<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3.dtd">
<article article-type="research-article" dtd-version="1.3" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="ru"><front><journal-meta><journal-id journal-id-type="publisher-id">tuzsut</journal-id><journal-title-group><journal-title xml:lang="ru">Труды учебных заведений связи</journal-title><trans-title-group xml:lang="en"><trans-title>Proceedings of Telecommunication Universities</trans-title></trans-title-group></journal-title-group><issn pub-type="ppub">1813-324X</issn><issn pub-type="epub">2712-8830</issn><publisher><publisher-name>СПбГУТ</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="doi">10.31854/1813-324X-2023-9-4-97-113</article-id><article-id custom-type="elpub" pub-id-type="custom">tuzsut-502</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research Article</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="ru"><subject>ИНФОРМАЦИОННЫЕ ТЕХНОЛОГИИ И ТЕЛЕКОММУНИКАЦИИ</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="en"><subject>INFORMATION TECHNOLOGIES AND TELECOMMUNICATION</subject></subj-group></article-categories><title-group><article-title>Многозначная классификация компьютерных атак с использованием искусственных нейронных сетей с множественным выходом</article-title><trans-title-group xml:lang="en"><trans-title>Multivalued Classification of Computer Attacks Using Artificial Neural Networks with Multiple Outputs</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0001-7564-6744</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Шелухин</surname><given-names>О. И.</given-names></name><name name-style="western" xml:lang="en"><surname>Shelukhin</surname><given-names>O.</given-names></name></name-alternatives><bio xml:lang="ru"><p>доктор технических наук, профессор, заведующий кафедрой «Информационная безопасность» Московского технического университета связи и информатики</p></bio><email xlink:type="simple">sheluhin@mail.ru</email><xref ref-type="aff" rid="aff-1"/></contrib><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0001-7689-4678</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Раковский</surname><given-names>Д. И.</given-names></name><name name-style="western" xml:lang="en"><surname>Rakovsky</surname><given-names>D.</given-names></name></name-alternatives><bio xml:lang="ru"><p>аспирант кафедры «Информационная безопасность» Московского технического университета связи и информатики</p></bio><email xlink:type="simple">Prophet_alpha@mail.ru</email><xref ref-type="aff" rid="aff-1"/></contrib></contrib-group><aff-alternatives id="aff-1"><aff xml:lang="ru">Московский технический университет связи и информатики<country>Россия</country></aff><aff xml:lang="en">Moscow Technical University of Communications and Informatics<country>Russian Federation</country></aff></aff-alternatives><pub-date pub-type="collection"><year>2023</year></pub-date><pub-date pub-type="epub"><day>21</day><month>09</month><year>2023</year></pub-date><volume>9</volume><issue>4</issue><fpage>97</fpage><lpage>113</lpage><permissions><copyright-statement>Copyright &amp;#x00A9; Шелухин О.И., Раковский Д.И., 2023</copyright-statement><copyright-year>2023</copyright-year><copyright-holder xml:lang="ru">Шелухин О.И., Раковский Д.И.</copyright-holder><copyright-holder xml:lang="en">Shelukhin O., Rakovsky D.</copyright-holder><license license-type="creative-commons-attribution" xlink:href="https://creativecommons.org/licenses/by/4.0/" xlink:type="simple"><license-p>This work is licensed under a Creative Commons Attribution 4.0 License.</license-p></license></permissions><self-uri xlink:href="https://tuzs.sut.ru/jour/article/view/502">https://tuzs.sut.ru/jour/article/view/502</self-uri><abstract><p>Современные компьютерные сети (КС), имея сложную и часто гетерогенную структуру, порождают большие объемы многомерных многозначных данных. Учет информации о многозначности экспериментальных данных (ЭД) может повысить эффективность решения целого ряда задач информационной безопасности: от профилирования КС до обнаружения и предотвращения компьютерных атак на КС. Целью работы является разработка многозначной архитектуры искусственной нейронной сети (ИНС) для обнаружения и классификации компьютерных атак в многозначных ЭД, и ее сравнительный анализ с известными аналогами по бинарным метрикам оценки качества классификации. Рассмотрена формализация ИНС в терминах матричной алгебры, позволяющая учитывать случай многозначной классификации и новая архитектура ИНС с множественным выходом с использованием предложенной формализации. Достоинством предложенной формализации является лаконичность ряда записей, ассоциированных с рабочим режимом работы ИНС и режимом обучения. Предложенная архитектура ИНС позволяет решать задачи обнаружения и классификации многозначных компьютерных атак в среднем на 5 % эффективнее известных аналогов. Наблюдаемый выигрыш обусловлен учетом многозначных закономерностей между классовыми метками на этапе обучения за счет использования общего первого слоя. Достоинствами предложенной архитектуры ИНС является масштабируемость к любому числу классовых меток и быстрая сходимость.</p></abstract><trans-abstract xml:lang="en"><p>Modern computer networks (CN), having a complex and often heterogeneous structure, generate large volumes of multi-dimensional multi-label data. Accounting for information about multi-label experimental data (ED) can improve the efficiency of solving a number of information security problems: from CN profiling to detecting and preventing computer attacks on CN. The aim of the work is to develop a multi-label artificial neural network (ANN) architecture for detecting and classifying computer attacks in multi-label ED, and its comparative analysis with known analogues in terms of binary metrics for assessing the quality of classification. A formalization of ANN in terms of matrix algebra is proposed, which allows taking into account the case of multi-label classification and the new architecture of ANN with multiple output using the proposed formalization. The advantage of the proposed formalization is the conciseness of a number of entries associated with the ANN operating mode and learning mode. Proposed architecture allows solving the problems of detecting and classifying multi-label computer attacks, on average, 5% more efficiently than known analogues. The observed gain is due to taking into account multi-label patterns between class labels at the training stage through the use of a common first layer. The advantages of the proposed ANN architecture are scalability to any number of class labels and fast convergence.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>информационная безопасность</kwd><kwd>многозначная классификация</kwd><kwd>компьютерная сеть</kwd><kwd>компьютерная атака</kwd><kwd>нейронные сети</kwd><kwd>глубокие нейронные сети</kwd><kwd>многозначные нейронные сети</kwd></kwd-group><kwd-group xml:lang="en"><kwd>information security</kwd><kwd>Multi-label classification</kwd><kwd>computer network</kwd><kwd>computer attack</kwd><kwd>neural networks</kwd><kwd>deep neural networks</kwd><kwd>Multi-label neural networks</kwd></kwd-group></article-meta></front><back><ref-list><title>References</title><ref id="cit1"><label>1</label><citation-alternatives><mixed-citation xml:lang="ru">Большаков А.С. Губанкова Е.В. Обнаружение аномалий в компьютерных сетях с использованием методов машинного обучения // REDS: Телекоммуникационные устройства и системы. 2020. Т. 10. № 1. С. 37‒42.</mixed-citation><mixed-citation xml:lang="en">Bol'shakov A.S. Gubankova E.V. Anomaly detection in computer networks using machine learning methods. REDS. 2020;10(1):37‒42.</mixed-citation></citation-alternatives></ref><ref id="cit2"><label>2</label><citation-alternatives><mixed-citation xml:lang="ru">Sheluhin O.I., Rakovskiy D.I. Multi-Label Learning in Computer Networks // Proceedings of the Conference at 2023 Systems of Signals Generating and Processing in the Field of on Board Communications (Moscow, Russian Federation, 14‒16 March 2023). IEEE, 2023. DOI:10.1109/IEEECONF56737.2023.10092157</mixed-citation><mixed-citation xml:lang="en">Sheluhin O.I., Rakovskiy D.I. Multi-Label Learning in Computer Networks. Proceedings of the conference at 2023 Systems of Signals Generating and Processing in the Field of on Board Communications, 14‒16 March 2023, Moscow, Russian Federation. IEEE; 2023. DOI:10.1109/IEEECONF56737.2023.10092157</mixed-citation></citation-alternatives></ref><ref id="cit3"><label>3</label><citation-alternatives><mixed-citation xml:lang="ru">Чечулин А.А. Проблемы сбора корректной и непротиворечивой информации о состоянии компьютерной сети // Информатизация и связь. 2023. № 1. С. 91‒94. DOI:10.34219/2078-8320-2023-14-1-91-94</mixed-citation><mixed-citation xml:lang="en">Chechulin A.A. The issues of collecting correct and consistent information about a computer network. Informatization and communication. 2023;1:91‒94. DOI:10.34219/2078-8320-2023-14-1-91-94</mixed-citation></citation-alternatives></ref><ref id="cit4"><label>4</label><citation-alternatives><mixed-citation xml:lang="ru">Шелухин О.И., Раковский Д.И. Прогнозирование профиля функционирования компьютерной системы на основе многозначных закономерностей // Вопросы кибербезопасности. 2022. № 6(52). С. 53‒70. DOI:10.21681/2311-3456-2022-6-53-70</mixed-citation><mixed-citation xml:lang="en">Shelukhin O., Rakovskiy D. Prediction of the profile functioning of a computer system based on multivalued patterns. Voprosy kiberbezopasnosti. 2022;6(52):53‒70. DOI:10.21681/2311-3456-2022-6-53-70</mixed-citation></citation-alternatives></ref><ref id="cit5"><label>5</label><citation-alternatives><mixed-citation xml:lang="ru">Sheluhin O.I., Osin A.V., Rakovsky D.I. New Algorithm for Predicting the States of a Computer Network Using Multivalued Dependencies // Automatic Control and Computer Sciences. 2023. Vol. 57. Iss. 1. PP. 48–60. DOI:10.3103/S0146411623010091</mixed-citation><mixed-citation xml:lang="en">Sheluhin O.I., Osin A.V., Rakovsky D.I. New Algorithm for Predicting the States of a Computer Network Using Multivalued Dependencies. Automatic Control and Computer Sciences. 2023;57(1):48–60. DOI:10.3103/S0146411623010091</mixed-citation></citation-alternatives></ref><ref id="cit6"><label>6</label><citation-alternatives><mixed-citation xml:lang="ru">Rakovskiy D.I. Analysis of the problem of multivalued of class labels on the security of computer networks» // Synchroinfo journal. 2022. Iss. 6. PP. 10‒17. DOI:10.36724/2664-066X-2022-8-6-10-17</mixed-citation><mixed-citation xml:lang="en">Rakovskiy D.I. Analysis of the problem of multivalued of class labels on the security of computer networks. Synchroinfo journal. 2022;6:10‒17. DOI:10.36724/2664-066X-2022-8-6-10-17</mixed-citation></citation-alternatives></ref><ref id="cit7"><label>7</label><citation-alternatives><mixed-citation xml:lang="ru">Васильев В.И., Вульфин А.М., Гвоздев В.Е., Картак В.М., Атарская Е.А. Обеспечение информационной безопасности киберфизических объектов на основе прогнозирования и обнаружения аномалий их состояния // Системы управления, связи и безопасности. 2021. № 6. С. 90‒119. DOI:10.24412/2410-9916-2021-6-90-119</mixed-citation><mixed-citation xml:lang="en">Vasilyev V.I., Vulfin A.M., Gvozdev V.E., Kartak V.M., Atarskaya E.A. Ensuring information security of cyber-physical objectsbased on predicting and detecting anomalies in their state. Systems of Control, Communication and Security. 2021;6:90‒119. DOI:10.24412/2410-9916-2021-6-90-119</mixed-citation></citation-alternatives></ref><ref id="cit8"><label>8</label><citation-alternatives><mixed-citation xml:lang="ru">Sheluhin O.I., Barkov V.V., Sekretarev S.A. The online classification of the mobile applications traffic using data mining techniques // T-Comm. 2019. Т. 13. № 10. С. 60‒67. DOI:10.24411/2072-8735-2018-10317</mixed-citation><mixed-citation xml:lang="en">Sheluhin O.I., Barkov V.V., Sekretarev S.A. The online classification of the mobile applications traffic using data mining techniques. T-Comm. 2019;13(10):60‒67. DOI:10.24411/2072-8735-2018-10317</mixed-citation></citation-alternatives></ref><ref id="cit9"><label>9</label><citation-alternatives><mixed-citation xml:lang="ru">Шелухин О.И., Барков В.В., Полковников М.В. Классификация зашифрованного трафика мобильных приложений методом машинного обучения // Вопросы кибербезопасности. 2018. № 4(28). С. 21‒28. DOI:10.21681/2311-3456-2018-4-21-28</mixed-citation><mixed-citation xml:lang="en">Shelukhin O., Barkov V., Polkovnikov M. Classification of encrypted mobile app traffic using the machine learning method. Voprosy kiberbezopasnosti. 2018;4(28):21‒28. DOI:10.21681/2311-3456-2018-4-21-28</mixed-citation></citation-alternatives></ref><ref id="cit10"><label>10</label><citation-alternatives><mixed-citation xml:lang="ru">Ismailov V.E. A three layer neural network can represent any multivariate function // Journal of Mathematical Analysis and Applications. 2023. Vol. 523. Iss. 1. P. 127096. DOI:10.1016/j.jmaa.2023.127096</mixed-citation><mixed-citation xml:lang="en">Ismailov V.E. A three layer neural network can represent any multivariate function. Journal of Mathematical Analysis and Applications. 2023;523(1):127096. DOI:10.1016/j.jmaa.2023.127096</mixed-citation></citation-alternatives></ref><ref id="cit11"><label>11</label><citation-alternatives><mixed-citation xml:lang="ru">Vaswani A., Shazeer N., Parmar N., Uszkoreit J., Jones L., Gomez A.N., et al. Attention Is All You Need // arXiv:1706.03762v7. 2017. DOI:10.48550/arXiv.1706.03762</mixed-citation><mixed-citation xml:lang="en">Vaswani A., Shazeer N., Parmar N., Uszkoreit J., Jones L., Gomez A.N., et al. Attention Is All You Need. arXiv:1706.03762v7. 2017. DOI:10.48550/arXiv.1706.03762</mixed-citation></citation-alternatives></ref><ref id="cit12"><label>12</label><citation-alternatives><mixed-citation xml:lang="ru">Elbayad M., Besacier L., Verbeek J. Pervasive Attention: 2D Convolutional Neural Networks for Sequence-to-Sequence Prediction // arXiv:1808.03867v3. 2018. DOI:10.48550/arXiv.1808.03867</mixed-citation><mixed-citation xml:lang="en">Elbayad M., Besacier L., Verbeek J. Pervasive Attention: 2D Convolutional Neural Networks for Sequence-to-Sequence Prediction. arXiv:1808.03867v3. 2018. DOI:10.48550/arXiv.1808.03867</mixed-citation></citation-alternatives></ref><ref id="cit13"><label>13</label><citation-alternatives><mixed-citation xml:lang="ru">Евграфов В.А., Ильюшин Е.А. Спайковые нейронные сети // International Journal of Open Information Technologies. 2021. Т. 9. № 7. С. 21‒31.</mixed-citation><mixed-citation xml:lang="en">Evgrafov V., Il'yushin E. On spiking neural networks. International Journal of Open Information Technologies. 2021; 9(7):21‒31.</mixed-citation></citation-alternatives></ref><ref id="cit14"><label>14</label><citation-alternatives><mixed-citation xml:lang="ru">Trentin E. Multivariate Density Estimation with Deep Neural Mixture Models // Neural Processing Letters. 2023. Vol. 53. Iss. 2. PP. 1‒17. DOI:10.1007/s11063-023-11196-2</mixed-citation><mixed-citation xml:lang="en">Trentin E. Multivariate Density Estimation with Deep Neural Mixture Models. Neural Processing Letters. 2023;53(2): 1‒17. DOI:10.1007/s11063-023-11196-2</mixed-citation></citation-alternatives></ref><ref id="cit15"><label>15</label><citation-alternatives><mixed-citation xml:lang="ru">Воронцов К.В. Математические методы обучения по прецедентам (теория обучения машин). URL: http://www.machinelearning.ru/wiki/images/6/6d/Voron-ML-1.pdf (дата обращения 17.05.2023)</mixed-citation><mixed-citation xml:lang="en">Vorontsov K.V. Mathematical methods of learning by precedents (machine learning theory). URL: http://www.machinelearning.ru/wiki/images/6/6d/Voron-ML-1.pdf [Accessed 17.05.2023]</mixed-citation></citation-alternatives></ref><ref id="cit16"><label>16</label><citation-alternatives><mixed-citation xml:lang="ru">Молодцов Д.А. Сравнение и продолжение многозначных зависимостей // Нечеткие системы и мягкие вычисления. 2016. Т. 11. № 2. С. 115–145.</mixed-citation><mixed-citation xml:lang="en">Molodtsov D.A. Comparison and continuation of multivalued dependencies. Fuzzy systems and soft computing. 2016;11(2):115–145.</mixed-citation></citation-alternatives></ref><ref id="cit17"><label>17</label><citation-alternatives><mixed-citation xml:lang="ru">Olson D.L., Araz Ö.M. Cluster Analysis // Data Mining and Analytics in Healthcare Management. International Series in Operations Research &amp; Management Science. Cham: Springer, 2023. Vol. 341. PP. 53–68. DOI:10.1007/978-3-031-28113-6_5</mixed-citation><mixed-citation xml:lang="en">Olson D.L., Araz Ö.M. Cluster Analysis. In: Data Mining and Analytics in Healthcare Management. International Series in Operations Research &amp; Management Science, vol.341. Cham: Springer; 2023. p.53–68. DOI:10.1007/978-3-031-28113-6_5</mixed-citation></citation-alternatives></ref><ref id="cit18"><label>18</label><citation-alternatives><mixed-citation xml:lang="ru">Молодцов Д.А., Осин А.В. Новый метод применения многозначных закономерностей // Нечеткие системы и мягкие вычисления. 2020. Т. 15. № 2. С. 83‒95. DOI:10.26456/fssc72</mixed-citation><mixed-citation xml:lang="en">Molodtsov D.A., Osin A.V. A new method of applying multivalued dependencies. Fuzzy systems and soft computing. 2020;15(2):83‒95. DOI:10.26456/fssc72</mixed-citation></citation-alternatives></ref><ref id="cit19"><label>19</label><citation-alternatives><mixed-citation xml:lang="ru">Кафтанников И.Л., Парасич А.В. Проблемы формирования обучающей выборки в задачах машинного обучения // Вестник Южно-Уральского государственного университета. Серия: Компьютерные технологии, управление, радиоэлектроника. 2016. Т. 16. № 3. С. 15‒24. DOI:10.14529/ctcr160302</mixed-citation><mixed-citation xml:lang="en">Kaftannikov I.L., Parasich A.V. Problems of Training Set’s Formation in Machine Learning Tasks. Bulletin of the South Ural State University. Series “Computer Technologies, Automatic Control, Radio Electronics”. 2016;16(3):15–24. DOI:10.14529/ctcr160302</mixed-citation></citation-alternatives></ref><ref id="cit20"><label>20</label><citation-alternatives><mixed-citation xml:lang="ru">Javed R.K., Ayub N., Shiraz M. A Novel Approach Using Deep Learning for Network Based Intrusion Detection System // Thesis for: MS CS Advisor: Nasir Ayub and Prof. Dr. Muhammad Shiraz. DOI:10.13140/RG.2.2.21108.01922</mixed-citation><mixed-citation xml:lang="en">Javed R.K., Ayub N., Shiraz M. A Novel Approach Using Deep Learning for Network Based Intrusion Detection System. Thesis for: MS CS Advisor: Nasir Ayub and Prof. Dr. Muhammad Shiraz. DOI:10.13140/RG.2.2.21108.01922</mixed-citation></citation-alternatives></ref><ref id="cit21"><label>21</label><citation-alternatives><mixed-citation xml:lang="ru">Camargo J.T.F., Veraszto E.V., Barreto G., Amaral S.F Neural Networks and the Study of Time Series: An Application in Engineering Education // Journal of Mechanics Engineering and Automation. 2015. Vol. 5. P. 2159-5275153-160. DOI:10.17265/2159-5275/2015.03.003</mixed-citation><mixed-citation xml:lang="en">Camargo J.T.F., Veraszto E.V., Barreto G., Amaral S.F Neural Networks and the Study of Time Series: An Application in Engineering Education. Journal of Mechanics Engineering and Automation. 2015;5:2159-5275153-160. DOI:10.17265/2159-5275/2015.03.003</mixed-citation></citation-alternatives></ref><ref id="cit22"><label>22</label><citation-alternatives><mixed-citation xml:lang="ru">Andrychowicz M., Denil M., Gómez S., Hoffman M., Pfau D., Schaul T., et al. Learning to learn by gradient descent by gradient descent // arXiv:1606.04474v2. 2016. DOI:10.48550/arXiv.1606.04474</mixed-citation><mixed-citation xml:lang="en">Andrychowicz M., Denil M., Gómez S., Hoffman M., Pfau D., Schaul T., et al. Learning to learn by gradient descent by gradient descent. arXiv:1606.04474v2. 2016. DOI:10.48550/arXiv.1606.04474</mixed-citation></citation-alternatives></ref><ref id="cit23"><label>23</label><citation-alternatives><mixed-citation xml:lang="ru">Sheluhin O.I., Rybakov S.Y., Vanyushina A.V. Detection of Network Anomalies with the Method of Fixing Jumps of the Fractal Dimension in the Online Mode // Wave Electronics and Its Application in Information and Telecommunication Systems. 2022. Vol. 5. Iss. 1. PP. 430‒435.</mixed-citation><mixed-citation xml:lang="en">Sheluhin O.I., Rybakov S.Y., Vanyushina A.V. Detection of Network Anomalies with the Method of Fixing Jumps of the Fractal Dimension in the Online Mode. Wave Electronics and Its Application in Information and Telecommunication Systems. 2022;5(1):430‒435.</mixed-citation></citation-alternatives></ref><ref id="cit24"><label>24</label><citation-alternatives><mixed-citation xml:lang="ru">Kox J.H.A.M., van der Zwan J.S, Groenewoud J.H., Runhaar J., Bierma-Zeinstra S.M.A., Bakker E.J.M., et al. Predicting late dropout from nursing education or early dropout from the profession // Science Talks. 2022. Vol. 5. P. 100106. DOI:10.1016/j.sctalk.2022.100106</mixed-citation><mixed-citation xml:lang="en">Kox J.H.A.M., van der Zwan J.S, Groenewoud J.H., Runhaar J., Bierma-Zeinstra S.M.A., Bakker E.J.M., et al. Predicting late dropout from nursing education or early dropout from the profession. Science Talks. 2022. Vol. 5. P. 100106. DOI:10.1016/j.sctalk.2022.100106</mixed-citation></citation-alternatives></ref><ref id="cit25"><label>25</label><citation-alternatives><mixed-citation xml:lang="ru">Lamia A.N.M. Role of data normalization in k-means algorithm results // Al-Kadhum 2nd International Conference on Modern Applications of Information and Communication Technology (Baghdad, Iraq, 8–9 December 2021). 2023. DOI:10.1063/5.0119267</mixed-citation><mixed-citation xml:lang="en">Lamia A.N.M. Role of data normalization in k-means algorithm results. Al-Kadhum 2nd International Conference on Modern Applications of Information and Communication Technology, 8–9 December 2021, Baghdad, Iraq. 2023. DOI:10.1063/5.0119267</mixed-citation></citation-alternatives></ref><ref id="cit26"><label>26</label><citation-alternatives><mixed-citation xml:lang="ru">Avant T., Morgansen K.A. Analytical Bounds on the Local Lipschitz Constants of ReLU Networks // IEEE Transactions on Neural Networks and Learning Systems. 2023. PP. 1–12. DOI:10.1109/TNNLS.2023.3273228</mixed-citation><mixed-citation xml:lang="en">Avant T., Morgansen K.A. Analytical Bounds on the Local Lipschitz Constants of ReLU Networks. IEEE Transactions on Neural Networks and Learning Systems. 2023:1–12. DOI:10.1109/TNNLS.2023.3273228</mixed-citation></citation-alternatives></ref><ref id="cit27"><label>27</label><citation-alternatives><mixed-citation xml:lang="ru">Bressan R. Building a multi-output Convolutional Neural Network with Keras // Medium. URL: https://towardsdatascience.com/building-a-multi-output-convolutional-neural-network-with-keras-ed24c7bc1178 (дата обращения 28.06.2023)</mixed-citation><mixed-citation xml:lang="en">Bressan R. Building a multi-output Convolutional Neural Network with Keras. Medium. URL: https://towardsdatascience.com/building-a-multi-output-convolutional-neural-network-with-keras-ed24c7bc1178 [Accessed 28.06.2023]</mixed-citation></citation-alternatives></ref><ref id="cit28"><label>28</label><citation-alternatives><mixed-citation xml:lang="ru">Do N.-T., Hoang V.-P., Doan V.S. A novel non-profiled side channel attack based on multi-output regression neural network // Journal of Cryptographic Engineering. 2023. DOI:10.1007/s13389-023-00314-4</mixed-citation><mixed-citation xml:lang="en">Do N.-T., Hoang V.-P., Doan V.S. A novel non-profiled side channel attack based on multi-output regression neural network. Journal of Cryptographic Engineering. 2023. DOI:10.1007/s13389-023-00314-4</mixed-citation></citation-alternatives></ref><ref id="cit29"><label>29</label><citation-alternatives><mixed-citation xml:lang="ru">Prasad J.R., Saikumar S., Subbarao B.V. Design and Development of Financial Fraud Detection using Machine Learning // International Journal of Emerging Trends in Engineering Research. 2020. Vol. 8. Iss. 9. PP. 5838‒5843. DOI:10.30534/ ijeter/2020/152892020</mixed-citation><mixed-citation xml:lang="en">Prasad J.R., Saikumar S., Subbarao B.V. Design and Development of Financial Fraud Detection using Machine Learning. International Journal of Emerging Trends in Engineering Research. 2020;8(9):5838‒5843. DOI:10.30534/ijeter/2020/152892020</mixed-citation></citation-alternatives></ref><ref id="cit30"><label>30</label><citation-alternatives><mixed-citation xml:lang="ru">Kitsune Network Attack Dataset // Kaggle. URL: https://www.kaggle.com/datasets/ymirsky/network-attack-dataset-kitsune (дата обращения 22.02.2023)</mixed-citation><mixed-citation xml:lang="en">Kaggle. Kitsune Network Attack Dataset // kaggle. URL: https://www.kaggle.com/datasets/ymirsky/network-attack-dataset-kitsune [Accessed 22.02.2023]</mixed-citation></citation-alternatives></ref><ref id="cit31"><label>31</label><citation-alternatives><mixed-citation xml:lang="ru">Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection // Github. URL: https://github.com/ymirsky/Kitsune-py (дата обращения 22.02.2023)</mixed-citation><mixed-citation xml:lang="en">Github. Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection. URL: https://github.com/ymirsky/Kitsune-py [Accessed 22.02.2023]</mixed-citation></citation-alternatives></ref><ref id="cit32"><label>32</label><citation-alternatives><mixed-citation xml:lang="ru">Mirsky Y., Doitshman T., Elovici Y., Shabtai A. Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection // arXiv:1802.09089. 2018. URL: https://arxiv.org/pdf/1802.09089.pdf (дата обращения 28.08.2023)</mixed-citation><mixed-citation xml:lang="en">Mirsky Y., Doitshman T., Elovici Y., Shabtai A. Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection. arXiv:1802.09089. 2018. URL: https://arxiv.org/pdf/1802.09089.pdf [Accessed 28.08.2023]</mixed-citation></citation-alternatives></ref><ref id="cit33"><label>33</label><citation-alternatives><mixed-citation xml:lang="ru">Miyamoto K., Goto H., Ishibashi R., Han C., Ban T., Takahashi T. et al. Malicious Packet Classification Based on Neural Network Using Kitsune Features // Poceedings of the Second International Conference on Intelligent Systems and Pattern Recognition (ISPR, Hammamet, Tunisia, 24–26 March 2022). Communications in Computer and Information Science. Cham: Springer, 2022. Vol. 1589. PP. 306‒314. DOI:10.1007/978-3-031-08277-1_25</mixed-citation><mixed-citation xml:lang="en">Miyamoto K., Goto H., Ishibashi R., Han C., Ban T., Takahashi T. et al. Malicious Packet Classification Based on Neural Network Using Kitsune Features. Proceedings of the Second International Conference on Intelligent Systems and Pattern Recognition (ISPR, Hammamet, Tunisia, 24–26 March 2022). Communications in Computer and Information Science, vol.1589. Cham: Springer; 2022. p.306‒314. DOI:10.1007/978-3-031-08277-1_25</mixed-citation></citation-alternatives></ref><ref id="cit34"><label>34</label><citation-alternatives><mixed-citation xml:lang="ru">Preprocessing data // Scikit-Learn. URL: https://scikit-learn.org/stable/modules/preprocessing.html (дата обращения 28.06.2023)</mixed-citation><mixed-citation xml:lang="en">Scikit-Learn. Preprocessing data. URL: https://scikit-learn.org/stable/modules/preprocessing.html [Accessed 28.06.2023]</mixed-citation></citation-alternatives></ref><ref id="cit35"><label>35</label><citation-alternatives><mixed-citation xml:lang="ru">Лукьянова О.А., Никитин О.Ю., Кунин А.С. Применение матричных фильтров и теории кос для процедурной генерации архитектур нейронных сетей // Вычислительные технологии. 2019. Т. 24. № 6. С. 69‒78. DOI:10.25743/ ICT.2019.24.6.009</mixed-citation><mixed-citation xml:lang="en">Lukyanova O.A., Nikitin O.Yu., Kunin A.S. Application of matrix filters and braid theory for the procedural generation of neural network architectures. Computional Technologies. 2019;24(6):69‒78. DOI:10.25743/ICT.2019.24.6.009</mixed-citation></citation-alternatives></ref><ref id="cit36"><label>36</label><citation-alternatives><mixed-citation xml:lang="ru">Scheliga D., Maeder P., Seeland M. Dropout Is NOT All You Need to Prevent Gradient Leakage // Proceedings of the 37th AAAI Conference on Artificial Intelligence and Thirty-Fifth Conference on Innovative Applications of Artificial Intelligence and Thirteenth Symposium on Educational Advances in Artificial Intelligence (Washington, USA, 7–14 February 2023). AAAI Press, 2023. Vol. 37. № 8. PP. 9733‒9741. DOI:10.1609/aaai.v37i8.26163</mixed-citation><mixed-citation xml:lang="en">Scheliga D., Maeder P., Seeland M. Dropout Is NOT All You Need to Prevent Gradient Leakage. Proceedings of the 37th AAAI Conference on Artificial Intelligence and Thirty-Fifth Conference on Innovative Applications of Artificial Intelligence and Thirteenth Symposium on Educational Advances in Artificial Intelligence, 7–14 February 2023, Washington, USA, vol.37. №8. AAAI Press; 2023. p.9733‒9741. DOI:10.1609/aaai.v37i8.26163</mixed-citation></citation-alternatives></ref></ref-list><fn-group><fn fn-type="conflict"><p>The authors declare that there are no conflicts of interest present.</p></fn></fn-group></back></article>
