KIBERXAVFSIZLIKDA SUN’IY INTELLEKT ASOSIDA TAHDIDLARNI ANIQLASH ALGORITMLARI
PDF
DOI

Keywords

Kiberxavfsizlik, Sun’iy intellekt, Tahdidlarni aniqlash, Mashina o‘rganish, Chuqur o‘rganish, Anomaliya aniqlash, Neyron tarmoqlar, XGBoost, Gibrid algoritmlar, Tarmoq xavfsizligi.

How to Cite

KIBERXAVFSIZLIKDA SUN’IY INTELLEKT ASOSIDA TAHDIDLARNI ANIQLASH ALGORITMLARI. (2025). TECHNICAL SCIENCE RESEARCH IN UZBEKISTAN, 3(11), 19-30. https://universalpublishings.com/~niverta1/index.php/tsru/article/view/14314

Abstract

Ushbu maqolada kiberxavfsizlik sohasida sun’iy intellekt asosida tahdidlarni aniqlash algoritmlari batafsil tahlil qilinadi. Zamonaviy axborot tizimlarida kiberhujumlar tobora murakkablashib borayotganligi sababli, an’anaviy xavfsizlik vositalari yetarli samaradorlik ko‘rsata olmayapti. Shu bois, maqolada mashina o‘rganish va chuqur o‘rganish yondashuvlari asosida tahdidlarni aniqlash usullari ko‘rib chiqilgan. Tarmoqdagi anomaliyalarni aniqlash, zararli dasturiy ta’minot va kiberhujumlarni ilgari surish imkonini beruvchi sun’iy intellekt algoritmlarining afzalliklari va kamchiliklari tahlil qilingan

PDF
DOI

References

1.Sommer, R., & Paxson, V. (2010). Outside the closed world: On using machine learning for network intrusion detection. IEEE Symposium on Security and Privacy.

2.Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM Computing Surveys (CSUR), 41(3), 1-58.

3.Kim, G., Lee, S., & Kim, S. (2014). A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Systems with Applications, 41(4), 1690-1700.

4.Yin, C., Zhu, Y., Fei, J., & He, X. (2017). A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access, 5, 21954-21961.

5.Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153-1176.

6.Zhang, J., Zulkernine, M., & Haque, A. (2008). Random-forest-based network intrusion detection systems. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 38(5), 649-659.

7.Abiodun, O. I., Jantan, A., Omolara, A. E., et al. (2018). State-of-the-art in artificial neural network applications: A survey. Heliyon, 4(11), e00938.

8.Wang, W., Sheng, Y., Wang, J., et al. (2018). A survey of deep learning for network anomaly detection. IEEE Communications Surveys & Tutorials, 21(1), 686-728.

9.Chen, T., & Guestrin, C. (2016). XGBoost: A scalable tree boosting system. Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.

10.Goodfellow, I., Bengio, Y., & Courville, A. (2016). Deep Learning. MIT Press.

Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.