Please use this identifier to cite or link to this item: https://dspace.ncfu.ru/handle/123456789/32458
Full metadata record
DC FieldValueLanguage
dc.contributor.authorLapina, M. A.-
dc.contributor.authorЛапина, М. А.-
dc.contributor.authorYurdanov, E. D.-
dc.contributor.authorЮрданов, Е. Д.-
dc.date.accessioned2025-12-17T09:46:39Z-
dc.date.available2025-12-17T09:46:39Z-
dc.date.issued2026-
dc.identifier.citationLapina, M., Yurdanov, E., Raza, Z., Ivanova, I. Detection of Malware Attacks Based on Machine Learning Technologies // Lecture Notes in Networks and Systems. - 2026. - 1456 LNNS. - pp. 286 - 297. - DOI: 10.1007/978-3-032-07275-7_27ru
dc.identifier.urihttps://dspace.ncfu.ru/handle/123456789/32458-
dc.description.abstractWebsites have become one of the most popular targets for Trojan attacks. Therefore, the Trojan Virus Intrusion Detection System (TVP) plays an important role in detecting attacks. Many researchers have already focused on cybersecurity and are developing effective systems. However, creating effective systems for detecting Trojan viruses inside websites remains a challenge due to its ability to detect new attacks. Therefore, in the framework of the current scientific research, several machine learning models are proposed: Random Forest, Random Forest Regression, Tree Ensemble, Decision Tree, Naïve Bayes, to detect Trojan virus programs inside websites. The purpose of the proposed machine learning models is to achieve high accuracy in detecting TVPs. The experimental study demonstrated the high efficiency of machine learning models in detecting Trojan virus programs. The best results were shown by the Random Forest (Regression) and Tree Ensemble algorithms, which achieved high classification accuracy due to the ensemble approach and resistance to overfitting. The Naïve Bayes model was the simplest model made and showed good results in training, but it was less effective than the other models used in the study. The Decision Tree proved to be less resistant to overfitting, but retained good interpretability. The use of cross-validation solved the problem of overfitting, which led to the conclusion that using this method is important for improving the reliability of models.ru
dc.language.isoenru
dc.publisherSpringer Science and Business Media Deutschland GmbHru
dc.relation.ispartofseriesLecture Notes in Networks and Systems-
dc.subjectArtificial intelligenceru
dc.subjectTrojan attackru
dc.subjectAttack detectionru
dc.subjectDatasetru
dc.subjectKnimeru
dc.subjectMachine learningru
dc.subjectMalware attacksru
dc.subjectTrojan programru
dc.titleDetection of Malware Attacks Based on Machine Learning Technologiesru
dc.typeСтатьяru
vkr.instФакультет математики и компьютерных наук имени профессора Н.И. Червяковаru
Appears in Collections:Статьи, проиндексированные в SCOPUS, WOS

Files in This Item:
File SizeFormat 
scopusresults 3840.pdf
  Restricted Access
129.08 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.