MATHEMATICAL MODEL AND STRUCTURE OF A NEURAL NETWORK FOR DETECTION OF CYBER ATTACKS ON INFORMATION AND COMMUNICATION SYSTEMS
Article Sidebar
Open full text
Issue Vol. 14 No. 3 (2024)
-
THEORETICAL APPROACH FOR DETERMINING AN EMISSIVITY OF SOLID MATERIALS AND ITS COMPARISON WITH EXPERIMENTAL STUDIES ON THE EXAMPLE OF 316L POWDER STEEL
Oleksandr Vasilevskyi, Michael Cullinan, Jared Allison5-8
-
INFORMATION SYSTEM FOR DETECTION OF PARAMETERS OF DANGEROUS INDUSTRIAL FACILITIES BASED ON GEOINFORMATION TECHNOLOGIES
Oleg Barabash, Olha Svynchuk, Olena Bandurka, Oleh Ilin9-14
-
PERIODIC ATEB-FUNCTIONS AND THE VAN DER POL METHOD FOR CONSTRUCTING SOLUTIONS OF TWO-DIMENSIONAL NONLINEAR OSCILLATIONS MODELS OF ELASTIC BODIES
Yaroslav Romanchuk, Mariia Sokil, Leonid Polishchuk15-20
-
UTILIZING GAUSSIAN PROCESS REGRESSION FOR NONLINEAR MAGNETIC SEPARATION PROCESS IDENTIFICATION
Oleksandr Volovetskyi21-28
-
TWO-DIMENSIONAL HYPERCHAOTIC MAP FOR CHAOTIC OSCILLATIONS
Oleh Krulikovskyi, Serhii Haliuk, Ihor Safronov, Valentyn Lesinskyi29-34
-
NEUROBIOLOGICAL PROPERTIES OF THE STRUCTURE OF THE PARALLEL-HIERARCHICAL NETWORK AND ITS USAGE FOR PATTERN RECOGNITION
Leonid Timchenko, Natalia Kokriatskaia, Volodymyr Tverdomed, Anatolii Horban, Oleksandr Sobovyi, Liudmyla Pogrebniak, Nelia Burlaka, Yurii Didenko, Maksym Kozyr, Ainur Kozbakova35-38
-
MODELS OF FALSE AND CORRECT DETECTION OF INFORMATION LEAKAGE SIGNALS FROM MONITOR SCREENS BY A SPECIALIZED TECHNICAL MEANS OF ENEMY INTELLIGENCE
Dmytro Yevgrafov, Yurii Yaremchuk39-42
-
STREAMLINING DIGITAL CORRELATION-INTERFEROMETRIC DIRECTION FINDING WITH SPATIAL ANALYTICAL SIGNAL
Nurzhigit Smailov, Vitaliy Tsyporenko, Akezhan Sabibolda, Valentyn Tsyporenko, Askar Abdykadyrov, Assem Kabdoldina, Zhandos Dosbayev, Zhomart Ualiyev, Rashida Kadyrova43-48
-
MATHEMATICAL MODEL AND STRUCTURE OF A NEURAL NETWORK FOR DETECTION OF CYBER ATTACKS ON INFORMATION AND COMMUNICATION SYSTEMS
Lubov Zahoruiko, Tetiana Martianova, Mohammad Al-Hiari, Lyudmyla Polovenko, Maiia Kovalchuk, Svitlana Merinova, Volodymyr Shakhov, Bakhyt Yeraliyeva49-55
-
A METHOD FOR FORMING A TRUNCATED POSITIONAL CODE SYSTEM FOR TRANSFORMED VIDEO IMAGES
Volodymyr Barannik, Roman Onyshchenko, Gennady Pris, Mykhailo Babenko, Valeriy Barannik, Vitalii Shmakov, Ivan Pantas56-60
-
Z-NUMBERS BASED MODELING OF GROUP DECISION MAKING FOR SUPPLIER SELECTION IN MANUFACTURING SYSTEMS
Kamala Aliyeva61-67
-
OPTIMIZATION OF AN INTELLIGENT CONTROLLED BRIDGELESS POSITIVE LUO CONVERTER FOR LOW-CAPACITY ELECTRIC VEHICLES
Rangaswamy Balamurugan, Ramasamy Nithya68-70
-
MODIFIED VGG16 FOR ACCURATE BRAIN TUMOR DETECTION IN MRI IMAGERY
Katuri Rama Krishna, Mohammad Arbaaz, Surya Naga Chandra Dhanekula, Yagna Mithra Vallabhaneni71-75
-
IOT BASED ECG: HYBRID CNN-BILSTM APPROACH FOR MYOCARDIAL INFARCTION CLASSIFICATION
Abdelmalek Makhir, My Hachem El Yousfi Alaoui, Larbi Bellarbi, Abdelilah Jilbab76-80
-
INTEGRATED HYBRID MODEL FOR LUNG DISEASE DETECTION THROUGH DEEP LEARNING
Budati Jaya Lakshmi Narayana, Gopireddy Krishna Teja Reddy, Sujana Sri Kosaraju, Sirigiri Rajeev Choudhary81-85
-
POLARIZATION-CORRELATION MAPPING OF MICROSCOPIC IMAGES OF BIOLOGICAL TISSUES OF DIFFERENT MORPHOLOGICAL STRUCTURE
Nataliia Kozan, Oleksandr Saleha, Olexander Dubolazov, Yuriy Ushenko, Iryna Soltys, Oleksandr Ushenko, Oleksandr Olar, Victor Paliy, Saule Smailova86-90
-
REAL-TIME DETECTION AND CLASSIFICATION OF FISH IN UNDERWATER ENVIRONMENT USING YOLOV5: A COMPARATIVE STUDY OF DEEP LEARNING ARCHITECTURES
Rizki Multajam, Ahmad Faisal Mohamad Ayob, W.S. Mada Sanjaya, Aceng Sambas, Volodymyr Rusyn, Andrii Samila91-95
-
WEED DETECTION ON CARROTS USING CONVOLUTIONAL NEURAL NETWORK AND INTERNET OF THING BASED SMARTPHONE
Lintang Patria, Aceng Sambas, Ibrahim Mohammed Sulaiman, Mohamed Afendee Mohamed, Volodymyr Rusyn, Andrii Samila96-100
-
ANALYSIS AND STUDY OF ROLLING PARAMETERS OF COILS ON AN INCLINED PLANE
Larysa Gumeniuk, Lesya Fedik, Volodymyr Didukh, Pavlo Humeniuk101-104
-
ANALYSIS OF CONTENT RECOMMENDATION METHODS IN INFORMATION SERVICES
Oleksandr Necheporuk, Svitlana Vashchenko, Nataliia Fedotova, Iryna Baranova, Yaroslava Dehtiarenko105-108
-
DETERMINING STUDENT'S ONLINE ACADEMIC PERFORMANCE USING MACHINE LEARNING TECHNIQUES
Atika Islam, Faisal Bukhari, Muhammad Awais Sattar, Ayesha Kashif109-117
-
ENTROPY BASED EVALUATION OF THE IMPACT OF EDUCATION ON ECONOMIC DEVELOPMENT
Yelyzaveta Mykhailova, Nataliia Savina, Volodymyr Lytvynenko, Stanislav Mykhailov118-122
-
INFORMATION SYSTEM FOR ASSESSING THE LEVEL OF HUMAN CAPITAL MANAGEMENT
Anzhelika Azarova, Larysa Azarova, Iurii Krak, Olga Ruzakova, Veronika Azarova123-128
-
DECENTRALIZED PLATFORM FOR FINANCING CHARITY PROJECTS
Iryna Segeda, Vladyslav Kotsiuba, Oleksii Shushura, Viktoriia Bokovets, Natalia Koval, Aliya Kalizhanova129-134
Archives
-
Vol. 15 No. 3
2025-09-30 24
-
Vol. 15 No. 2
2025-06-27 24
-
Vol. 15 No. 1
2025-03-31 26
-
Vol. 14 No. 4
2024-12-21 25
-
Vol. 14 No. 3
2024-09-30 24
-
Vol. 14 No. 2
2024-06-30 24
-
Vol. 14 No. 1
2024-03-31 23
-
Vol. 13 No. 4
2023-12-20 24
-
Vol. 13 No. 3
2023-09-30 25
-
Vol. 13 No. 2
2023-06-30 14
-
Vol. 13 No. 1
2023-03-31 12
-
Vol. 12 No. 4
2022-12-30 16
-
Vol. 12 No. 3
2022-09-30 15
-
Vol. 12 No. 2
2022-06-30 16
-
Vol. 12 No. 1
2022-03-31 9
-
Vol. 10 No. 4
2020-12-20 16
-
Vol. 10 No. 3
2020-09-30 22
-
Vol. 10 No. 2
2020-06-30 16
-
Vol. 10 No. 1
2020-03-30 19
Main Article Content
DOI
Authors
Abstract
The paper discusses the principles of creating a mathematical model and system architecture by applying the method of artificial intelligence to detect cyberattacks on information and communication systems, where a neural network capable of learning and detecting cyberattacks is used. The proposed approach, based on the application of the developed mathematical model and architecture of artificial neural networks, as a detector of network attacks on information and communication systems, allows to increase the level of detection of network intrusions into computer systems, Web and Internet resources. An algorithm for processing network traffic parameters in real-time systems by structuring a neural network is proposed, which allows to optimize the redundancy of its multi-level structure at the level of inter-element connections.
Keywords:
References
[1] Andrushchenko M. et al.: Hand Movement Disorders Tracking By Smartphone Based On Computer Vision Methods. Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska – IAPGOS 14(2), 2024, 5–10 [https://doi.org/10.35784/iapgos.6126]. DOI: https://doi.org/10.35784/iapgos.6126
[2] Avrunin O. et al.: Improving the methods for visualization of middle ear pathologies based on telemedicine services in remote treatment. IEEE KhPI Week on Advanced Technology – KhPI Week 2020, 347–350 [https://doi:10.1109/KhPIWeek51551.2020.9250090]. DOI: https://doi.org/10.1109/KhPIWeek51551.2020.9250090
[3] Bezobrazov S. et al.: Artificial intelligence for sport activitity recognition. 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications – IDAACS 2019, V. 2, 628–632. DOI: https://doi.org/10.1109/IDAACS.2019.8924243
[4] Bisikalo O. et al.: Parameterization of the Stochastic Model for Evaluating Variable Small Data in the Shannon Entropy Basis. Entropy 25, 2023, 184 [https://doi.org/10.3390/e25020184]. DOI: https://doi.org/10.3390/e25020184
[5] Dhangar K., Kulhare D., Khan A. A.: Proposed Intrusion Detection System. International Journal of Computer Applications 65(23), 2013, 46–50.
[6] Emelyanova Yu. G. et al.: Neural network technology for detecting network attacks on information resources. Software systems: theory and applications 3(7), 2011, 3–15.
[7] Haykin S.: Neural Networks and Learning Machines. Pearson Education, 2009.
[8] Kolodchak O. M.: Modern methods of detecting anomalies in intrusion detection systems. Bulletin of the Lviv Polytechnic National University. Series "Computer Systems and Networks" 745, 2012, 98–104.
[9] Korobiichuk I. et al.: Cyberattack classificator verification. Advanced Solutions in Diagnostics and Fault Tolerant Control, Springer International Publishing, 2018, 402–411. DOI: https://doi.org/10.1007/978-3-319-64474-5_34
[10] Lee J. et al.: Cyber Threat Detection Based on Artificial Neural Networks Using Event Profiles. IEEE Access 7, 2019, 165607–165626 [https://doi.org/10.1109/ACCESS.2019.2953095]. DOI: https://doi.org/10.1109/ACCESS.2019.2953095
[11] Likhouzova T. A., Nosenko K. M., Pivtorak O. I.: Review of attack detection systems in network traffic. Adaptive automatic control systems 1(24), 2014, 67–75.
[12] Meleshko Ye.: Method of collaborative filtration based on associative networks of users similarity. Advanced information systems 2(4), 2018, 55–59. DOI: https://doi.org/10.20998/2522-9052.2018.4.09
[13] Naseer S., Saleem Y., Khalid S.: Enhanced network anomaly detection based on deep neural networks. IEEE Access 6, 2018, 48231–48246. DOI: https://doi.org/10.1109/ACCESS.2018.2863036
[14] Pakhomova V. M., Konnov M. S.: Research of two approaches to detect network attacks using neural network technologies. Science and Transport Progress 3(87), 2020, 81–93. DOI: https://doi.org/10.15802/stp2020/208233
[15] Shestak Ya. et al.: Minimization of Information Losses in Data Centers as one of the Priority Areas of Information Security Technologies. IEEE 9th International Conference on Problems of Infocommunications, Science and Technology – PIC S&T, 2022, 227–230. DOI: https://doi.org/10.1109/PICST57299.2022.10238649
[16] Timchenko L. I. et al.: Approach to parallel-hierarchical network learning for real-time image sequences recognition, Proc. Machine Vision Systems for Inspection and Metrology VII, Boston (Massachusetts USA), 1999. DOI: https://doi.org/10.1117/12.360283
[17] Timchenko L. et al.: Q-processors for real-time image processing. Proc. SPIE 11581, 2020, 115810F.
[18] Turlykozhayeva D. et al.: Routing Algorithm for Software Defined Network Based on Boxcovering Algorithm. 10th International Conference on Wireless Networks and Mobile Communications – WINCOM, 2023. DOI: https://doi.org/10.1109/WINCOM59760.2023.10322960
[19] Turlykozhayeva D. et al.: Routing metric and protocol for wireless mesh network based on information entropy theory. Eurasian Physical Technical Journal 46, 2008, 90–98.
[20] Ulichev O. S. et al.: Computer modeling of dissemination of informational influences in social networks with different strategies of information distributors. Proc. SPIE 11176, 2019, 111761T. DOI: https://doi.org/10.1117/12.2536480
[21] Wu Y., Wei D., Feng J.: Network Attacks Detection Methods Based on Deep Learning Techniques: A Survey, Wiley, Open Access, 2020 [https://doi.org/10.1155/2020/8872923]. DOI: https://doi.org/10.1155/2020/8872923
[22] Zh Z. Z. et al.: Cluster router based on eccentricity, Eurasian Physical Technical Journal 19(3(41)), 2022, 84–90. DOI: https://doi.org/10.31489/2022No3/84-90
Article Details
Abstract views: 329

