{"title":"Architecture of a Multistage Anomaly Detection System in Computer Networks","authors":"M. Grekov","doi":"10.1109/SIBCON56144.2022.10002885","DOIUrl":null,"url":null,"abstract":"The operation of anomaly detection systems in modern computer networks, as a rule, is associated with the processing of large amounts of traffic. With the increase in the scale of computer networks and the growing complexity of network attacks, it becomes necessary to detect multi-stage attacks in real time. This paper presents the architecture of a multi-stage anomaly detection system. The features of the system are the use of generative adversarial neural networks and the minimization of processed traffic using an attacker’s behavior model. The described architecture has a multilevel structure and allows monitoring in distributed computer networks.","PeriodicalId":265523,"journal":{"name":"2022 International Siberian Conference on Control and Communications (SIBCON)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Siberian Conference on Control and Communications (SIBCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SIBCON56144.2022.10002885","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The operation of anomaly detection systems in modern computer networks, as a rule, is associated with the processing of large amounts of traffic. With the increase in the scale of computer networks and the growing complexity of network attacks, it becomes necessary to detect multi-stage attacks in real time. This paper presents the architecture of a multi-stage anomaly detection system. The features of the system are the use of generative adversarial neural networks and the minimization of processed traffic using an attacker’s behavior model. The described architecture has a multilevel structure and allows monitoring in distributed computer networks.