FIELD: information security.
SUBSTANCE: in the method of preventing malicious attacks on network infrastructure using cascades of self-teaching neural networks, using a computing device of the system, forming a cascade of neural networks connected by layers; forming the self-training feedback for the neural network stages layers relative to the obtained statistical data and the packet information repeating sequences; groups of statistical data are supplied to the first layer of the cascade of neural networks; generating data for abnormal zones at second layer of neural network cascade; grouping statistical data in a multidimensional field on the third layer of the neural network cascade; evaluating the output data and data obtained as a result of the operation of the previous layer, and classifying the group for belonging to the type of attack on network infrastructure on the fourth layer of the neural network cascade.
EFFECT: high accuracy and speed of preventing malicious attacks on network infrastructure, including zero-day attacks – previously unknown targeted attacks and specially prepared group malicious intrusions.
13 cl, 14 dwg, 6 tbl
Title | Year | Author | Number |
---|---|---|---|
METHOD OF IDENTIFYING AND BLOCKING MALICIOUS SOFTWARE USING CASCADES OF SELF-LEARNING NEURAL NETWORKS | 2024 |
|
RU2838324C1 |
SYSTEM AND METHOD FOR AUTOMATIC ASSESSMENT OF QUALITY OF NETWORK TRAFFIC SIGNATURES | 2021 |
|
RU2781822C1 |
COMPUTING APPARATUS AND METHOD FOR IDENTIFYING COMPROMISED APPARATUSES BASED ON DNS TUNNELLING DETECTION | 2021 |
|
RU2777348C1 |
METHOD AND SYSTEM FOR DETECTING THE INFRASTRUCTURE OF A MALICIOUS SOFTWARE OR A CYBERCRIMINAL | 2020 |
|
RU2722693C1 |
METHOD OF DETECTING UNAUTHORIZED USE OF NETWORK DEVICES OF LIMITED FUNCTIONALITY FROM A LOCAL NETWORK AND PREVENTING DISTRIBUTED NETWORK ATTACKS FROM THEM | 2018 |
|
RU2703329C1 |
SYSTEM AND METHOD FOR ACTIVE DETECTION OF MALICIOUS NETWORK RESOURCES | 2021 |
|
RU2769075C1 |
METHOD OF GENERATING ADVERSARIAL EXAMPLES FOR NETWORK INTRUSION DETECTION SYSTEM | 2023 |
|
RU2823895C1 |
PROTECTION METHOD OF VEHICLE CONTROL SYSTEMS AGAINST INTRUSIONS | 2019 |
|
RU2737229C1 |
METHOD FOR CONFIGURATION OF IoT APPARATUSES DEPENDING ON THE TYPE OF NETWORK | 2021 |
|
RU2760625C1 |
METHOD FOR ESTIMATING THE DEGREE OF WEAR OF AN IoT APPARATUS ON THE SIDE OF A NETWORK INFRASTRUCTURE ELEMENT | 2021 |
|
RU2772377C1 |
Authors
Dates
2025-06-06—Published
2024-12-20—Filed