ISSN 0021-3454 (print version)
ISSN 2500-0381 (online version)
Menu

4
Issue
vol 67 / April, 2024
Article

DOI 10.17586/0021-3454- 2021-64-5-357-363

UDC 004.056.5

NEURAL NETWORKS APPLICATION TO NETWORK ATTACK DISCOVERY

T. V. Timochkina
Russian State Hydrometeorological University;


T. M. Tatarnikova
Saint Petersburg Electrotechnical University “LETI”, Saint Petersburg, 197376, Russian Federation; Russian State Hydrometeorological University, Saint Petersburg, 195196, Russian Federation; Head of Chair


E. D. Poimanova
Saint Petersburg State University of Aerospace Instrumentation, Saint Petersburg, 190000, Russian Federation; Senior lecturer


Read the full article 

Abstract. A method for network attacks discovery based on the choice of useful neural network parameters that characterize abnormal traffic, is proposed. Useful parameters are obtained with ranking all parameters of the neural network according to the degree of significance for detecting each attack. The ranking is carried out according to a system of rules that account for three criteria of a neural network efficiency: the general accuracy of the parameters classification, the training time of the network, and the time of its testing. To train the neural network, the well-known NSL – KDD attack database is used, which characterizes each attack by 41 information signs. The ranking makes it possible to reduce the number of features to 10. The neural network trained on useful parameters showed a high detection rate and classification accuracy for most of the attacks under consideration.
Keywords: neural networks, information security, intrusion detection, network attacks, information security system, database

References:
  1. Safronova E.O., Zhuk G.A. Young scientist, 2019, no. 23, pp. 27–30. (in Russ.)
  2. Tatarnikova T.M., Zhuravlev А.М. Software & Systems, 2018, no. 3, pp. 543–547. (in Russ.)
  3. https://m.habr.com/ru/post/358200/. (in Russ.)
  4. http://www.basegroup.ru/library/analysis/neural/math/. (in Russ.)
  5. A Deeper Dive into the NSL-KDD Data Set – Towards Data Science, https://towardsdatascience.com/a-deeper-dive-into-the-nsl-kdd-data-set-15c753364657.
  6. Ingre B., Yadav A., Soni A.K. Proceedings of the International Conference on Information and Communication Technology for Intelligent Systems, ICTIS, Ahmedabad, India, March 25–26, 2017, Cham, Springer, 2017, vol. 2, рр. 207–218.
  7. http://www.statsoft.ru/home/textbook/modules/stfacan.html.
  8. Jyothsna V., Prasad V.V.R. International Journal of Computer Applications, 2011, no. 7(28), pp. 26–35.
  9. Sadek R.A., Soliman M.S., and Elsayed H.S. International Journal of Computer Science Issues (IJCSI), 2013, no. 6(10), pp. 227–233.
  10. Tatarnikova T.M., Stepanov S.Yu., Petrov Ya.A., Sidorenko A.Yu. Software & Systems, 2020, no. 2, pp. 229–235. (in Russ.)