{"title":"Parallel Deep Neural Network for Detecting Computer Attacks in Information Telecommunication Systems","authors":"Vitaliy Dorosh, M. Komar, A. Sachenko, V. Golovko","doi":"10.1109/ELNANO.2018.8477530","DOIUrl":null,"url":null,"abstract":"The approach to parallelization of the deep neural network by dividing the training set into sub-set and training each sub-set into a separate copy of the model of the neural network, which allows to significantly reduce the training time and increase the reliability of the detection of attacks, is proposed. The structure of the neural network in the framework Caffe is developed, and experimental studies have been carried out that showed an increase in the reliability of the detection of attacks in comparison with known approaches.","PeriodicalId":269665,"journal":{"name":"2018 IEEE 38th International Conference on Electronics and Nanotechnology (ELNANO)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE 38th International Conference on Electronics and Nanotechnology (ELNANO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ELNANO.2018.8477530","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
The approach to parallelization of the deep neural network by dividing the training set into sub-set and training each sub-set into a separate copy of the model of the neural network, which allows to significantly reduce the training time and increase the reliability of the detection of attacks, is proposed. The structure of the neural network in the framework Caffe is developed, and experimental studies have been carried out that showed an increase in the reliability of the detection of attacks in comparison with known approaches.