident is characterized by a set of information features, on the basis of
which, in turn, it can be recognized.</p>
      <p>O  oi  i  1, n </p>
      <p>the set of information features of cyber incidents that occur
in  the system and  are
C   C j C j  o j1, o j2 ,, o jm , j  1, J ,</p>
      <p> 
with a cyber incident C j .
represented
by
the</p>
      <p>
        set
where information signs are associated
Then the model of cyber incident recognition can be represented by a tuple [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]:
M  K , Oi , R, C
,
where K is a feature classifier; oi  O  is a set of the observed features; R  R 
i is a
set of cyber incidents recognition rules; C – a cyber incident.
      </p>
      <p>The process of recognizing cyber incidents is carried out based on rules (usually,
production rules):</p>
      <p>R1 : (K,Oi ), R2 : (K,Oi ), , Rl : (K,Oi )  C .</p>
      <p>
        However, in traditional production systems, the rules are classic products that do not
fully meet the conditions of incompleteness and inaccuracy of information about cyber
incidents that occur during operation of information and telecommunications systems.
As a rule, for this purpose, methods, and models of fuzzy set theory on fuzzy inference
are used [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
3
      </p>
      <p>The method of solving the problem</p>
      <p>Based on above-listed considerations, model (1) can be developed and presented as
follows:</p>
      <p>MF  KF , Oi , RF , C
where KF is a fuzzy classifier, RF  RFi  is a set of fuzzy cyber incident recognition
rules:</p>
      <p>RF1 : (K,Ov ), RF2 : (K,Ov ), , RFl : (K,Ov )  C .</p>
      <p>
        On the other hand, based on the works [
        <xref ref-type="bibr" rid="ref15 ref16">15, 16</xref>
        ], the problem of recognizing cyber
incidents can be considered as a problem of their identification, the solution of which
is to find a mapping:
      </p>
      <p>O*  o1*, o2*, , on*   c j  C  c1,c2 , , cm ,
(1)
(2)
(3)</p>
      <p>Range of change of signs of cyber incidents
where O*  is a set of signs a cyber incident; aoiset of possible cyber incidents.
 oi , oi  , i  1, n, and the original
value of the identification result k   k, k  are considered known. Accordingly,
oi oi  is the lower (upper) value of the cyber incidence parameters, oi , i  1, n, k, k 
is the lower (upper) value of the identification result k.</p>
      <p>Graphically, the problem of identifying cyber incidents can be represented as follows
(see Fig. 1):</p>
      <p>Input Parameters
(Signs of Cyber Incidents)
o1
o2
y*D.

on</p>
    </sec>
    <sec id="sec-2">
      <title>Fuzzy</title>
      <p>knowledge
base
(fuzzy
rules)</p>
    </sec>
    <sec id="sec-3">
      <title>Logic output unit</title>
      <p>Solution:
Cyber Incident Class</p>
      <p>C1
C2
y*D.

Cm
y
any computer with the same IP address has been successful, then this event must be
addressed by a security officer.</p>
      <p>o1
o2
o3
o4
o5
o6</p>
    </sec>
    <sec id="sec-4">
      <title>Failed login</title>
      <p>ξα
α
ξс
ξβ
β</p>
    </sec>
    <sec id="sec-5">
      <title>Successful login</title>
    </sec>
    <sec id="sec-6">
      <title>Sign</title>
      <p>O1
O2
O3
O4
O5
O6</p>
      <p>In turn, c1 and c2 indicate the type of event occurring in the system (Table 2).</p>
      <p>marked signs of a cyber incident (Table 1).</p>
      <p>Cyber incident
с1
с2</p>
    </sec>
    <sec id="sec-7">
      <title>Normal state</title>
      <p>c   c  , ,
   o1,o2 ,o3,o4 ,o5 ,
    o3, o4 , o5 , o6 .
(4)
(5)
(6)</p>
    </sec>
    <sec id="sec-8">
      <title>Sign</title>
      <p>Value
aA
Value
bA
L
H
L
L
L
H
L
aA
aA
bA
L
A
bA
L
aA
L
Sign
O1
O2
O3
O4
O5
O3
O4
O5
O6
O1
O2
O3
O4
O5
O3
O4
O5
O6
Sign
Value</p>
    </sec>
    <sec id="sec-9">
      <title>Sign Value</title>
    </sec>
    <sec id="sec-10">
      <title>Type</title>
      <p>α
H
β
H
α
aA
β
aA</p>
      <p>A single scale of qualitative terms o1  o6 ,  ,  is used to estimate the values of
linguistic variables: L - low; bA - below average; A - average; aA - above average; H
high. Each of these terms is given by the corresponding membership function.</p>
      <p>
        From a formal point of view, the problem of cyber incident identification based on
fuzzy rules and fuzzy inference corresponds to the mathematical model of object
identification with a discrete output [
        <xref ref-type="bibr" rid="ref14 ref15">14, 15</xref>
        ]. Thus, to identify a cyber incident c1 , the
ratio is as follows:
 с1 с   H    H      aA    aA   ,
(7)
where
      </p>
      <p> 
 H      H o1    H o2    L o3    L o4    aA o5 ,
 </p>
      <p> 
 H      bA o3    L o4    H o5    L o6 ;
 
 
 aA      aA o1    aA o2    bA o3    L o4    A o5 ,
 
 
 aA      bA o3    L o4    aA o5    L o6 ;</p>
      <p> 
and  с,  ,  , оi   are corresponding membership functions.</p>
      <p>These fuzzy logical equations allow us to make a decision in favor of identification
of a cyber incident based on the following algorithm:</p>
      <p>Step 1. The values of the signs of cyber incidents are recorded O*  o1*, o2* , , o6* 
.</p>
      <p>Step 2. The values of membership functions
parameter values oi* ,i  1, 6;k  L, bA, A, aA, H.
 k oi* 
are determined at fixed</p>
      <p>Step 3. Based on logical equations (7), the values of membership functions
 c j o1*,o2* ,,o6*  are calculated by the vector of attributes O*  o1*, o2 , , o6*  for all
*
types of cyber incidents c1 , c2 . Logical operations AND  and OR  on
membership functions are replaced by operations min and max:
 k o*   k o*  min  k o*  , k o*j  ;i  j,</p>
      <p>i j  i
 k o*   k o*   max  k o*  , k o*j  ;i  j,
i j  i
(8)
(9)
c*
Step 4. Choice of solution j (the type of cyber incident) provided:
 c j o1*,o2* ,,o6*   max  c j o1*, o2* , , o6* .</p>
      <p>
 
(10)
(11)</p>
      <p>It should be noted that the adequacy of this model and the effectiveness of the
method of detecting cyber incidents, which is based on the proposed model,
respectively, are determined by the quality of membership functions, through which
linguistic estimates are quantified. Due to the fact that these membership functions are
determined by experts, the adequacy of the fuzzy knowledge base will depend entirely
on the qualifications of experts.</p>
      <p>However, it should be noted that as a result of SIEM operation, statistics on cyber
incidents will be collected, which makes it possible to assess the adequacy of the
proposed model and the method developed on its basis.</p>
      <p>Thus, it is quite expedient to perform additional training (system settings). This, in
turn, will allow the identification of cyber incidents that were not previously identified
by the system during its operation.</p>
      <p>Comparative analysis of the proposed method showed that, in comparison with
existing methods (the method of reference vectors, neural networks, k-nearest
neighbors, the method based on immune systems), it can increase the accuracyof cyber
incident detection (11) by 2-15 % (Table 4).</p>
      <p>P </p>
      <p>TP
TP  FP
,
where P (precision) is the accuracy of cyber incident detection;</p>
      <p>TP – the number of cyber incidents that are properly classified;</p>
      <p>
        FP – the number of cyber incidents classified as a normal state of the system [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ].
      </p>
      <p>As a result of the conducted research, it is shown that the main role in a protection
circuit of information and telecommunication system for proactive management of
cyber incidents belongs to SIEM.</p>
      <p>The results of the analysis indicate the feasibility of using a rule-oriented method to
identify signs of deletion, aggregation, and linking of information processed, as well as
to establish its causality and priority.</p>
      <p>To increase the efficiency of the rule-oriented method of recognizing cyber incidents
in conditions of incompleteness and inaccuracy of information about them, a model
based on the theory of fuzzy sets and fuzzy inference is proposed. Based on the model,
a rule-oriented method of cyber incident identification, based on mapping of the set of
incident features to the set of possible classes of cyber incidents, and the algorithm for
its implementation have been developed.</p>
      <p>To implement the developed model and method, it is advisable to modify the
structure of the SIEM-system by introducing an intelligent decision support subsystem,
which should be based on the model of cyber incident identification based on fuzzy
rules and fuzzy inference, where causal relationships of a cyber incident and its sighs
are described by the expert in plain language and then formalized as a set of fuzzy
logical rules.</p>
      <p>The simulation results show that the proposed method allows us to increase the
accuracy of cyber incident detection by 2-15%.</p>
      <p>The obtained results can be used in practice for solving the problem of detecting
cyber incidents by SIEM, which is part of the SOC software and hardware.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>I.</given-names>
            <surname>Subach</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Kubrak</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Mykytiuk</surname>
          </string-name>
          , “
          <article-title>Architecture and functional model of a promising proactive intelligent system SIEM-system for cyber protection of critical infrastructure objects”</article-title>
          ,
          <source>Information Technology and Security</source>
          , Vol
          <volume>7</volume>
          ., Iss.
          <volume>2</volume>
          .,
          <year>2019</year>
          , pp.
          <fpage>208</fpage>
          -
          <lpage>215</lpage>
          , DOI: 10.20535 /
          <fpage>2411</fpage>
          -
          <lpage>1031</lpage>
          .
          <year>2019</year>
          .
          <volume>7</volume>
          .2.190570,
          <string-name>
            <surname>Access</surname>
            <given-names>mode</given-names>
          </string-name>
          : https://doi.org/10.20535/
          <fpage>2411</fpage>
          -
          <lpage>1031</lpage>
          .
          <year>2019</year>
          .
          <volume>7</volume>
          .2.
          <fpage>190570</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <source>Law of Ukraine On the Basic Principles of Cyber Security of Ukraine: Official Publication: Vidomosti Verkhovnoi Rady</source>
          ,
          <year>2017</year>
          , №
          <volume>45</volume>
          ,
          <string-name>
            <surname>Art</surname>
          </string-name>
          .
          <volume>403</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>I.</given-names>
            <surname>Subach</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Kubrak</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Mykytiuk</surname>
          </string-name>
          , “
          <article-title>Methodology of rational choice of security incident management system for building operational security center”</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          ,
          <year>2019</year>
          ,
          <volume>2577</volume>
          , р.p.
          <fpage>11</fpage>
          -
          <lpage>20</lpage>
          , Режим доступу: http://ceur-ws.org/Vol2577/paper2.pdf
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>A.</given-names>
            <surname>Fedorchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Levshun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Chechulin</surname>
          </string-name>
          ,
          <string-name>
            <surname>and I. Kotenko</surname>
          </string-name>
          , “
          <article-title>Analysis of methods for correlating security events in SIEM systems</article-title>
          .
          <source>Part</source>
          <volume>1</volume>
          ”, Proceedings of SPIIRAN, issue
          <volume>4</volume>
          (
          <issue>47</issue>
          ),
          <year>2016</year>
          , pp.
          <fpage>5</fpage>
          -
          <lpage>27</lpage>
          , DOI: 10.15622 / sp.47.1.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>A.</given-names>
            <surname>Fedorchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Levshun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Chechulin</surname>
          </string-name>
          ,
          <string-name>
            <surname>and I. Kotenko</surname>
          </string-name>
          , “
          <article-title>Analysis of methods for correlating security events in SIEM systems</article-title>
          .
          <source>Part</source>
          <volume>2</volume>
          ”, Proceedings of SPIIRAN, issue
          <volume>6</volume>
          (
          <issue>49</issue>
          ),
          <year>2016</year>
          , pp.
          <fpage>208</fpage>
          -
          <lpage>225</lpage>
          , DOI: 10.15622 / sp.49.11.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Elshoush</surname>
            <given-names>H.T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Osman</surname>
            <given-names>I.M.</given-names>
          </string-name>
          <article-title>Alert correlation in collaborative intelligent intrusion detection systems -</article-title>
          A survey // Applied Soft Computing,
          <year>2011</year>
          , pp.
          <fpage>4349</fpage>
          -
          <lpage>4365</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Muller</surname>
            <given-names>A</given-names>
          </string-name>
          .
          <article-title>Event Correlation Engine</article-title>
          .
          <source>Master`s Thesis</source>
          . Swiss Federal Institute of Technology Zurich.
          <year>2009</year>
          . 165 p.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Jakobson</surname>
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weissman M.D</surname>
          </string-name>
          . Alarm correlation // IEEE Network.
          <year>1993</year>
          . no.
          <issue>7</issue>
          (
          <issue>6</issue>
          ). pp.
          <fpage>52</fpage>
          <lpage>59</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Tiffany</surname>
            <given-names>M.</given-names>
          </string-name>
          <article-title>A survey of event correlation techniques and related topics</article-title>
          . URL: http://www.tiffman.com/netman/netman.html (дата обращения:
          <volume>26</volume>
          .
          <fpage>04</fpage>
          .
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Sadoddin</surname>
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ghorbani</surname>
            <given-names>A</given-names>
          </string-name>
          .
          <article-title>Alert Correlation Survey: Framework</article-title>
          and Techniques // Proceedings of 2006 International Conference on Privacy,
          <source>Security and Trust: Bridge the Gap Between PST Technologies and Business Services (PST`06)</source>
          .
          <year>2006</year>
          . Article no.
          <volume>37</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Hanemann</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Marcu</surname>
            <given-names>P</given-names>
          </string-name>
          .
          <article-title>Algorithm Design and Application of Service-Oriented Event Correlation //</article-title>
          <source>Proceedings of Conference BDIM</source>
          <year>2008</year>
          , 3rd IEEE/IFIP International Workshop on Business-Driven IT Management.
          <year>2008</year>
          . pp.
          <fpage>61</fpage>
          -
          <lpage>70</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Yu</surname>
            . Samokhvalov, and
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Tolyupa</surname>
          </string-name>
          . “
          <article-title>Correlation of events in SIEM-systems based on nonmonotone inference”, Information protection</article-title>
          , .Volume
          <volume>19</volume>
          , №
          <volume>1</volume>
          ,
          <issue>2017</issue>
          , pp.
          <fpage>5</fpage>
          -
          <lpage>9</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13. L.
          <string-name>
            <surname>Zade</surname>
          </string-name>
          ,
          <article-title>The concept of a linguistic variable and its application to approximate decision making</article-title>
          , Moscow, Russia: Mir,
          <year>1976</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <given-names>A.P.</given-names>
            <surname>Rothstein</surname>
          </string-name>
          ,
          <article-title>Medical diagnostics on fuzzy logic</article-title>
          , Vinnytsia, Ukraine: Continent-PRIM,
          <year>1996</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <given-names>A.P.</given-names>
            <surname>Rothstein</surname>
          </string-name>
          ,
          <article-title>Intelligent identification technologies: fuzzy sets, genetic algorithms, neural networks</article-title>
          , Vinnytsia, Ukraine: UNIVERSUM,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>SIEM</surname>
          </string-name>
          <article-title>Rules or Models for Threat Detection</article-title>
          ? Exabeam,
          <year>2018</year>
          .[Online]. Available: https://www.exabeam.com/siem/siem-threat
          <article-title>-detection-rules-or-models/</article-title>
          .
          <source>Accessed on: November29</source>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <given-names>F.</given-names>
            <surname>Salo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Injadat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Nassif</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Shami</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Essex</surname>
          </string-name>
          , '
          <article-title>'Data Mining Techniques in Intrusion Detection Systems: A Systematic Literature Review</article-title>
          ,''
          <source>in Proc. IEEEAccess</source>
          ,
          <year>September 2018</year>
          , Vol.
          <volume>6</volume>
          , pp.
          <fpage>56046</fpage>
          -
          <lpage>56058</lpage>
          . DOI:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2018</year>
          .
          <volume>2872784</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>