Анализ и классификация методов обнаружения сетевых атак

АА Браницкий, ИВ Котенко - Информатика и …, 2016 - proceedings.spiiras.nw.ru
Аннотация В работе рассматриваются различные методы обнаружения сетевых атак.
Основное внимание уделяется построению обобщенной классификационной схемы …

Hybridization of computational intelligence methods for attack detection in computer networks

A Branitskiy, I Kotenko - Journal of Computational Science, 2017 - Elsevier
The paper is devoted to identification and classification of network traffic connections by
various hybridization schemes with the goal of efficient network attack detection. For this …

Hidden fault analysis of FPGA projects for critical applications

O Drozd, I Perebeinos, O Martynyuk… - 2020 IEEE 15th …, 2020 - ieeexplore.ieee.org
This paper focuses on the problem of hidden faults, which is seen like a growth one inherent
in modern safety-related systems. The special feature of these is the designing for operation …

Analysis and classification of methods for network attack detection

AA Branitskiy, IV Kotenko - Труды СПИИРАН, 2016 - elibrary.ru
Different methods of detection of network attacks are considered in the paper. The paper
focuses on the construction of the generalized classification scheme of methods of network …

[HTML][HTML] Обнаружение сетевых атак на основе комплексирования нейронных, иммунных и нейронечетких классификаторов

АА Браницкий, ИВ Котенко - Информационно-управляющие …, 2015 - cyberleninka.ru
Несовершенство существующих методов обнаружения вторжений, а также
изменяющийся характер вредоносных действий со стороны атакующего приводят …

Network attack detection based on combination of neural, immune and neuro-fuzzy classifiers

A Branitskiy, I Kotenko - 2015 IEEE 18th International …, 2015 - ieeexplore.ieee.org
The paper considers an approach for detection of anomalous patterns of network
connections using artificial neural networks, immune systems, neuro-fuzzy classifiers and …

[HTML][HTML] Intelligent Information System for Product Promotion in Internet Market

K Lipianina-Honcharenko, C Wolff, A Sachenko… - Applied Sciences, 2023 - mdpi.com
The influence of Internet marketing has grown so much that producers must now reconfigure
their businesses from offline operation to online presence simply to meet user expectations …

Compression of network traffic parameters for detecting cyber attacks based on deep learning

M Komar, A Sachenko, V Golovko… - 2018 IEEE 9th …, 2018 - ieeexplore.ieee.org
The approach to compress network traffic parameters in systems for detecting attacks on
telecommunication networks using the neural network and nonlinear principal components …

High performance adaptive system for cyber attacks detection

M Komar, V Kochan, L Dubchak… - 2017 9th IEEE …, 2017 - ieeexplore.ieee.org
To increase the security of intrusion detection system, generalized structure of highly
performance adaptive system for cyber attacks detection was developed. To improve its …

Design of adaptive system of detection of cyber-attacks, based on the model of logical procedures and the coverage matrices of features

V Lakhno, S Kazmirchuk, Y Kovalenko… - Восточно …, 2016 - irbis-nbuv.gov.ua
DESIGN OF ADAPTIVE SYSTEM OF DETECTION OF CYBER-ATTACKS, BASED ON THE
MODEL OF LOGICAL PROCEDURES AND THE COVERAGE MATRICES OF F Page 1 …