MODEL MATEMATYCZNY I STRUKTURA SIECI NEURONOWEJ DO WYKRYWANIA CYBERATAKÓW NA SYSTEMY TELEINFORMATYCZNE I KOMUNIKACYJNE

Lubov Zahoruiko

l.zahoruiko@donnu.edu.ua
Vinnytsia National Technical University (Ukraina)
https://orcid.org/0000-0002-6958-8696

Tetiana Martianova


Vinnytsia Regional Youth Centre Kvadrat (Ukraina)

Mohammad Al-Hiari


Jadara University (Jordania)
https://orcid.org/0009-0002-2770-5417

Lyudmyla Polovenko


Vinnytsia National Technical University (Ukraina)
https://orcid.org/0000-0002-9909-825X

Maiia Kovalchuk


Vinnytsia National Technical University (Ukraina)

Svitlana Merinova


Vinnitsia Institute of Trade and Economics of Kyiv National University of Trade and Economics. (Ukraina)

Volodymyr Shakhov


Vinnytsia Mykhailo Kotsiubynskyi State Pedagogical University (Ukraina)
https://orcid.org/0000-0003-1535-2802

Bakhyt Yeraliyeva


M. Kh. Dulaty Taraz Regional University (Kazachstan)

Abstrakt

W artykule omówiono zasady tworzenia modelu matematycznego i architektury systemu poprzez zastosowanie metody sztucznej inteligencji do wykrywania cyberataków na systemy teleinformatyczne, gdzie wykorzystywana jest sieć neuronowa zdolna do uczenia się i wykrywania cyberataków. Proponowane podejście, oparte na zastosowaniu opracowanego modelu matematycznego i architektury sztucznych sieci neuronowych, jako detektora ataków sieciowych na systemy teleinformatyczne, pozwala na zwiększenie poziomu wykrywania włamań sieciowych do systemów komputerowych, zasobów sieciowych i internetowych. Zaproponowano algorytm przetwarzania parametrów ruchu sieciowego w systemach czasu rzeczywistego poprzez strukturyzację sieci neuronowej, co pozwala na optymalizację redundancji jej wielopoziomowej struktury na poziomie połączeń międzyelementowych.


Słowa kluczowe:

sieci neuronowe, ruch sieciowy, połączenie sieciowe, cyberatak, system teleinformatyczny

[1] Andrushchenko M. et al.: Hand Movement Disorders Tracking By Smartphone Based On Computer Vision Methods. Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska – IAPGOS 14(2), 2024, 5–10 [https://doi.org/10.35784/iapgos.6126].
DOI: https://doi.org/10.35784/iapgos.6126   Google Scholar

[2] Avrunin O. et al.: Improving the methods for visualization of middle ear pathologies based on telemedicine services in remote treatment. IEEE KhPI Week on Advanced Technology – KhPI Week 2020, 347–350 [https://doi:10.1109/KhPIWeek51551.2020.9250090].
DOI: https://doi.org/10.1109/KhPIWeek51551.2020.9250090   Google Scholar

[3] Bezobrazov S. et al.: Artificial intelligence for sport activitity recognition. 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications – IDAACS 2019, V. 2, 628–632.
DOI: https://doi.org/10.1109/IDAACS.2019.8924243   Google Scholar

[4] Bisikalo O. et al.: Parameterization of the Stochastic Model for Evaluating Variable Small Data in the Shannon Entropy Basis. Entropy 25, 2023, 184 [https://doi.org/10.3390/e25020184].
DOI: https://doi.org/10.3390/e25020184   Google Scholar

[5] Dhangar K., Kulhare D., Khan A. A.: Proposed Intrusion Detection System. International Journal of Computer Applications 65(23), 2013, 46–50.
  Google Scholar

[6] Emelyanova Yu. G. et al.: Neural network technology for detecting network attacks on information resources. Software systems: theory and applications 3(7), 2011, 3–15.
  Google Scholar

[7] Haykin S.: Neural Networks and Learning Machines. Pearson Education, 2009.
  Google Scholar

[8] Kolodchak O. M.: Modern methods of detecting anomalies in intrusion detection systems. Bulletin of the Lviv Polytechnic National University. Series "Computer Systems and Networks" 745, 2012, 98–104.
  Google Scholar

[9] Korobiichuk I. et al.: Cyberattack classificator verification. Advanced Solutions in Diagnostics and Fault Tolerant Control, Springer International Publishing, 2018, 402–411.
DOI: https://doi.org/10.1007/978-3-319-64474-5_34   Google Scholar

[10] Lee J. et al.: Cyber Threat Detection Based on Artificial Neural Networks Using Event Profiles. IEEE Access 7, 2019, 165607–165626 [https://doi.org/10.1109/ACCESS.2019.2953095].
DOI: https://doi.org/10.1109/ACCESS.2019.2953095   Google Scholar

[11] Likhouzova T. A., Nosenko K. M., Pivtorak O. I.: Review of attack detection systems in network traffic. Adaptive automatic control systems 1(24), 2014, 67–75.
  Google Scholar

[12] Meleshko Ye.: Method of collaborative filtration based on associative networks of users similarity. Advanced information systems 2(4), 2018, 55–59.
DOI: https://doi.org/10.20998/2522-9052.2018.4.09   Google Scholar

[13] Naseer S., Saleem Y., Khalid S.: Enhanced network anomaly detection based on deep neural networks. IEEE Access 6, 2018, 48231–48246.
DOI: https://doi.org/10.1109/ACCESS.2018.2863036   Google Scholar

[14] Pakhomova V. M., Konnov M. S.: Research of two approaches to detect network attacks using neural network technologies. Science and Transport Progress 3(87), 2020, 81–93.
DOI: https://doi.org/10.15802/stp2020/208233   Google Scholar

[15] Shestak Ya. et al.: Minimization of Information Losses in Data Centers as one of the Priority Areas of Information Security Technologies. IEEE 9th International Conference on Problems of Infocommunications, Science and Technology – PIC S&T, 2022, 227–230.
DOI: https://doi.org/10.1109/PICST57299.2022.10238649   Google Scholar

[16] Timchenko L. I. et al.: Approach to parallel-hierarchical network learning for real-time image sequences recognition, Proc. Machine Vision Systems for Inspection and Metrology VII, Boston (Massachusetts USA), 1999.
DOI: https://doi.org/10.1117/12.360283   Google Scholar

[17] Timchenko L. et al.: Q-processors for real-time image processing. Proc. SPIE 11581, 2020, 115810F.
  Google Scholar

[18] Turlykozhayeva D. et al.: Routing Algorithm for Software Defined Network Based on Boxcovering Algorithm. 10th International Conference on Wireless Networks and Mobile Communications – WINCOM, 2023.
DOI: https://doi.org/10.1109/WINCOM59760.2023.10322960   Google Scholar

[19] Turlykozhayeva D. et al.: Routing metric and protocol for wireless mesh network based on information entropy theory. Eurasian Physical Technical Journal 46, 2008, 90–98.
  Google Scholar

[20] Ulichev O. S. et al.: Computer modeling of dissemination of informational influences in social networks with different strategies of information distributors. Proc. SPIE 11176, 2019, 111761T.
DOI: https://doi.org/10.1117/12.2536480   Google Scholar

[21] Wu Y., Wei D., Feng J.: Network Attacks Detection Methods Based on Deep Learning Techniques: A Survey, Wiley, Open Access, 2020 [https://doi.org/10.1155/2020/8872923].
DOI: https://doi.org/10.1155/2020/8872923   Google Scholar

[22] Zh Z. Z. et al.: Cluster router based on eccentricity, Eurasian Physical Technical Journal 19(3(41)), 2022, 84–90.
DOI: https://doi.org/10.31489/2022No3/84-90   Google Scholar


Opublikowane
2024-09-30

Cited By / Share

Zahoruiko, L., Martianova, T., Al-Hiari, M., Polovenko, L., Kovalchuk, M., Merinova, S., … Yeraliyeva, B. (2024). MODEL MATEMATYCZNY I STRUKTURA SIECI NEURONOWEJ DO WYKRYWANIA CYBERATAKÓW NA SYSTEMY TELEINFORMATYCZNE I KOMUNIKACYJNE. Informatyka, Automatyka, Pomiary W Gospodarce I Ochronie Środowiska, 14(3), 49–55. https://doi.org/10.35784/iapgos.6155

Autorzy

Lubov Zahoruiko 
l.zahoruiko@donnu.edu.ua
Vinnytsia National Technical University Ukraina
https://orcid.org/0000-0002-6958-8696

Autorzy

Tetiana Martianova 

Vinnytsia Regional Youth Centre Kvadrat Ukraina

Autorzy

Mohammad Al-Hiari 

Jadara University Jordania
https://orcid.org/0009-0002-2770-5417

Autorzy

Lyudmyla Polovenko 

Vinnytsia National Technical University Ukraina
https://orcid.org/0000-0002-9909-825X

Autorzy

Maiia Kovalchuk 

Vinnytsia National Technical University Ukraina

Autorzy

Svitlana Merinova 

Vinnitsia Institute of Trade and Economics of Kyiv National University of Trade and Economics. Ukraina

Autorzy

Volodymyr Shakhov 

Vinnytsia Mykhailo Kotsiubynskyi State Pedagogical University Ukraina
https://orcid.org/0000-0003-1535-2802

Autorzy

Bakhyt Yeraliyeva 

M. Kh. Dulaty Taraz Regional University Kazachstan

Statystyki

Abstract views: 89
PDF downloads: 41


Licencja

Creative Commons License

Utwór dostępny jest na licencji Creative Commons Uznanie autorstwa 4.0 Międzynarodowe.