2022
DOI: 10.32620/reks.2022.3.09
|View full text |Cite
|
Sign up to set email alerts
|

Information-extreme machine learning of a cyber attack detection system

Abstract: The study aims to increase the functional efficiency of a machine learning cyber attack detection system. An information-extreme machine learning method of the cyberattack detection system with optimization of control tolerances for recognition features that reflect the traffic properties of the info-communication system has been developed. The method is developed within the framework of the functional approach to modeling of cognitive processes of natural intelligence at the formation and acceptance of classi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 2 publications
0
4
0
Order By: Relevance
“…It is impossible to unambiguously answer this question in numerical and parametric form based on the conducted research. This point needs additional investigation in the context of implementing proactive technologies of AI-powered protection of assets against cyberattacks [46][47][48] . However, these aspects do not affect the functionality and adequacy of the material presented in the article.…”
Section: Discussionmentioning
confidence: 99%
“…It is impossible to unambiguously answer this question in numerical and parametric form based on the conducted research. This point needs additional investigation in the context of implementing proactive technologies of AI-powered protection of assets against cyberattacks [46][47][48] . However, these aspects do not affect the functionality and adequacy of the material presented in the article.…”
Section: Discussionmentioning
confidence: 99%
“…In future, authors are going to explore machine learning methods and various types of neural networks [26,35] for a more detailed analysis in energy efficiency terms and power consumption optimization of autonomous MCU units in IoT.…”
Section: Discussionmentioning
confidence: 99%
“…Keeping in mind the SIS approach mentioned above, the analysed references were subdivided into the following: the references describing stages of the Modified Cybersecurity Kill Chain for AI-powered attacks [ 5 , 6 ]; the references addressing AI-powered attacks utilised against various components of the ATS infrastructure [ 5 , 6 , 7 , 8 , 9 , 10 , 11 , 12 , 13 ]; the references presenting ATSs cybersecurity assessment and assurance techniques, including decisions based on the application of AI and AI platform (AIP) [ 14 , 15 , 16 , 17 , 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 ]; the references highlighting ATS safety issues in the context of the ATS cybersecurity assessment [ 35 , 36 , 37 , 38 ]. …”
Section: Introductionmentioning
confidence: 99%
“…the references presenting ATSs cybersecurity assessment and assurance techniques, including decisions based on the application of AI and AI platform (AIP) [ 14 , 15 , 16 , 17 , 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 ];…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation