DEVELOPMENT OF A METHOD FOR IDENTIFYING THE STATE OF A COMPUTER SYSTEM USING FUZZY CLUSTER ANALYSIS
Main Article Content
Abstract
Article Details
References
Shelukhin, O.I., Sakalema, D.Zh. and Filinova, A.S. (2013), Intrusion detection in computer networks, GlT, Moscow, 220 p.
Shkodyrev, P.V., Yagafarov, K.I., Bashtovenko, V.A. and Ilyin E.E. (2017), “A review of methods for detecting anomalies in data streams”, Proc. of the 2 Conf. on Software Engineering and Information Management, St. Petersburg, Russia, Vol. 18, pp. 64–70.
Agrawal, S. (2015), “Survey on Anomaly Detection using Data Mining Techniques”, Proc. Computer. Science, Vol. 60, pp. 708-713.
Chandola, V., Banerjee, A. and Kumar, V. (2012), “Anomaly detection for discrete sequences: A survey”, IEEE Transactions on Knowledge and Data Engineering, Vol. 24, No. 5, pp. 823–839.
Barseghyan, A.A., Kupriyanov, M.S., Stepanenko, V.V. and Cold, I.I. (2007), Data Analysis Technologies: Data Mining, Visual Mining, Text Mining, OLAP, 2nd ed., Revised. And add, BHV-Petersburg, S-Pb., 384 p.
Semenov, S.G. and Gavrilenko, S.Yu. (2015), “Formation and study of heuristics in antivirus analyzers using the Mamdani algorithm”, Journal of Qafqaz university, Azerbadhan, Mathematics and computer scienceVol. 3, No. 3, pp. 116-120.
Fisher, R. A. (1958), Statistical methods for researchers, Gosstatizdat, Moscow, 267 p.
Semеnov, S., Gavrilenko, S. and Chelak, V. (2016), “Developing parametrical criterion for registering abnormal behavior in computer and telecommunication systems on basis of economic test”, Actual problems of economics, Kyiv, Vol. 4(178), рр. 451-459.
Sutton, R.S. and Barto, A.G. (2020), Reinforcement Learning, 2-nd edition, DMK press, Moscow, 552 p.
Rokach, L. (2010), “Ensemble-based classifiers”, Artificial Intelligence Review, Vol. 33, release 1–2.
(2020), Methods of constructing decision trees in classification problems in Data Mining, available at: https://ami.nstu.ru/~vms/lecture/data_mining/trees.htm
Iwan, Syarif, Ed, Zaluska1, Adam, Prugel-Bennett1 and Gary, Wills (2012), Application of Bagging, Boosting and Stacking to Intrusion Detection, Springer-Verlag Berlin Heidelberg. Perner (Ed.): MLDM, LNAI 7376, pp. 593–602.
Tarkhov, D.A. (2014), Neural network models and algorithms, Radio Engineering, Moscow, 352 p.
Barsky, A.B. (2004), Neural networks: recognition, control, decision making, Finance and statistics, Moscow, 176 p.
Rutkovskaya, D.S., Pilinsky, M.V. and Rutkovsky, L.P. (2004), Neural networks, genetic algorithms and fuzzy systems, Garyachaya liniya-Telecom, Moscow, 452 p.
Korchenko A.O. (2019), Methods of identification of anomalous stations for systems of detection of intrusion, Dis. doc those. 05.13.21 - Systems for information security, Kyiv, 405 p.
Lin, W-C., Ke, W-S. and Tsai, C-F (2015), “An intrusion detection system based on combining cluster centers and nearest neighbors”, Knowledge-Based Systems, vol. 78, pp. 13-21.
Mandel, I.D. (1988), Methods of cluster analysis, Finance and Statistics, Moscow, 176 p.
Egorenko, M.V. and Bokhovko, A.G. (2016), “Cluster analysis as a means of grouping the studied variables”, Collection of St. Petersburg State University of Economics, 2016, Issue 7, p. 57-69.
Kofman, A. (1982), Introduction to the theory of fuzzy sets, Radio and communications, Moscow, 486 p.
Semenov, S., Sira, O., Gavrylenko, S. and Kuchuk N. (2019), “Identification of the state of an object under conditions of fuzzy input data”, Eastern-European Journal of Enterprise Technologies, vol. 1, no 4 (97), pp. 22-29, DOI:
https://doi.org/10.15587/1729-4061.2019.1570.
Raskin, L.G. and O.V. Sira (2008), Fuzzy math. Fundamentals of the theory. Applications, Parus, Kharkiv, 352 p.
(2019), Detector Performance Analysis Using ROC Curves, available at: https://www.mathworks. com/help/phased/examples /detector-performance-analysis-using-roc-curves.html
Fawcett, T. (2006), “An Introduction to ROC Analysis”, Pattern Recognition Letters, 27 (8), pp. 861–874.