•  
  •  
 

Abstract

This article is dedicated to the research and application of the One-Class Support Vector Machines method for detecting anomalies in network traffic. It examines the problems of detecting anomalies in network traffic and proposes a methodology for using One-Class SVM, including an overview of the main concepts and formulas of the algorithm. A discussion of the results of One-Class SVM is presented, including interpretation, advantages, limitations and possible directions for development of the proposed technique, as well as the practical significance of using the proposed method for detecting anomalies in network traffic.

First Page

65

Last Page

71

References

  1. Astakhov, A.M. (2010). The Art of Information Risk Management. Moscow: DMK Press Publ., 312 p. (in Russian).
  2. Bezzateev, S.V., Elina, T.N., Mylnikov, V.A., Livshits, I.I. (2021). Risk assessment methodology for information systems based on analysis of user behavior and information security incidents. Scientific and Technical Journal of Information Technologies, Mechanics and Optics. 21(4). 553-561. doi: 10.17586/2226-1494-2021-21-4-553-561.
  3. Khorev, P.B. (2006). Methods and means of information protection in computer systems. Moscow: Helios, 53 p.
  4. Zapechnikov, S.V. (2017). Information security of open systems. In 2 vols. Vol.1 Threats, vulnerabilities, attacks and protection approaches. Moscow: GLT, 536 p.
  5. Opanasenko, V.N., Kryvyi, S.L. (2015). Synthesis of Adaptive Logical Networks on the Basis of Zhegalkin Polynomials. Cybernetics and Systems Analysis. 51(6). 969-977. DOI: 10.1007/s10559-015-9790-1.

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.