Detection of Unauthorized Actions in Networks Using Wavelet Analysis
dc.contributor.author | Hrynchenko, Pavlo | |
dc.date.accessioned | 2023-11-22T16:46:22Z | |
dc.date.available | 2023-11-22T16:46:22Z | |
dc.date.issued | 2023 | |
dc.description.abstract | Signal processing techniques are used to analyze and detect network anomalies because of their ability to detect new and unknown intrusions. The paper proposes a method of modeling network signals for the detection of network anomalies, which combines wavelet approximation and the theory of system identification. To characterize the behavior of network traffic, fifteen functions are provided, which are used as input signals within the system. At the same time, it is assumed that security violations within the network can be detected by checking abnormal patterns of system functioning according to audit data. Despite the fact that machine learning methods have achieved significant results in detecting network anomalies, they still face the difficulty of using the implemented algorithms, in the presence of differences in the behavior of the training data and test data, which in turn leads to inefficient performance of the algorithms. This effect is exacerbated by the limitation of algorithms to detect previously unknown types of attacks due to the large number of false positives. The paper develops a new method of modeling network signals for detecting anomalies in networks using wavelet analysis. In particular, the general architecture of the approach consists of three components: feature analysis, modeling of normal network traffic based on wavelet approximation and prediction using ARX model, intrusion or non-intrusion decision making The result is evaluated using the DARPA intrusion detection dataset, which performs a comprehensive analysis of the intrusions in the dataset. Evaluation results show that this approach provides a high level of detection of both instances and types of attacks. | uk |
dc.format.pagerange | Pp. 40-46 | uk |
dc.identifier.citation | Hrynchenko, P. Detection of Unauthorized Actions in Networks Using Wavelet Analysis / Pavlo Hrynchenko // Theoretical and Applied Cybersecurity : scientific journal. – 2023. – Vol. 5, Iss. 2. – Pp. 40–46. – Bibliogr. 9 ref. | uk |
dc.identifier.doi | https://doi.org/10.20535/tacs.2664-29132023.2.277621 | |
dc.identifier.uri | https://ela.kpi.ua/handle/123456789/62405 | |
dc.language.iso | en | uk |
dc.publisher | Igor Sikorsky Kyiv Polytechnic Institute | uk |
dc.publisher.place | Kyiv | uk |
dc.relation.ispartof | Theoretical and Applied Cybersecurity: scientific journal, Vol. 5, No. 2 | uk |
dc.subject | Wavelet analysis | uk |
dc.subject | network intrusion detection system | uk |
dc.subject | network security | uk |
dc.subject.udc | 004.732 | uk |
dc.title | Detection of Unauthorized Actions in Networks Using Wavelet Analysis | uk |
dc.title.alternative | Detection of Unauthorized Actions in Networks Using Wavelet Analysis | uk |
dc.type | Article | uk |
Файли
Контейнер файлів
1 - 1 з 1
Вантажиться...
- Назва:
- 277621-670540-1-10-20231106.pdf
- Розмір:
- 756.39 KB
- Формат:
- Adobe Portable Document Format
- Опис:
Ліцензійна угода
1 - 1 з 1
Ескіз недоступний
- Назва:
- license.txt
- Розмір:
- 9.1 KB
- Формат:
- Item-specific license agreed upon to submission
- Опис: