Using Machine Learning Techniques to Simulate Network Intrusion Detection : доклад, тезисы доклада

Описание

Тип публикации: доклад, тезисы доклада, статья из сборника материалов конференций

Конференция: 2024 International Conference on Intelligent Systems for Cybersecurity (ISCS); Gurugram, India; Gurugram, India

Год издания: 2024

Идентификатор DOI: 10.1109/ISCS61804.2024.10581097

Ключевые слова: public infrastructure, information and communication technology, internet access, national security, network infrastructure, machine learning

Аннотация: This article explores the application of machine learning methods for modeling intrusion detection systems. We present the research findings, including the construction of a model based on decision trees and the analysis of significant factors determining network attacks. The results demonstrate high model accuracy and the potentiaПоказать полностьюl for its use in enhancing network security. The article also delves into the specifics of the chosen dataset and data preprocessing methods used to ensure model accuracy. Additionally, possibilities for future research in the field of intrusion detection are discussed, including the utilization of other machine learning methods, analysis of new threat types, and the study of attack obfuscation methods. This study offers important practical and theoretical recommendations for information security professionals and machine learning researchers.

Ссылки на полный текст

Издание

Журнал: 2024 International Conference on Intelligent Systems for Cybersecurity (ISCS)

Место издания: Gurugram

Персоны

  • Kukartsev Vladislav (Reshetnev Siberian State University of Science and Technology)
  • Kravtsov Kirill (Reshetnev Siberian State University of Science and Technology)
  • Stefanenko Olga (Reshetnev Siberian State University of Science and Technology)
  • Podanyov Nikolay (Reshetnev Siberian State University of Science and Technology)
  • Bezvorotnykh Anastasia (Reshetnev Siberian State University of Science and Technology)

Вхождение в базы данных