Increase the Speed of Detection and Recognition of Computer Attacks in Combined Diagonalized Neural Networks

被引:0
|
作者
Lytvyn, Vasyl [1 ]
Peleshchak, Ivan [1 ]
Peleshchak, Roman [2 ]
机构
[1] Lviv Polytech Natl Univ, Informat Syst & Networks Dept, Lvov, Ukraine
[2] Ivan Franko Drohobych State Pedag Univ, Dept Gen Phys, Drogobych, Ukraine
关键词
recirculation neural network; multilayer perceptron; a matrix of' weight connections; diagonalization matrix; eigenvalues; eigenvectors; a computer attack;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we propose a method increase the speed of detection and recognition of computer attacks using diagonalization matrices of synaptic connections in series connected recirculating neural network and multilayer perceptron. It is established that the decrease in the number of weight of synaptic connections between neurons reduces the vulnerability of the combined neural networks of various computer attacks by about 10% The main advantages of this approach is the ability of the combined diagonalized the neural network to reduce the time of adaptation to dynamic conditions and to increase the speed of its functioning in real time.
引用
收藏
页码:152 / 155
页数:4
相关论文
共 50 条
  • [1] Detection of zero-day attacks in computer networks using combined classification
    Gavari Bami, Hamid
    Moharamkhani, Elaheh
    Zadmehr, Behrouz
    Najafpoor, Vahid
    Shokouhifar, Mohammad
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (27):
  • [2] Neural Networks Applied to Speed Cheating Detection in Online Computer Games
    Gaspareto, Otavio Barcelos
    Couto Barone, Dante Augusto
    Schneider, Andre Marcelo
    ICNC 2008: FOURTH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, VOL 4, PROCEEDINGS, 2008, : 526 - 529
  • [3] Neural Networks Ensemble Approach for Detecting Attacks in Computer Networks
    Bukhtoyarov, Vladimir
    Semenkin, Eugene
    2012 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2012,
  • [4] Neural networks for computer virus recognition
    Tesauro, GJ
    Kephart, JO
    Sorkin, GB
    IEEE EXPERT-INTELLIGENT SYSTEMS & THEIR APPLICATIONS, 1996, 11 (04): : 5 - 6
  • [5] Convolutional neural networks for computer vision-based detection and recognition of dumpsters
    Iván Ramírez
    Alfredo Cuesta-Infante
    Juan J. Pantrigo
    Antonio S. Montemayor
    José Luis Moreno
    Valvanera Alonso
    Gema Anguita
    Luciano Palombarani
    Neural Computing and Applications, 2020, 32 : 13203 - 13211
  • [6] Convolutional neural networks for computer vision-based detection and recognition of dumpsters
    Ramirez, Ivan
    Cuesta-Infante, Alfredo
    Pantrigo, Juan J.
    Montemayor, Antonio S.
    Moreno, Jose Luis
    Alonso, Valvanera
    Anguita, Gema
    Palombarani, Luciano
    NEURAL COMPUTING & APPLICATIONS, 2020, 32 (17): : 13203 - 13211
  • [7] Adversarial Attacks in Modulation Recognition With Convolutional Neural Networks
    Lin, Yun
    Zhao, Haojun
    Ma, Xuefei
    Tu, Ya
    Wang, Meiyu
    IEEE TRANSACTIONS ON RELIABILITY, 2021, 70 (01) : 389 - 401
  • [8] Multi-Classifier of DDoS Attacks in Computer Networks Built on Neural Networks
    Chartuni, Andres
    Marquez, Jose
    APPLIED SCIENCES-BASEL, 2021, 11 (22):
  • [9] Adversarial Attacks on Deep Neural Networks Based Modulation Recognition
    Liu, Mingqian
    Zhang, Zhenju
    Zhao, Nan
    Chen, Yunfei
    IEEE INFOCOM 2022 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2022,
  • [10] Phishing Attacks Detection by Using Artificial Neural Networks
    Nabet, Majeed Jasim
    George, Loay E.
    Iraqi Journal for Computer Science and Mathematics, 2023, 4 (03): : 159 - 166