Please use this identifier to cite or link to this item: https://dspace.ncfu.ru/handle/123456789/29365
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGovorova, S. V.-
dc.contributor.authorГоворова, С. В.-
dc.contributor.authorGovorov, E. Y.-
dc.contributor.authorГоворов, Е. Ю.-
dc.contributor.authorLapin, V. G.-
dc.contributor.authorЛапин, В. Г.-
dc.date.accessioned2024-12-11T12:58:56Z-
dc.date.available2024-12-11T12:58:56Z-
dc.date.issued2024-
dc.identifier.citationGovorova, S., Govorov, E., Lapin, V., Mary Anita, E.A. Comparative Analysis and Development of Recommendations for the Use of Machine Learning Methods to Identify Network Traffic Anomalies in the Development of a Subsystem for User Behavioral Analysis // Lecture Notes in Networks and Systems. - 2024. - 1207 LNNS. - pp. 74-84. - DOI: 10.1007/978-3-031-77229-0_8ru
dc.identifier.urihttps://dspace.ncfu.ru/handle/123456789/29365-
dc.description.abstractThis article discusses various machine learning methods in order to conduct a more effective analysis of user network traffic using a subsystem for analyzing user behavior and detecting network anomalies, since there is a need to evaluate big data. The methods and techniques used to detect network anomalies are analyzed. In analyzing the methods and technologies used to detect network anomalies, a classification of anomaly detection methods is proposed. To solve these problems, different algorithms can be used, differing in specificity and, as a result, efficiency. The classification of machine learning methods for detecting network anomalies is considered separately, since machine learning algorithms will be the most effective for the task. Various criteria for evaluating the effectiveness of machine learning models in solving the problem of network traffic profiling are considered. In accordance with the specifics of the tasks of user recognition and network anomaly detection, the most appropriate criteria for evaluating the effectiveness of machine learning models have been selected: AUC ROC – the area under the error curve. Four stages of the subsystem for analyzing user behavior and detecting network anomalies are highlighted.ru
dc.language.isoenru
dc.publisherSpringer Science and Business Media Deutschland GmbHru
dc.relation.ispartofseriesLecture Notes in Networks and Systems-
dc.subjectMachine learning methodru
dc.subjectTraffic anomaliesru
dc.subjectPerformance evaluation criteriaru
dc.subjectNetwork dataru
dc.subjectNetwork anomaly detection methodsru
dc.titleComparative Analysis and Development of Recommendations for the Use of Machine Learning Methods to Identify Network Traffic Anomalies in the Development of a Subsystem for User Behavioral Analysisru
dc.typeСтатьяru
vkr.instИнститут перспективной инженерииru
vkr.instФакультет математики и компьютерных наук имени профессора Н.И. Червяковаru
Appears in Collections:Статьи, проиндексированные в SCOPUS, WOS

Files in This Item:
File SizeFormat 
scopusresults 3366.pdf
  Restricted Access
132.12 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.