Abstract
Ushbu maqolada kiberxavfsizlik sohasida sun’iy intellekt asosida tahdidlarni aniqlash algoritmlari batafsil tahlil qilinadi. Zamonaviy axborot tizimlarida kiberhujumlar tobora murakkablashib borayotganligi sababli, an’anaviy xavfsizlik vositalari yetarli samaradorlik ko‘rsata olmayapti. Shu bois, maqolada mashina o‘rganish va chuqur o‘rganish yondashuvlari asosida tahdidlarni aniqlash usullari ko‘rib chiqilgan. Tarmoqdagi anomaliyalarni aniqlash, zararli dasturiy ta’minot va kiberhujumlarni ilgari surish imkonini beruvchi sun’iy intellekt algoritmlarining afzalliklari va kamchiliklari tahlil qilingan
References
1.Sommer, R., & Paxson, V. (2010). Outside the closed world: On using machine learning for network intrusion detection. IEEE Symposium on Security and Privacy.
2.Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM Computing Surveys (CSUR), 41(3), 1-58.
3.Kim, G., Lee, S., & Kim, S. (2014). A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Systems with Applications, 41(4), 1690-1700.
4.Yin, C., Zhu, Y., Fei, J., & He, X. (2017). A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access, 5, 21954-21961.
5.Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153-1176.
6.Zhang, J., Zulkernine, M., & Haque, A. (2008). Random-forest-based network intrusion detection systems. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 38(5), 649-659.
7.Abiodun, O. I., Jantan, A., Omolara, A. E., et al. (2018). State-of-the-art in artificial neural network applications: A survey. Heliyon, 4(11), e00938.
8.Wang, W., Sheng, Y., Wang, J., et al. (2018). A survey of deep learning for network anomaly detection. IEEE Communications Surveys & Tutorials, 21(1), 686-728.
9.Chen, T., & Guestrin, C. (2016). XGBoost: A scalable tree boosting system. Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.
10.Goodfellow, I., Bengio, Y., & Courville, A. (2016). Deep Learning. MIT Press.

This work is licensed under a Creative Commons Attribution 4.0 International License.