The Method of Logic Cyber Attack Detection of Abuse Functionality Type on Nginx Http-Server and Apache on the Basis of Fuzzy Logic
Vitalii Fesokha1, Igor Subach2, Volodymyr Kubrak3, Artem Mykytiuk4, Stanislav Korotaiev5

1Vitalii Fesokha*, Postgraduate Student, Military Institute of Telecommunication and Information Technologies  Kiev, Ukraine.
2Dr. Igor Subach, Doctor of Technical Science, Associate Professor, Head of Department, Institute of Special Communications and Iinformation  Security National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, Kyiv, Ukraine.
3Volodymyr Kubrak, Postgraduate Student, Institute of Special Communications and Information Security National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, Kiev, Ukraine.
4Artem Mykytiuk, Postgraduate Student, Institute of Special Communications and Information Security National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, Kiev, Ukraine.
5Stanislav Korotaiev, Engineer, Institute of Special Communications and Information Security National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, Kiev, Ukraine.
Manuscript received on May 16, 2020. | Revised Manuscript received on May 21, 2020. | Manuscript published on June 10, 2020. | PP: 702-705 | Volume-9 Issue-8, June 2020. | Retrieval Number: H6657069820/2020©BEIESP | DOI: 10.35940/ijitee.H6657.069820
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The article presents a method of abuse detection functionality of the most common open source http-servers Nginx and Apache, which currently implement a full web stack and serve more than 60% of traffic on the Internet. The proposed method is based on the application of the mathematical apparatus of fuzzy set theory and fuzzy inference to the selected analysis parameters corresponding to the properties of a logical cyber attack that realizes the vulnerability of web server data. To obtain the most accurate results of fuzzy inference the direction of adaptation of membership functions to the conditions of server operation (changes on the server and analysis of client behavior) based on the application of the mathematical apparatus of genetic algorithms is determined. 
Keywords: Http-server, Abuse, Fuzzy logic, Genetic algorithms.
Scope of the Article: Fuzzy logics