Lukasz Krolik, M. Kedziora, Jolanta Mizera-Pietraszko, I. Józwiak
{"title":"Detecting Attacks on Computer Networks Using Artificial Intelligence Algorithms","authors":"Lukasz Krolik, M. Kedziora, Jolanta Mizera-Pietraszko, I. Józwiak","doi":"10.1145/3508397.3564830","DOIUrl":null,"url":null,"abstract":"This paper presents a neural network model which was developed and trained to detect attacks on computer networks and to identify the differences indicating what distinguishes them from the regular network traffic. The influence of some parameters on the operation of the network was examined in order to select those characteristic for cyberattack. A certain number of models was tested for binary and multi-class classification. The accuracy of recognition by the network was evaluated for both the entire set and individual categories of the network traffic. The results obtained are promising based on comparison to those published in related work studies on intrusion detection systems.","PeriodicalId":266269,"journal":{"name":"Proceedings of the 14th International Conference on Management of Digital EcoSystems","volume":"91 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 14th International Conference on Management of Digital EcoSystems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3508397.3564830","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This paper presents a neural network model which was developed and trained to detect attacks on computer networks and to identify the differences indicating what distinguishes them from the regular network traffic. The influence of some parameters on the operation of the network was examined in order to select those characteristic for cyberattack. A certain number of models was tested for binary and multi-class classification. The accuracy of recognition by the network was evaluated for both the entire set and individual categories of the network traffic. The results obtained are promising based on comparison to those published in related work studies on intrusion detection systems.