A hybrid method for modeling artificial intelligence systems to detect cyberattacks
https://doi.org/10.21822/2073-6185-2025-52-2-81-89
Abstract
Objective. The aim of the research is to develop an adaptive system for protecting critical life support infrastructure based on hybrid AI methods that combine machine learning (ML) and reinforcement learning. Method. A hybrid method of modeling artificial intelligence systems to detect cyber attacks is used. The basis of the method is a combination of reinforcement learning and anomaly analysis, which allows the system to automatically adapt to new threats. Result. It is proposed to implement artificial intelligence systems at the stages of monitoring, analysis of the received data and prompt response to eliminate the threat. The system includes the development of hybrid models for data analysis, which combines information from external sources and event logs. The use of the system will increase the stability of the infrastructure, reduce vulnerability to threats, and ensure uninterrupted operation in the conditions of an information threat. Conclusion. New approaches to the use of artificial intelligence systems are considered. Artificial intelligence models based on machine learning are proposed, allowing for the detection of not only old threats but also atypical scenarios of information hacks in a short time. Predictive algorithms are used to analyze the abnormal behavior of the malicious system, and deep learning provides accurate conclusions about threat classification.
About the Author
A. I. DubrovinaRussian Federation
Angelina I. Dubrovina, Assoc. Prof.
1 Gagarina Square, Rostov-on-Don 344002
References
1. Shelukhin V.V., Zeghda D.P. Intelligent Technologies for Information Security. Moscow: MSTU Publishing House, 2021. 320 p. (In Russ.)
2. Liu Y. Reinforcement Learning with PyTorch: A Cookbook. St. Petersburg: Peter, 2020. 400 p. (In Russ.)
3. Xu S., et al. Cybersecurity in Intelligent Networking Systems. New Jersey: Wiley-IEEE Press, 2019. 368 p.
4. Goodfellow I., et al. Deep Learning. MIT Press, 2016. 800 p.
5. Alavizadeh H., et al. Deep Reinforcement Learning for Cybersecurity: A Comprehensive Review. IEEE Access, 2023;11:12392-12416.
6. Sutton R.S., Barto A.G. Reinforcement Learning: An Introduction. 2nd ed. Cambridge: MIT Press, 2018. 552 p.
7. Kaspersky K., et al. Advanced Persistent Threats: Detection, Analysis, and Protection. Berlin: Springer, 2020. 278 p.
8. Gavrilov A.V., Petrenko S.A. Machine Learning in Cybersecurity Tasks. Moscow:DMK Press, 2022. 192p. (In Russ.)
9. Silver D., et al. Mastering the game of Go with deep neural networks and tree search. Nature, 2016; 529: 484-489.
10. Lipaev V.V. Protection of Critical Infrastructure from Cyber Attacks. St.Petersburg: Lan, 2021;245(In Russ.)
11. Mnih V., et al. Human-level control through deep reinforcement learning. Nature, 2015; 518:529-533.
12. Osipov D.S. Neural Networks for Network Traffic Analysis. Moscow: Infra-Engineering, 2023. 168 p. (In Russ.)
13. Carlini N., Wagner D. Adversarial Examples: Attacks and Defenses. arXiv:1802.00420, 2019.
14. Mironov A.A., Sokolova E.V. Deep Learning in Data Protection. Novosibirsk: NSU, 2022. 210 p.(In Russ.)
15. LeCun Y., Bengio Y., Hinton G. Deep learning. Nature, 2015;521:436-444.
16. Schneier B. Applied Cryptography. Moscow: Triumph, 2020. 816 p. (In Russ.)
17. Papernot N., et al. Practical Black-Box Attacks Against Machine Learning. ACM CCS, 2017; 506-519.
18. Tanenbaum A.S., Wetherall D. Computer Networks. 6th ed. New Jersey: Pearson, 2021. 960 p.
19. Krutov A.N., Belov A.I. Artificial Intelligence in Energy. Moscow:Energoatomizdat, 2023.304 p.(In Russ.)
20. Madry A., et al. Towards Deep Learning Models Resistant to Adversarial Attacks. ICLR, 2018.
Review
For citations:
Dubrovina A.I. A hybrid method for modeling artificial intelligence systems to detect cyberattacks. Herald of Dagestan State Technical University. Technical Sciences. 2025;52(2):81-89. (In Russ.) https://doi.org/10.21822/2073-6185-2025-52-2-81-89