E. Pavlenko, Nikita Gololobov, D. Lavrova, Andrey Kozachok
{"title":"基于递归神经网络的大规模系统自适应网络拓扑网络威胁识别","authors":"E. Pavlenko, Nikita Gololobov, D. Lavrova, Andrey Kozachok","doi":"10.21681/2311-3456-2022-6-93-99","DOIUrl":null,"url":null,"abstract":"The purpose of the article: the development of a method for recognizing cyber threats in adaptive network topologies of large-scale systems based on a recurrent neural network with a long short-term memory. Main research methods: system analysis of existing recognition methods, theoretical formalization, experiment Result: The approach showed a satisfactory efficiency of cyber threat recognition, and the results of the research made it possible to put forward proposals for the further development of this area. Scientific novelty: A model of adaptive network topology is formulated and a new way of recognizing cyber threats on the adaptive network topology of large-scale systems is proposed.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"RECOGNITION OF CYBER THREATS ON THE ADAPTIVE NETWORK TOPOLOGY OF LARGE-SCALE SYSTEMS BASED ON A RECURRENT NEURAL NETWORK\",\"authors\":\"E. Pavlenko, Nikita Gololobov, D. Lavrova, Andrey Kozachok\",\"doi\":\"10.21681/2311-3456-2022-6-93-99\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The purpose of the article: the development of a method for recognizing cyber threats in adaptive network topologies of large-scale systems based on a recurrent neural network with a long short-term memory. Main research methods: system analysis of existing recognition methods, theoretical formalization, experiment Result: The approach showed a satisfactory efficiency of cyber threat recognition, and the results of the research made it possible to put forward proposals for the further development of this area. Scientific novelty: A model of adaptive network topology is formulated and a new way of recognizing cyber threats on the adaptive network topology of large-scale systems is proposed.\",\"PeriodicalId\":422818,\"journal\":{\"name\":\"Voprosy kiberbezopasnosti\",\"volume\":\"20 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Voprosy kiberbezopasnosti\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.21681/2311-3456-2022-6-93-99\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Voprosy kiberbezopasnosti","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21681/2311-3456-2022-6-93-99","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
RECOGNITION OF CYBER THREATS ON THE ADAPTIVE NETWORK TOPOLOGY OF LARGE-SCALE SYSTEMS BASED ON A RECURRENT NEURAL NETWORK
The purpose of the article: the development of a method for recognizing cyber threats in adaptive network topologies of large-scale systems based on a recurrent neural network with a long short-term memory. Main research methods: system analysis of existing recognition methods, theoretical formalization, experiment Result: The approach showed a satisfactory efficiency of cyber threat recognition, and the results of the research made it possible to put forward proposals for the further development of this area. Scientific novelty: A model of adaptive network topology is formulated and a new way of recognizing cyber threats on the adaptive network topology of large-scale systems is proposed.