DEVELOPMENT OF MODULAR NEURAL NETWORKS FOR DETECTING DIFFERENT CLASSES OF NETWORK ATTACKS
DOI:
https://doi.org/10.28925/2663-4023.2025.27.772Keywords:
cybersecurity, cyber threat, modular neural networks, cyberattack, network attacks, traffic analysis, machine learning, threat classification, gradient descent, intrusion detection system.Abstract
The article discusses the development of modular neural networks for detecting different classes of network attacks, which is an important step towards improving intrusion detection systems. Modern attack detection systems face numerous limitations, including low efficiency when analyzing large volumes of data, high training time requirements, and challenges in adapting to new types of threats. These shortcomings are due to the use of monolithic approaches, where all network interaction parameters are processed within a single neural network, significantly reducing the system's flexibility and effectiveness. The modular approach proposed in the article involves using separate neural networks to process groups of similar network interaction parameters, which increases attack detection efficiency, reduces model training time, and enables dynamic disabling or retraining of individual modules without stopping the entire system. This architecture allows for more effective attack classification and enhances the system’s ability to adapt to new threats. The article also thoroughly analyzes the advantages of the modular approach compared to traditional monolithic systems, providing significantly greater flexibility and accuracy in detecting and classifying various types of attacks.
Downloads
References
Shpinareva, I. M., Yakushina, A. A., Voloshchuk, L. A., & Rudnichenko, N. D. (2021). Detection and classification of network attacks using the deep neural network cascade. Herald of Modern Information Technologies, 4(3), 244–254.
Tang, T. A., Mhamdi, L., McLernon, D., Zaidi, S. A. R. & Ghogho, M. (2016). Deep learning approach for network intrusion detection in software defined networking. Proceedings of International Conference on Wireless Networks and Mobile Communications (WINCOM), 258–263.
Maksimov, M. & Shpinareva, I. (2018). Attack Detection System on Local Computer Network. Proceedings of the International Scientific Young Scientists Conference CSYSC, 102–105.
Markus, R., et al. (2019). A survey of network-based intrusion detection data sets. Computers & security, 8(6), 147–167.
Liu, Y., & Lee, S. (2019). Comparison of Traditional and Modular Neural Networks for Intrusion Detection. Journal of Cyber Security, 15(2), 200–212.
Pereira, M., & Stewart, S. (2021). Network Interaction in Cloud Protocols. Cloud Infrastructure Journal, 13(4), 200–215.
Kostiuk, Y., Skladannyi, P., Korshun, N., Bebeshko, B., & Khorolska, K. (2024). Integrated protection strategies and adaptive resource distribution for secure video streaming over a Bluetooth network. Information Technology, 4(6), 14–33.
Zhang, M., Xu, B., Bai, S., Lu, S. & Lin, Z. (2017). A deep learning method to detect web attacks using a specially designed CNN. Proceedings of 24th International Conference on Neural Information Processing, 828–836.
Kostiuk, Y., Skladannyi, P., Sokolov, V., Hulak, H. & Korshun, N. (2025). Models and algorithms for analyzing information risks during the security audit of personal data information system. Cyber Hygiene & Conflict Management in Global Information Networks, 3925, 155–171.
Wang, W., Zhu, M., Zeng, X., Ye, X. & Sheng, Y. (2017). Malware traffic classification using convolutional neural network for representation learning. Proceedings of International Conference on Information Networking. https://doi.org/10.1109/ ICOIN.2017.7899588
Liu, H. Y., Xiangdong, C. & Lakkaraju, S. (2017). Understanding modern intrusion detection systems. College of Technology, Eastern Michigan University, 1–3.
Kostiuk, Y., Skladannyi, P., Samoilenko, Y., Khorolska, K., Bebeshko, B., & Sokolov, V. (2025). A system for assessing the interdependencies of information system agents in information security risk management using cognitive maps. Cyber Hygiene & Conflict Management in Global Information Networks, 3925, 249–264.
Harsh, P. & Purvi P. (2018). Study and Analysis of Decision Tree Based Classification Algorithms. International Journal of Computer Sciences and Engineering, 6(10), 74–78.
Panigrahi, R. (2018). A detailed analysis of dataset for designing Intrusion Detection Systems. IJET, 7(24), 479–482.
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Павло Складанний , Юлія Костюк, Світлана Рзаєва, Юлія Самойленко, Тетяна Савченко

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.