MATHEMATICAL MODEL AND STRUCTURE OF A NEURAL NETWORK FOR DETECTION OF CYBER ATTACKS ON INFORMATION AND COMMUNICATION SYSTEMS

Lubov Zahoruiko

l.zahoruiko@donnu.edu.ua
Vinnytsia National Technical University (Ukraine)
https://orcid.org/0000-0002-6958-8696

Tetiana Martianova


Vinnytsia Regional Youth Centre Kvadrat (Ukraine)

Mohammad Al-Hiari


Jadara University (Jordan)
https://orcid.org/0009-0002-2770-5417

Lyudmyla Polovenko


Vinnytsia National Technical University (Ukraine)
https://orcid.org/0000-0002-9909-825X

Maiia Kovalchuk


Vinnytsia National Technical University (Ukraine)

Svitlana Merinova


Vinnitsia Institute of Trade and Economics of Kyiv National University of Trade and Economics. (Ukraine)

Volodymyr Shakhov


Vinnytsia Mykhailo Kotsiubynskyi State Pedagogical University (Ukraine)
https://orcid.org/0000-0003-1535-2802

Bakhyt Yeraliyeva


M. Kh. Dulaty Taraz Regional University (Kazakhstan)

Abstract

The paper discusses the principles of creating a mathematical model and system architecture by applying the method of artificial intelligence to detect cyberattacks on information and communication systems, where a neural network capable of learning and detecting cyberattacks is used. The proposed approach, based on the application of the developed mathematical model and architecture of artificial neural networks, as a detector of network attacks on information and communication systems, allows to increase the level of detection of network intrusions into computer systems, Web and Internet resources. An algorithm for processing network traffic parameters in real-time systems by structuring a neural network is proposed, which allows to optimize the redundancy of its multi-level structure at the level of inter-element connections.


Keywords:

neural networks, network traffic, network connection, cyber attack, information and communication system.

[1] Andrushchenko M. et al.: Hand Movement Disorders Tracking By Smartphone Based On Computer Vision Methods. Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska – IAPGOS 14(2), 2024, 5–10 [https://doi.org/10.35784/iapgos.6126].
DOI: https://doi.org/10.35784/iapgos.6126   Google Scholar

[2] Avrunin O. et al.: Improving the methods for visualization of middle ear pathologies based on telemedicine services in remote treatment. IEEE KhPI Week on Advanced Technology – KhPI Week 2020, 347–350 [https://doi:10.1109/KhPIWeek51551.2020.9250090].
DOI: https://doi.org/10.1109/KhPIWeek51551.2020.9250090   Google Scholar

[3] Bezobrazov S. et al.: Artificial intelligence for sport activitity recognition. 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications – IDAACS 2019, V. 2, 628–632.
DOI: https://doi.org/10.1109/IDAACS.2019.8924243   Google Scholar

[4] Bisikalo O. et al.: Parameterization of the Stochastic Model for Evaluating Variable Small Data in the Shannon Entropy Basis. Entropy 25, 2023, 184 [https://doi.org/10.3390/e25020184].
DOI: https://doi.org/10.3390/e25020184   Google Scholar

[5] Dhangar K., Kulhare D., Khan A. A.: Proposed Intrusion Detection System. International Journal of Computer Applications 65(23), 2013, 46–50.
  Google Scholar

[6] Emelyanova Yu. G. et al.: Neural network technology for detecting network attacks on information resources. Software systems: theory and applications 3(7), 2011, 3–15.
  Google Scholar

[7] Haykin S.: Neural Networks and Learning Machines. Pearson Education, 2009.
  Google Scholar

[8] Kolodchak O. M.: Modern methods of detecting anomalies in intrusion detection systems. Bulletin of the Lviv Polytechnic National University. Series "Computer Systems and Networks" 745, 2012, 98–104.
  Google Scholar

[9] Korobiichuk I. et al.: Cyberattack classificator verification. Advanced Solutions in Diagnostics and Fault Tolerant Control, Springer International Publishing, 2018, 402–411.
DOI: https://doi.org/10.1007/978-3-319-64474-5_34   Google Scholar

[10] Lee J. et al.: Cyber Threat Detection Based on Artificial Neural Networks Using Event Profiles. IEEE Access 7, 2019, 165607–165626 [https://doi.org/10.1109/ACCESS.2019.2953095].
DOI: https://doi.org/10.1109/ACCESS.2019.2953095   Google Scholar

[11] Likhouzova T. A., Nosenko K. M., Pivtorak O. I.: Review of attack detection systems in network traffic. Adaptive automatic control systems 1(24), 2014, 67–75.
  Google Scholar

[12] Meleshko Ye.: Method of collaborative filtration based on associative networks of users similarity. Advanced information systems 2(4), 2018, 55–59.
DOI: https://doi.org/10.20998/2522-9052.2018.4.09   Google Scholar

[13] Naseer S., Saleem Y., Khalid S.: Enhanced network anomaly detection based on deep neural networks. IEEE Access 6, 2018, 48231–48246.
DOI: https://doi.org/10.1109/ACCESS.2018.2863036   Google Scholar

[14] Pakhomova V. M., Konnov M. S.: Research of two approaches to detect network attacks using neural network technologies. Science and Transport Progress 3(87), 2020, 81–93.
DOI: https://doi.org/10.15802/stp2020/208233   Google Scholar

[15] Shestak Ya. et al.: Minimization of Information Losses in Data Centers as one of the Priority Areas of Information Security Technologies. IEEE 9th International Conference on Problems of Infocommunications, Science and Technology – PIC S&T, 2022, 227–230.
DOI: https://doi.org/10.1109/PICST57299.2022.10238649   Google Scholar

[16] Timchenko L. I. et al.: Approach to parallel-hierarchical network learning for real-time image sequences recognition, Proc. Machine Vision Systems for Inspection and Metrology VII, Boston (Massachusetts USA), 1999.
DOI: https://doi.org/10.1117/12.360283   Google Scholar

[17] Timchenko L. et al.: Q-processors for real-time image processing. Proc. SPIE 11581, 2020, 115810F.
  Google Scholar

[18] Turlykozhayeva D. et al.: Routing Algorithm for Software Defined Network Based on Boxcovering Algorithm. 10th International Conference on Wireless Networks and Mobile Communications – WINCOM, 2023.
DOI: https://doi.org/10.1109/WINCOM59760.2023.10322960   Google Scholar

[19] Turlykozhayeva D. et al.: Routing metric and protocol for wireless mesh network based on information entropy theory. Eurasian Physical Technical Journal 46, 2008, 90–98.
  Google Scholar

[20] Ulichev O. S. et al.: Computer modeling of dissemination of informational influences in social networks with different strategies of information distributors. Proc. SPIE 11176, 2019, 111761T.
DOI: https://doi.org/10.1117/12.2536480   Google Scholar

[21] Wu Y., Wei D., Feng J.: Network Attacks Detection Methods Based on Deep Learning Techniques: A Survey, Wiley, Open Access, 2020 [https://doi.org/10.1155/2020/8872923].
DOI: https://doi.org/10.1155/2020/8872923   Google Scholar

[22] Zh Z. Z. et al.: Cluster router based on eccentricity, Eurasian Physical Technical Journal 19(3(41)), 2022, 84–90.
DOI: https://doi.org/10.31489/2022No3/84-90   Google Scholar

Download


Published
2024-09-30

Cited by

Zahoruiko, L., Martianova, T., Al-Hiari, M., Polovenko, L., Kovalchuk, M., Merinova, S., … Yeraliyeva, B. (2024). MATHEMATICAL MODEL AND STRUCTURE OF A NEURAL NETWORK FOR DETECTION OF CYBER ATTACKS ON INFORMATION AND COMMUNICATION SYSTEMS. Informatyka, Automatyka, Pomiary W Gospodarce I Ochronie Środowiska, 14(3), 49–55. https://doi.org/10.35784/iapgos.6155

Authors

Lubov Zahoruiko 
l.zahoruiko@donnu.edu.ua
Vinnytsia National Technical University Ukraine
https://orcid.org/0000-0002-6958-8696

Authors

Tetiana Martianova 

Vinnytsia Regional Youth Centre Kvadrat Ukraine

Authors

Mohammad Al-Hiari 

Jadara University Jordan
https://orcid.org/0009-0002-2770-5417

Authors

Lyudmyla Polovenko 

Vinnytsia National Technical University Ukraine
https://orcid.org/0000-0002-9909-825X

Authors

Maiia Kovalchuk 

Vinnytsia National Technical University Ukraine

Authors

Svitlana Merinova 

Vinnitsia Institute of Trade and Economics of Kyiv National University of Trade and Economics. Ukraine

Authors

Volodymyr Shakhov 

Vinnytsia Mykhailo Kotsiubynskyi State Pedagogical University Ukraine
https://orcid.org/0000-0003-1535-2802

Authors

Bakhyt Yeraliyeva 

M. Kh. Dulaty Taraz Regional University Kazakhstan

Statistics

Abstract views: 132
PDF downloads: 70


License

Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.


Most read articles by the same author(s)