<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3.dtd">
<article article-type="research-article" dtd-version="1.3" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="ru"><front><journal-meta><journal-id journal-id-type="publisher-id">intechngu</journal-id><journal-title-group><journal-title xml:lang="ru">Вестник НГУ. Серия: Информационные технологии</journal-title><trans-title-group xml:lang="en"><trans-title>Vestnik NSU. Series: Information Technologies</trans-title></trans-title-group></journal-title-group><issn pub-type="ppub">1818-7900</issn><issn pub-type="epub">2410-0420</issn><publisher><publisher-name>НГУ</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="doi">10.25205/1818-7900-2019-17-2-114-121</article-id><article-id custom-type="elpub" pub-id-type="custom">intechngu-93</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research Article</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="ru"><subject>Статьи</subject></subj-group></article-categories><title-group><article-title>Применение методов глубинного обучения для обнаружения вторжений</article-title><trans-title-group xml:lang="en"><trans-title>Using Deep Learning Methods for Intrusion Detection</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Нечахин</surname><given-names>В. А.</given-names></name><name name-style="western" xml:lang="en"><surname>Nechakhin</surname><given-names>V. A.</given-names></name></name-alternatives><email xlink:type="simple">v.nechakhin@g.nsu.ru</email><xref ref-type="aff" rid="aff-1"/></contrib><contrib contrib-type="author" corresp="yes"><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Пищик</surname><given-names>Б. Н.</given-names></name><name name-style="western" xml:lang="en"><surname>Pishchik</surname><given-names>B. N.</given-names></name></name-alternatives><email xlink:type="simple">b.pishchik@nsu.ru</email><xref ref-type="aff" rid="aff-2"/></contrib></contrib-group><aff-alternatives id="aff-1"><aff xml:lang="ru">Новосибирский государственный университет<country>Россия</country></aff><aff xml:lang="en">Novosibirsk State University<country>Russian Federation</country></aff></aff-alternatives><aff-alternatives id="aff-2"><aff xml:lang="ru">Новосибирский государственный университет; Институт вычислительных технологий СО РАН<country>Россия</country></aff><aff xml:lang="en">Novosibirsk State University; Institute of Computational Technologies SB RAS<country>Russian Federation</country></aff></aff-alternatives><pub-date pub-type="collection"><year>2019</year></pub-date><pub-date pub-type="epub"><day>11</day><month>11</month><year>2020</year></pub-date><volume>17</volume><issue>2</issue><fpage>114</fpage><lpage>121</lpage><permissions><copyright-statement>Copyright &amp;#x00A9; Нечахин В.А., Пищик Б.Н., 2020</copyright-statement><copyright-year>2020</copyright-year><copyright-holder xml:lang="ru">Нечахин В.А., Пищик Б.Н.</copyright-holder><copyright-holder xml:lang="en">Nechakhin V.A., Pishchik B.N.</copyright-holder><license license-type="creative-commons-attribution" xlink:href="https://creativecommons.org/licenses/by/4.0/" xlink:type="simple"><license-p>This work is licensed under a Creative Commons Attribution 4.0 License.</license-p></license></permissions><self-uri xlink:href="https://intechngu.elpub.ru/jour/article/view/93">https://intechngu.elpub.ru/jour/article/view/93</self-uri><abstract><p>Приведены результаты применения глубоких нейронных сетей для детектирования вредоносной активности в сетевом трафике. В процессе исследования реализованы два вида нейронной сети: рекуррентный автоэнкодер и генеративно-состязательная сеть. Приведены результаты исследования на наборе данных CICIDS2017.</p></abstract><trans-abstract xml:lang="en"><p>One of the ways of ensuring information security are intrusion detection systems (IDS). IDS are used to detect malicious activity on the network. The standard approach to the detection of attacks it is looking for specific patterns, such as byte sequences in network traffic, or known malicious instruction sequences used by malware. This approach is highly efficient, but it does not able to detect the attacks without patterns. Modern approaches to detection of attacks use deep learning. The purpose of this work was to explore the possibility of building a universal classifier of network traffic based on a deep neural network. For this, a recurrent autoencoder was trained on TCP packets from the CICIDS2017 dataset. During training the neural network was a model in which the expected vector was set the same as the original one. And learning was on normal traffic. The main idea was that a recurrent autoencoder trained in this way should recover anomalous traffic with a high loss. The TCP package is considered malicious if the recovery loss is above the threshold. However, the accuracy of recovering normal TCP packets was low due to the insufficient model capacity and the lack of the suitable representation learning method. After the results analyzing, we proposed an approach that can improve accuracy of detection for some attacks. Based on this approach, the VAEGAN network was trained on normal network flows from CICIDS2017. The VAEGAN was used to detect malicious network flows: to calculate the anomaly score for flow; if score is above the threshold - the flow is malicious. The VAEGAN network showed a high percentage of attacks detection and the F-score value - 0.933.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>обнаружение вторжений</kwd><kwd>глубинное обучение</kwd><kwd>автоэнкодер</kwd><kwd>генеративно-состязательная сеть</kwd></kwd-group><kwd-group xml:lang="en"><kwd>CICIDS2017</kwd><kwd>anomaly detection</kwd><kwd>deep learning</kwd><kwd>CICIDS2017</kwd><kwd>autoencoder</kwd><kwd>generative adversarial network</kwd></kwd-group></article-meta></front><back><ref-list><title>References</title></ref-list><fn-group><fn fn-type="conflict"><p>The authors declare that there are no conflicts of interest present.</p></fn></fn-group></back></article>
