dc.contributor.author |
Zhukabayeva, Tamara |
|
dc.contributor.author |
Adamova, Aigul |
|
dc.contributor.author |
Ven-Tsen, Khu |
|
dc.contributor.author |
Nurlan, Zhanserik |
|
dc.contributor.author |
Mardenov, Yerik |
|
dc.contributor.author |
Karabayev, Nurdaulet |
|
dc.date.accessioned |
2024-09-25T05:05:12Z |
|
dc.date.available |
2024-09-25T05:05:12Z |
|
dc.date.issued |
2024 |
|
dc.identifier.issn |
25499904 |
|
dc.identifier.other |
DOI 10.62527/joiv.8.1.2220 |
|
dc.identifier.uri |
http://rep.enu.kz/handle/enu/16951 |
|
dc.description.abstract |
The imperfection of existing intrusion detection methods and the changing nature of malicious actions on the attacker's part
led to the Internet of Things (IoT) network interaction in an unsafe state. The actual problem of improving the technology of the IOT
is counteracting malicious network impacts. In this regard, research and development aimed at creating effective tools for solving
applied problems within the framework of this problem are becoming increasingly important. This study seeks to develop tools for
detecting anomalous network conditions resulting from malicious attacks. In particular, the accuracy of the identification of DoS and
DDoS attacks is sufficient for operational use. This study analyzes various multi-level architectures, relevant communication protocols,
and different types of network attacks. The presented research was conducted on open datasets TON_IOT DATASETS, which include
multiple data sources collected from IoT sensors. The modified HyperNEAT algorithm was used as the basis for the development. The
NEAT methodology used in the study allows you to combine various network nodes. Results of the study: a neuro-evolutionary
algorithm for identifying DoS and DDoS attacks was implemented, integrated, and real-tested based on a multi-level analysis of network
traffic combined with various adaptive modules. The accuracy of identifying DoS and DDoS attacks is 0.9242 in the Accuracy metric.
The study implies that the proposed approach can be recommended for network intrusion detection, ensuring security when interacting
with the IoT. |
ru |
dc.language.iso |
en |
ru |
dc.publisher |
International Journal on Informatics Visualization |
ru |
dc.relation.ispartofseries |
Том 8, Выпуск 1, Страницы 387 - 394; |
|
dc.subject |
Internet of Things |
ru |
dc.subject |
attacks |
ru |
dc.subject |
HyperNEAT |
ru |
dc.subject |
neuro-evolutionary algorithm |
ru |
dc.subject |
wireless sensor network |
ru |
dc.title |
Network Attack Detection Using NeuroEvolution of Augmenting Topologies (NEAT) Algorithm |
ru |
dc.type |
Article |
ru |