MATHEMATICAL MODEL AND STRUCTURE OF A NEURAL NETWORK FOR DETECTION OF CYBER ATTACKS ON INFORMATION AND COMMUNICATION SYSTEMS
Lubov Zahoruiko
l.zahoruiko@donnu.edu.uaVinnytsia National Technical University (Ukraine)
https://orcid.org/0000-0002-6958-8696
Tetiana Martianova
Vinnytsia Regional Youth Centre Kvadrat (Ukraine)
Mohammad Al-Hiari
Jadara University (Jordan)
https://orcid.org/0009-0002-2770-5417
Lyudmyla Polovenko
Vinnytsia National Technical University (Ukraine)
https://orcid.org/0000-0002-9909-825X
Maiia Kovalchuk
Vinnytsia National Technical University (Ukraine)
Svitlana Merinova
Vinnitsia Institute of Trade and Economics of Kyiv National University of Trade and Economics. (Ukraine)
Volodymyr Shakhov
Vinnytsia Mykhailo Kotsiubynskyi State Pedagogical University (Ukraine)
https://orcid.org/0000-0003-1535-2802
Bakhyt Yeraliyeva
M. Kh. Dulaty Taraz Regional University (Kazakhstan)
Abstract
The paper discusses the principles of creating a mathematical model and system architecture by applying the method of artificial intelligence to detect cyberattacks on information and communication systems, where a neural network capable of learning and detecting cyberattacks is used. The proposed approach, based on the application of the developed mathematical model and architecture of artificial neural networks, as a detector of network attacks on information and communication systems, allows to increase the level of detection of network intrusions into computer systems, Web and Internet resources. An algorithm for processing network traffic parameters in real-time systems by structuring a neural network is proposed, which allows to optimize the redundancy of its multi-level structure at the level of inter-element connections.
Keywords:
neural networks, network traffic, network connection, cyber attack, information and communication system.References
[1] Andrushchenko M. et al.: Hand Movement Disorders Tracking By Smartphone Based On Computer Vision Methods. Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska – IAPGOS 14(2), 2024, 5–10 [https://doi.org/10.35784/iapgos.6126].
DOI: https://doi.org/10.35784/iapgos.6126
Google Scholar
[2] Avrunin O. et al.: Improving the methods for visualization of middle ear pathologies based on telemedicine services in remote treatment. IEEE KhPI Week on Advanced Technology – KhPI Week 2020, 347–350 [https://doi:10.1109/KhPIWeek51551.2020.9250090].
DOI: https://doi.org/10.1109/KhPIWeek51551.2020.9250090
Google Scholar
[3] Bezobrazov S. et al.: Artificial intelligence for sport activitity recognition. 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications – IDAACS 2019, V. 2, 628–632.
DOI: https://doi.org/10.1109/IDAACS.2019.8924243
Google Scholar
[4] Bisikalo O. et al.: Parameterization of the Stochastic Model for Evaluating Variable Small Data in the Shannon Entropy Basis. Entropy 25, 2023, 184 [https://doi.org/10.3390/e25020184].
DOI: https://doi.org/10.3390/e25020184
Google Scholar
[5] Dhangar K., Kulhare D., Khan A. A.: Proposed Intrusion Detection System. International Journal of Computer Applications 65(23), 2013, 46–50.
Google Scholar
[6] Emelyanova Yu. G. et al.: Neural network technology for detecting network attacks on information resources. Software systems: theory and applications 3(7), 2011, 3–15.
Google Scholar
[7] Haykin S.: Neural Networks and Learning Machines. Pearson Education, 2009.
Google Scholar
[8] Kolodchak O. M.: Modern methods of detecting anomalies in intrusion detection systems. Bulletin of the Lviv Polytechnic National University. Series "Computer Systems and Networks" 745, 2012, 98–104.
Google Scholar
[9] Korobiichuk I. et al.: Cyberattack classificator verification. Advanced Solutions in Diagnostics and Fault Tolerant Control, Springer International Publishing, 2018, 402–411.
DOI: https://doi.org/10.1007/978-3-319-64474-5_34
Google Scholar
[10] Lee J. et al.: Cyber Threat Detection Based on Artificial Neural Networks Using Event Profiles. IEEE Access 7, 2019, 165607–165626 [https://doi.org/10.1109/ACCESS.2019.2953095].
DOI: https://doi.org/10.1109/ACCESS.2019.2953095
Google Scholar
[11] Likhouzova T. A., Nosenko K. M., Pivtorak O. I.: Review of attack detection systems in network traffic. Adaptive automatic control systems 1(24), 2014, 67–75.
Google Scholar
[12] Meleshko Ye.: Method of collaborative filtration based on associative networks of users similarity. Advanced information systems 2(4), 2018, 55–59.
DOI: https://doi.org/10.20998/2522-9052.2018.4.09
Google Scholar
[13] Naseer S., Saleem Y., Khalid S.: Enhanced network anomaly detection based on deep neural networks. IEEE Access 6, 2018, 48231–48246.
DOI: https://doi.org/10.1109/ACCESS.2018.2863036
Google Scholar
[14] Pakhomova V. M., Konnov M. S.: Research of two approaches to detect network attacks using neural network technologies. Science and Transport Progress 3(87), 2020, 81–93.
DOI: https://doi.org/10.15802/stp2020/208233
Google Scholar
[15] Shestak Ya. et al.: Minimization of Information Losses in Data Centers as one of the Priority Areas of Information Security Technologies. IEEE 9th International Conference on Problems of Infocommunications, Science and Technology – PIC S&T, 2022, 227–230.
DOI: https://doi.org/10.1109/PICST57299.2022.10238649
Google Scholar
[16] Timchenko L. I. et al.: Approach to parallel-hierarchical network learning for real-time image sequences recognition, Proc. Machine Vision Systems for Inspection and Metrology VII, Boston (Massachusetts USA), 1999.
DOI: https://doi.org/10.1117/12.360283
Google Scholar
[17] Timchenko L. et al.: Q-processors for real-time image processing. Proc. SPIE 11581, 2020, 115810F.
Google Scholar
[18] Turlykozhayeva D. et al.: Routing Algorithm for Software Defined Network Based on Boxcovering Algorithm. 10th International Conference on Wireless Networks and Mobile Communications – WINCOM, 2023.
DOI: https://doi.org/10.1109/WINCOM59760.2023.10322960
Google Scholar
[19] Turlykozhayeva D. et al.: Routing metric and protocol for wireless mesh network based on information entropy theory. Eurasian Physical Technical Journal 46, 2008, 90–98.
Google Scholar
[20] Ulichev O. S. et al.: Computer modeling of dissemination of informational influences in social networks with different strategies of information distributors. Proc. SPIE 11176, 2019, 111761T.
DOI: https://doi.org/10.1117/12.2536480
Google Scholar
[21] Wu Y., Wei D., Feng J.: Network Attacks Detection Methods Based on Deep Learning Techniques: A Survey, Wiley, Open Access, 2020 [https://doi.org/10.1155/2020/8872923].
DOI: https://doi.org/10.1155/2020/8872923
Google Scholar
[22] Zh Z. Z. et al.: Cluster router based on eccentricity, Eurasian Physical Technical Journal 19(3(41)), 2022, 84–90.
DOI: https://doi.org/10.31489/2022No3/84-90
Google Scholar
Authors
Lubov Zahoruikol.zahoruiko@donnu.edu.ua
Vinnytsia National Technical University Ukraine
https://orcid.org/0000-0002-6958-8696
Authors
Tetiana MartianovaVinnytsia Regional Youth Centre Kvadrat Ukraine
Authors
Lyudmyla PolovenkoVinnytsia National Technical University Ukraine
https://orcid.org/0000-0002-9909-825X
Authors
Maiia KovalchukVinnytsia National Technical University Ukraine
Authors
Svitlana MerinovaVinnitsia Institute of Trade and Economics of Kyiv National University of Trade and Economics. Ukraine
Authors
Volodymyr ShakhovVinnytsia Mykhailo Kotsiubynskyi State Pedagogical University Ukraine
https://orcid.org/0000-0003-1535-2802
Authors
Bakhyt YeraliyevaM. Kh. Dulaty Taraz Regional University Kazakhstan
Statistics
Abstract views: 132PDF downloads: 70
Most read articles by the same author(s)
- Roman Kvуetnyy, Yuriy Bunyak, Olga Sofina, Oleksandr Kaduk, Orken Mamyrbayev, Vladyslav Baklaiev, Bakhyt Yeraliyeva, ADVERTISING BIDDING OPTIMIZATION BY TARGETING BASED ON SELF-LEARNING DATABASE , Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska: Vol. 13 No. 4 (2023)
- Petr Lezhniuk, Viacheslav Komar, Iryna Hunko, Daniyar Jarykbassov, Dinara Tussupzhanova, Bakhyt Yeraliyeva, Nazbek Katayev, NATURAL-SIMULATION MODEL OF PHOTOVOLTAIC STATION GENERATION IN PROCESS OF ELECTRICITY BALANCING IN ELECTRICAL POWER SYSTEM , Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska: Vol. 12 No. 3 (2022)
- Kostyantyn Ovchynnykov, Oleksandr Vasilevskyi, Volodymyr Sevastianov, Yurii Polievoda, Aliya Kalizhanova, Bakhyt Yeraliyeva, DETERMINATION OF THE OPTIMAL FREQUENCY OF THE PRIMARY MEASURING TRANSDUCER OF THE THICKNESS OF DIELECTRIC COATINGS OF METAL SURFACES , Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska: Vol. 12 No. 2 (2022)
- Serhii Zakharchenko, Tetiana Korobeinikova, Aigul Tungatarova, Bakhyt Yeraliyeva, NEW METHOD OF ON-LINE SUCCESSIVE-APPROXIMATION ADC CALIBRATION , Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska: Vol. 12 No. 2 (2022)
- Valeriy Kuzminykh, Oleksandr Koval, Yevhen Havrylko, Beibei Xu, Iryna Yepifanova, Shiwei Zhu, Nataliia Bieliaieva, Bakhyt Yeraliyeva, SYNCHRONIZATION OF EVENT-DRIVEN MANAGEMENT DURING DATA COLLECTION , Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska: Vol. 14 No. 4 (2024)