Будь ласка, використовуйте цей ідентифікатор, щоб цитувати або посилатися на цей матеріал: http://ds.knu.edu.ua/jspui/handle/123456789/2163
Повний запис метаданих
Поле DCЗначенняМова
dc.contributor.authorKirichek, Galina-
dc.contributor.authorHarkusha, Vladyslav-
dc.contributor.authorTimenko, Artur-
dc.contributor.authorKulykovska, Nataliia-
dc.date.accessioned2020-04-14T06:06:35Z-
dc.date.available2020-04-14T06:06:35Z-
dc.date.issued2020-02-09-
dc.identifier.citationKirichek G. System for detecting network anomalies using a hybrid of an uncontrolled and controlled neural network [Electronic resource] / Galina Kirichek, Vladyslav Harkusha, Artur Timenko, Nataliia Kulykovska // Computer Science & Software Engineering : Proceedings of the 2nd Student Workshop (CS&SE@SW 2019), Kryvyi Rih, Ukraine, November 29, 2019 / Edited by : Arnold E. Kiv, Serhiy O. Semerikov, Vladimir N. Soloviev, Andrii M. Striuk. – P. 138-148. – (CEUR Workshop Proceedings (CEUR-WS.org), Vol. 2546). – Access mode : http://ceur-ws.org/Vol-2546/paper09.pdfuk_UA
dc.identifier.issn1613-0073-
dc.identifier.urihttp://ceur-ws.org/Vol-2546/paper09.pdf-
dc.identifier.urihttp://ds.knu.edu.ua/jspui/handle/123456789/2163-
dc.description.abstractIn this article realization method of attacks and anomalies detection with the use of training of ordinary and attacking packages, respectively. The method that was used to teach an attack on is a combination of an uncontrollable and controlled neural network. In an uncontrolled network, attacks are classified in smaller categories, taking into account their features and using the self- organized map. To manage clusters, a neural network based on back-propagation method used. We use PyBrain as the main framework for designing, developing and learning perceptron data. This framework has a sufficient number of solutions and algorithms for training, designing and testing various types of neural networks. Software architecture is presented using a procedural-object approach. Because there is no need to save intermediate result of the program (after learning entire perceptron is stored in the file), all the progress of learning is stored in the normal files on hard disk.uk_UA
dc.language.isoenuk_UA
dc.publisherArnold E. Kiv, Serhiy O. Semerikov, Vladimir N. Soloviev, Andrii M. Striukuk_UA
dc.relation.ispartofseriesCEUR Workshop Proceedings;2546-
dc.subjectneural networkuk_UA
dc.subjectlearninguk_UA
dc.subjectintrusionuk_UA
dc.subjectanomalies detectionuk_UA
dc.subjectSOMuk_UA
dc.titleSystem for detecting network anomalies using a hybrid of an uncontrolled and controlled neural networkuk_UA
dc.typeArticleuk_UA
local.submitter.emailsemerikov@ccjourn...uk_UA
Розташовується у зібраннях:Наукові статті

Файли цього матеріалу:
Файл Опис РозмірФормат 
paper09.pdfarticle806.16 kBAdobe PDFПереглянути/Відкрити


Усі матеріали в архіві електронних ресурсів захищені авторським правом, всі права збережені.