CONSTRUCTION OF ATTACK DETECTION SYSTEMS IN INFORMATION NETWORKS ON NEURAL NETWORK STRUCTURES
Open Access
- 1 January 2020
- journal article
- Published by Borys Grinchenko Kyiv University in Cybersecurity: Education, Science, Technique
- Vol. 2 (10), 169-183
- https://doi.org/10.28925/2663-4023.2020.10.169183
Abstract
Systems for detecting network intrusions and detecting signs of attacks on information systems have long been used as one of the necessary lines of defense of information systems. Today, intrusion and attack detection systems are usually software or hardware-software solutions that automate the process of monitoring events occurring in an information system or network, as well as independently analyze these events in search of signs of security problems. As the number of different types and ways of organizing unauthorized intrusions into foreign networks has increased significantly in recent years, attack detection systems (ATS) have become a necessary component of the security infrastructure of most organizations. The article proposes a software prototype of a network attack detection system based on selected methods of data mining and neural network structures. The conducted experimental researches confirm efficiency of the created model of detection for protection of an information network. Experiments with a software prototype showed high quality detection of network attacks based on neural network structures and methods of intelligent data distribution. The state of protection of information systems to counter cyber attacks is analyzed, which made it possible to draw conclusions that to ensure the security of cyberspace it is necessary to implement a set of systems and protection mechanisms, namely systems: delimitation of user access; firewall; cryptographic protection of information; virtual private networks; anti-virus protection of ITS elements; detection and prevention of intrusions; authentication, authorization and audit; data loss prevention; security and event management; security management.Keywords
This publication has 10 references indexed in Scilit:
- Signature and statistical analyzers in the cyber attack detection systemCollection "Information technology and security", 2019
- Analysis and Classification of Methods for Network Attack DetectionSPIIRAS Proceedings, 2016
- Analysis of Host-Based and Network-Based Intrusion Detection SystemInternational Journal of Computer Network and Information Security, 2014
- An Implementation of Intrusion Detection System Using Genetic AlgorithmInternational journal of Network Security & Its Applications, 2012
- A hierarchical intrusion detection model based on the PCA neural networksNeurocomputing, 2007
- Intrusion Detection SystemsPublished by IGI Global ,2005
- A Survey of Dimension Reduction TechniquesPublished by Office of Scientific and Technical Information (OSTI) ,2002
- Training a neural-network based intrusion detector to recognize novel attacksIEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, 2001
- Applying CMAC-based online learning to intrusion detectionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2000
- Application of the recurrent multilayer perceptron in modeling complex process dynamicsIEEE Transactions on Neural Networks, 1994