Please use this identifier to cite or link to this item:
https://dspace.ncfu.ru/handle/123456789/32458Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Lapina, M. A. | - |
| dc.contributor.author | Лапина, М. А. | - |
| dc.contributor.author | Yurdanov, E. D. | - |
| dc.contributor.author | Юрданов, Е. Д. | - |
| dc.date.accessioned | 2025-12-17T09:46:39Z | - |
| dc.date.available | 2025-12-17T09:46:39Z | - |
| dc.date.issued | 2026 | - |
| dc.identifier.citation | Lapina, M., Yurdanov, E., Raza, Z., Ivanova, I. Detection of Malware Attacks Based on Machine Learning Technologies // Lecture Notes in Networks and Systems. - 2026. - 1456 LNNS. - pp. 286 - 297. - DOI: 10.1007/978-3-032-07275-7_27 | ru |
| dc.identifier.uri | https://dspace.ncfu.ru/handle/123456789/32458 | - |
| dc.description.abstract | Websites have become one of the most popular targets for Trojan attacks. Therefore, the Trojan Virus Intrusion Detection System (TVP) plays an important role in detecting attacks. Many researchers have already focused on cybersecurity and are developing effective systems. However, creating effective systems for detecting Trojan viruses inside websites remains a challenge due to its ability to detect new attacks. Therefore, in the framework of the current scientific research, several machine learning models are proposed: Random Forest, Random Forest Regression, Tree Ensemble, Decision Tree, Naïve Bayes, to detect Trojan virus programs inside websites. The purpose of the proposed machine learning models is to achieve high accuracy in detecting TVPs. The experimental study demonstrated the high efficiency of machine learning models in detecting Trojan virus programs. The best results were shown by the Random Forest (Regression) and Tree Ensemble algorithms, which achieved high classification accuracy due to the ensemble approach and resistance to overfitting. The Naïve Bayes model was the simplest model made and showed good results in training, but it was less effective than the other models used in the study. The Decision Tree proved to be less resistant to overfitting, but retained good interpretability. The use of cross-validation solved the problem of overfitting, which led to the conclusion that using this method is important for improving the reliability of models. | ru |
| dc.language.iso | en | ru |
| dc.publisher | Springer Science and Business Media Deutschland GmbH | ru |
| dc.relation.ispartofseries | Lecture Notes in Networks and Systems | - |
| dc.subject | Artificial intelligence | ru |
| dc.subject | Trojan attack | ru |
| dc.subject | Attack detection | ru |
| dc.subject | Dataset | ru |
| dc.subject | Knime | ru |
| dc.subject | Machine learning | ru |
| dc.subject | Malware attacks | ru |
| dc.subject | Trojan program | ru |
| dc.title | Detection of Malware Attacks Based on Machine Learning Technologies | ru |
| dc.type | Статья | ru |
| vkr.inst | Факультет математики и компьютерных наук имени профессора Н.И. Червякова | ru |
| Appears in Collections: | Статьи, проиндексированные в SCOPUS, WOS | |
Files in This Item:
| File | Size | Format | |
|---|---|---|---|
| scopusresults 3840.pdf Restricted Access | 129.08 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.