<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="article">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">cndcgs</journal-id>
      <journal-title-group>
        <journal-title>Challenges to national defence in contemporary geopolitical situation</journal-title>
      </journal-title-group>
      <issn pub-type="epub">2538-8959</issn>
      <issn pub-type="ppub">2669-2023</issn>
      <publisher>
        <publisher-name>LKA</publisher-name>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">7_CNDCGS_2022_55-61</article-id>
      <article-id pub-id-type="doi">10.47459/cndcgs.2022.7</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Article</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Network Attack Detection Using Machine Learning Methods</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <name>
            <surname>ZAGORODNA</surname>
            <given-names>Nataliya</given-names>
          </name>
          <email xlink:href="mailto:zagorodna.n@gmail.com">zagorodna.n@gmail.com</email>
          <xref ref-type="aff" rid="j_cndcgs_aff_000"/>
        </contrib>
        <aff id="j_cndcgs_aff_000">Department of Cybersecurity, Faculty of Computer Information Systems and Software Engineering, Department of Cybersecurity, Ternopil Ivan Puluj National Technical University, Ukraine</aff>
        <contrib contrib-type="author">
          <name>
            <surname>STADNYK</surname>
            <given-names>Mariia</given-names>
          </name>
          <email xlink:href="mailto:maria.stadnyk@gmail.com">maria.stadnyk@gmail.com</email>
          <xref ref-type="aff" rid="j_cndcgs_aff_001"/>
          <xref ref-type="corresp" rid="cor2">∗∗</xref>
        </contrib>
        <aff id="j_cndcgs_aff_001">Department of Cybersecurity, Faculty of Computer Information Systems and Software Engineering, Department of Cybersecurity, Ternopil Ivan Puluj National Technical University, Ukraine</aff>
        <contrib contrib-type="author">
          <name>
            <surname>LYPA</surname>
            <given-names>Borys</given-names>
          </name>
          <email xlink:href="mailto:borislipa699@gmail.com">borislipa699@gmail.com</email>
          <xref ref-type="aff" rid="j_cndcgs_aff_002"/>
        </contrib>
        <aff id="j_cndcgs_aff_002">Department of Cybersecurity, Faculty of Computer Information Systems and Software Engineering, Department of Cybersecurity, Ternopil Ivan Puluj National Technical University, Ukraine</aff>
        <contrib contrib-type="author">
          <name>
            <surname>GAVRYLOV</surname>
            <given-names>Mykola</given-names>
          </name>
          <email xlink:href="mailto:gavrilovnikolay1999@gmail.com">gavrilovnikolay1999@gmail.com</email>
          <xref ref-type="aff" rid="j_cndcgs_aff_003"/>
        </contrib>
        <aff id="j_cndcgs_aff_003">Department of Cybersecurity, Faculty of Computer Information Systems and Software Engineering, Department of Cybersecurity, Ternopil Ivan Puluj National Technical University, Ukraine</aff>
        <contrib contrib-type="author">
          <name>
            <surname>KOZAK</surname>
            <given-names>Ruslan</given-names>
          </name>
          <email xlink:href="mailto:ruslan.o.kozak@gmail.com">ruslan.o.kozak@gmail.com</email>
          <xref ref-type="aff" rid="j_cndcgs_aff_004"/>
        </contrib>
        <aff id="j_cndcgs_aff_004">Department of Cybersecurity, Faculty of Computer Information Systems and Software Engineering, Department of Cybersecurity, Ternopil Ivan Puluj National Technical University, Ukraine</aff>
      </contrib-group>
      <author-notes>
        <corresp id="cor2"><label>∗∗</label>Corresponding author.</corresp>
      </author-notes>
      <volume>2022</volume>
      <issue>1</issue>
      <fpage>55</fpage>
      <lpage>61</lpage>
      <pub-date pub-type="epub">
        <day>03</day>
        <month>11</month>
        <year>2022</year>
      </pub-date>
      <permissions>
        <license license-type="open-access">
          <license-p>Creative Commons Attribution International License (CC BY)</license-p>
        </license>
      </permissions>
      <abstract>
        <p>This paper presents the result of the study of network intrusion detection using machine learning algorithms. The creation and training of such algorithms is seriously limited by the small number of actual datasets available for public access. The CSE-CIC-IDS2018 data set, used in research, includes 7 subsets of different attack scenarios. Each subset is labeled using a few subtypes of a given attack or normal behavior. That is why the problem of network attack detection has been considered a multiclassification problem. Some of the most popular classifiers will be tested on the chosen data set. Classification algorithms are developed using a standard Python programming environment and the specialized machine learning library Scikit-learn. In the paper, a comparative analysis of the results was performed based on the the application of Random Forest, XGBoost, LR, and MLP classifiers.</p>
      </abstract>
      <kwd-group>
        <label>Keywords</label>
        <kwd>network attack</kwd>
        <kwd>DOS</kwd>
        <kwd>DDOS</kwd>
        <kwd>botnet</kwd>
        <kwd>cybersecurity</kwd>
        <kwd>machine learning</kwd>
        <kwd>classification</kwd>
        <kwd>Random Forest</kwd>
        <kwd>XGBoost</kwd>
        <kwd>MLP classifier</kwd>
        <kwd>LR</kwd>
      </kwd-group>
    </article-meta>
  </front>
</article>
