<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Exposing Deviations in Information Processes using Multifractal Analysis</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Yevhen</forename><surname>Ivanichenko</surname></persName>
							<email>y.ivanichenko@kubg.edu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">Borys Grinchenko Kyiv University</orgName>
								<address>
									<addrLine>18/2 Bulvarno-Kudriavska str</addrLine>
									<postCode>04053</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Valerii</forename><surname>Kozachok</surname></persName>
							<email>v.kozachok@kubg.edu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">Borys Grinchenko Kyiv University</orgName>
								<address>
									<addrLine>18/2 Bulvarno-Kudriavska str</addrLine>
									<postCode>04053</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Yurii</forename><surname>Dreis</surname></persName>
							<email>dreisyuri@gmail.com</email>
							<affiliation key="aff1">
								<orgName type="institution">Polissia National University</orgName>
								<address>
									<addrLine>7 Staryi ave</addrLine>
									<postCode>10008</postCode>
									<settlement>Zhytomyr</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Olena</forename><surname>Nesterova</surname></persName>
							<email>o.d.nesterova@npu.edu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">Borys Grinchenko Kyiv University</orgName>
								<address>
									<addrLine>18/2 Bulvarno-Kudriavska str</addrLine>
									<postCode>04053</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff2">
								<orgName type="institution">National Pedagogical Dragomanov University</orgName>
								<address>
									<addrLine>9 Pyrohova str</addrLine>
									<postCode>01601</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Kate</forename><surname>Dmytriienko</surname></persName>
							<email>k.dmytriienko.asp@kubg.edu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">Borys Grinchenko Kyiv University</orgName>
								<address>
									<addrLine>18/2 Bulvarno-Kudriavska str</addrLine>
									<postCode>04053</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff3">
								<orgName type="department">Cybersecurity Providing in Information and Telecommunication Systems</orgName>
								<address>
									<addrLine>October 26</addrLine>
									<postCode>2021</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Exposing Deviations in Information Processes using Multifractal Analysis</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">490D3D5A09C63D39F1E3123A4892853B</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T19:24+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Fractal analysis</term>
					<term>the Hurst exponent</term>
					<term>network deviation detection</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The main requirement for modern systems of intrusion detection is the possibility of identifying deviations in information processes in order to detect unknown attack types. An overview of existing approaches to identifying network deviations based on multifractal analysis methods is given. The results of the calculation of the Hurst exponent for the time series of CPU usage for different types of user activity are presented.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Signature methods of analysis used in modern intrusion detection systems aimed at identifying known and more specific methods of attacks, appear not to be able to detect their modifications or new types, which makes the use of such systems ineffective. Existing solutions to individual cases of detection of network deviations to this time do not allow to develop a single universal mechanism for detecting previously unknown attack types.</p><p>The current task at the moment is to find more effective universal methods for detecting network deviations that are a consequence of technical failures or unauthorized impacts. The main requirement for these methods is the possibility of identifying arbitrary types of intruders, including distributed in time. Statistical studies of network traffic indicate that it has the properties of fractality or selfsimilarity, as well as the variability of these characteristics in the event of deviations in the network, which allows the use of fractal analysis to detect attacks <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2]</ref>.</p><p>The purpose of this study is an overview of modern existing approaches to identifying network deviations based on the method of fractal analysis.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Methods of Detecting Attacks</head><p>Attacks are deliberate actions of the offender, leading to violation of confidentiality, integrity or accessibility of the system.</p><p>Methods of detection of attacks are divided into: 1. Signature. 2. Behavioral. Signature methods are intended to detect known and clearly described attacks and founded on a reference verification of symbol sequences and events with the database of attack signatures. Advantages of signature methods include low demands for computing power and probability of detection of attacks. Disadvantages of signature methods are the impossibility of identifying new types of attacks and modifications that exist without a clear formalization of keywords of network traffic and updating the signature database.</p><p>Behavioral methods are intended to identify unknown attacks and are based on detection of deviations from normal operation mode. Advantages of behavioral methods comprise the possibility of analyzing the dynamics of processes and the possibility of identifying new types of attacks. Disadvantages of behavioral methods include higher requirements for computing resources and capacities and lower probability of detection.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Fractal Analysis</head><p>The time series is a sequence of values of the studied magnitude measured at regular intervals. The central concepts of fractal analysis are fractal dimension (D) and the Hurst exponent (H). The fractal dimension of the set (according to Hausdorff) is determined by:</p><formula xml:id="formula_0">D = − lim ε→∞ lg [N(ε)] lg (ε) ,<label>(1)</label></formula><p>where N(ε)the minimum number of non-empty cells ε that cover a given set. The Hurst exponent characterizes the degree of similarity of the process: 1. 0 &lt;H &lt;0.5random process, which does not have self-similarity and is characterized by a tendency for average value;</p><p>2. H = 0.5a completely random process without a pronounced tendency; 3. H&gt; 0.5a trend-resistant process that has a long memory and is self-similar. The fractal dimension is directly related to the Hurst exponent: D = 2 -H. This ratio is fair when the structure of the curve that describes the fractal function is investigated with high resolution, that is, in the local limits. One of the popular methods of finding fractal dimension is R / S analysis <ref type="bibr" target="#b1">[2]</ref>:</p><formula xml:id="formula_1">M [ R(n) S(n) ] ~cn H , n → ∞<label>(2)</label></formula><p>where nhigh resolution; сa positive finite constant that does not depend on n; Нthe Hurst exponent; R(n)the scope of the time series.</p><formula xml:id="formula_2">R(n) = max 1≤j≤n ∆ j − min 1≤j≤n ∆ j<label>(3)</label></formula><formula xml:id="formula_3">∆ j = ∑ x i − kx ̅ n i=n , k = 1, n ⃗⃗⃗⃗⃗⃗ (4) x ̅ = 1 n ∑ x i n i=1</formula><p>(5)</p><formula xml:id="formula_4">S(n) = 1 n−1 ∑ (x i − x ̅) 2 n i=1 (6)</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Review of Existing Methods and Approaches</head><p>In <ref type="bibr" target="#b0">[1]</ref>, a method of maximum modules of wavelet transform (MMWT) is used to detect traffic deviations, which allows us to detect the singularity of the signal. The network traffic collected on the boundary router of the university network was taken as the analyzed data. Each sequence is about 24 hours long with a sampling step of 1 second. Samples of "pure" traffic without attacks, and also with various deviations are presented: at DDoS-attacks of different types of scanning. The algorithm for estimating the parameters of the multifractal spectrum is as follows:</p><p>The output signal f (t) is decomposed by means of a wavelet transform by the mother wavelet Ψ (t) into the corresponding coefficients:</p><formula xml:id="formula_5">W f (u, i) = (f(t), Ψ u,s (t)) = 2 − j 2 ∫ t−u 2 j dt<label>(7)</label></formula><p>The partition function is calculated: S(q, j) = ∑ |W f (u p , j| q p (8) For each value of q∈R it is necessary to calculate the scale indicator: τ(q, j) = log j→0 inf lnS(q,j) ln2 j (9) Then the multifractal spectrum f l (a), using the Legendre transformation is calculated:</p><formula xml:id="formula_6">f l (a) = min q∈R [q (a + 1 2 ) − τ(q)]<label>(10)</label></formula><p>For each octave j, the multifractal dimension of the order q is calculated: D q,j = 1 q−1 [q(a(q, j) − f(a(q), j))]</p><p>When q &lt;0, the value of S (q, j) depends on small maxima of the amplitude | W_f (u_p, j) |, as a result, the calculations may not be stable.</p><p>In order to avoid the emergence of false maxima of modules created by computing errors in areas where f is almost constant, wavelet-maxima are combined in a chain to form a maximum curve depending on the scale.</p><p>If Ψ = (−1) P θ (p) , where θ = 1 √2π e −t 2 2 -Gaussian function, then all lines of maxima u p (j) are determined by curves that are limited by j = 0. Therefore, all maximum lines that do not extend to the smallest scale are deleted when calculating S (q, j).</p><p>Formalizing the difference in traffic spectra with certain deviations and without them, it is possible to compare the fractal dimensions D1, correlation dimensions D2 and intervals characterizing the "width" of the Lezhandr spectrum for each of the implementations for each octave of decomposition of j.</p><p>Information dimensions of the comparative implementations D1 are distinguished by a small stable value and practically do not depend on the number of levels of sampling. This allows us to conclude that the presence of long-term attacks in the signal and non-predicted activity changes the self-similar nature of traffic, and this property can be used in the future to detect attacks.</p><p>In <ref type="bibr" target="#b2">[3]</ref> it is proposed to determine the deviations, based on their identity and distribution of "heavy tails". Network deviations may occur as a result of overloads, errors by network devices, DDOS attacks, attempts of unauthorized access. To reduce the impact of the periodicity of network traffic on the estimation of the Hurst exponent, the time series is divided into 24 sets of values.</p><p>For each set, a histogram is built for 24 equal intervals. For each group there are a packet number and the average package length for the same time intervals. At the next stage, the Hurst exponent is calculated by the method of periodogram that use the slope of the power spectrum. The Hurst exponent is calculated from the ratio:</p><formula xml:id="formula_8">β − 1 = 1 − 2Н,<label>(12)</label></formula><p>where β -the slope of the line on a logarithmic scale.</p><p>In practice, you must first analyze traffic in the regular network operation mode during the day. When the deviation detection mode is turned on, at first the Hurst exponent is calculated and compared with the corresponding reference value calculated in normal mode, for each parameter separately.</p><p>In the paper <ref type="bibr" target="#b3">[4]</ref>, an algorithm for detecting deviations based on a discrete stationary wavelet transform and fractal dimension is used. As the first step, a time series filtering with a discrete stationary wavelet transform is performed. This preliminary processing is necessary to increase the accuracy of the proposed method: the main components are allocated, the details are filtered.</p><p>The main advantage of the discrete stationary wavelet transform over a classic one is the preservation of the time information of the output signal at each level. In the second step, the time series is bypassed by two adjacent windows R and S. For each window, a fractal dimension is calculated according to the algorithm:</p><formula xml:id="formula_9">FD = lg ( L a ) lg( d a ) (13)</formula><p>where Lthe length of the time series, dthe distance between the first point of the series and the farthest from it, a -the average distance between two adjacent points of the series.</p><p>Changes in the statistical parameters of the signal are reflected in the fractal dimension, to account for which the following function is introduced:</p><formula xml:id="formula_10">G k = |FD k+1 − FD k |, k = 1, … , n<label>(14)</label></formula><p>where n = number of points G.</p><p>The third step is the search for local maxima G that exceed a given threshold, which are considered as deviations from normal behavior. The accuracy of the method is significantly affected by the length of the window. For the analyzed window of length l, the energy of the functionG l is calculated as:</p><formula xml:id="formula_11">G l = ∑ k|G l k | 2 N (15)</formula><p>The window length is calculated the minimum of the standard energy function E G l . In <ref type="bibr" target="#b4">[5]</ref>, a method for detecting DDOS attacks is offered based on the estimation of the Hurst exponent using the Fourier fractional transformation, which makes the transition to the frequency-time area.</p><p>For the signal x (t) the fractional Fourier transform is determined as:</p><formula xml:id="formula_12">X a (u) = F a (u) = ∫ x(t)K a (t, u)dt ∞ −∞ (16) K a (t, u) = √1 − i • cot(α) • exp [iπ(t 2 cot (α) − 2ut • csc(α) + u 2 cot (α))], α ≠ nπ (17) K a (t, u) = δ(t − u), a = (2 ∓ 1)π (18) n ∈ Z, α = aπ 2 (19)</formula><p>where athe order of fractional Fourier transformation, provided that a=1, then the formula changes to the usual Fourier transformation.</p><p>Using a discrete wavelet transform and a multi-scale method of analysis, we can calculate the Hurst exponent if we analyze the expression: G(j) ↔ (2H + 1)j + constant, where jscale. Next, the optimal selection of the range of scale intervals is made, using the method of onedimensional weighted estimation of least squares <ref type="bibr" target="#b7">[8]</ref>.</p><p>Experimental verification of the proposed method showed its high accuracy, which reduced the number of false positives and omissions during the detection of the attack.</p><p>It was stated that network traffic is divided into several disjoint segments. The Hurst exponent for each segment is estimated. When the threshold values are exceeded, the traffic loses the property of self-similarity, which is regarded as a DDoS attack. But the intensity of the DDoS attack can change, which leads to a change in the Hurst exponent, so detection methods based on a fixed threshold require flexibility and adaptability.</p><p>This article proposes a method consisting of two stages:</p><p>1. Statistical analysis of the time series of network traffic using discrete wavelet transform and the Schwartz information criterion to find the change point of the Hurst exponent, which signals the start of a DDoS attack.</p><p>2. Adaptive regulation of the intensity of a DDoS-attack on the basis of fuzzy logic, by analyzing the Hurst exponent and the rate of its change. The Schwartz information criterion is based on the maximum likelihood function for the model and can be used to detect the presence of a threshold point by comparing the probability of a null hypothesis (no point) and an alternative (point of presence).</p><p>The Hurst exponent is estimated using a discrete wavelet transform, because in practice this method is one of the most reliable, as it is more resistant to gentle polynomial trends and noise.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">The Evaluation is Performed According to the Following Algorithm</head><p>For the time series of network traffic X in real time, the wavelet coefficients d (j, k) are calculated for each scale j and position k. Next, it is necessary to perform a detailed assessment of the dispersion at each scale j:</p><formula xml:id="formula_13">S j = ∑ d 2 (j, k) n j k=1</formula><p>(20) where n jthe number of wavelet coefficients that are available in scale j</p><p>We assume that a new sample of traffic is received, then the amount will be updated as follows: n j ≠ n j + 1 (21) S j = S j + d 2 (j, n j ) (22) Estimation of variance in scale j:</p><formula xml:id="formula_14">ε j = S j n j<label>(23)</label></formula><p>Next, the dependence of log 2 (ε j ) on scaling j is constructed and a weighted linear regression is performed for the linear section, α is calculated.You do not need to build this dependency every time you receive a new segment of traffic, this action is performed only when necessary.</p><p>Then the Hurst exponent is calculated H = α+1 2</p><p>(24)</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">The Principle of Detecting Attacks</head><p>Let X be a time series of normal traffic, Y is a time series of traffic with deviations, Z -a time series of deviations, i.e. the relation Y = X + Z holds. Based on the theorems, we can conclude that regardless of the presence of self-similarity in Z, if X is a stationary self-similar process of the second order, then Y will still be a self-similar process. But the degree of self-similarity may change.</p><p>Let r y , r z be autocorrelation functions X, Y, Z, respectively. Then a ‖r y − r x ‖, is of interest during the attack, and r y = r x + r z . For each value of H ∈ (0.5,1] there is only one autocorrelation function on self-similarity. Thus, we examine ‖H y − H x ‖, where H x and H x is an average values of the Hurst exponents Y and X, respectively.</p><p>The disadvantage of this method is that the wavelet transform coefficients and statistics based on the Schwartz information criterion are updated at the moment when new traffic values arrive, and the detection of the traffic self-similarity threshold will be restarted for each scale. Thus, a signal of the change in the point of self-similarity will be given, even if this change occurred on a different scale at the same moment.</p><p>After an attack is detected, close to the detection time the traffic is divided into parts. By analyzing the Hurst exponent and the speed of its change (the difference between the Hurst exponents of traffic parts before and after the moment of detection), we can determine the intensity of DDoS-attack, using the rules of fuzzy logic.</p><p>Determining the point of change of traffic self-similarity by the Schwartz information criterion which is based on the assumption that the entropy of a sequence with a variable self-similarity boundary point is greater than the entropy of the sequence in which this point is fixed. Suppose there is a sequence of length M. It is assumed that there is only one point of the self-similarity boundary at position 1 &lt;g &lt;M. In order to calculate the presence and location of this point, you need to calculate the entropy of the whole sequence, as well as parts f 1 = (1, … , g) and f 2 = (g + 1, … , M), compare their values and conclude whether the point g is marginal. If the entropy of the individual parts is much less than the entropy of the whole sequence, the point g is considered to be marginal.</p><p>General scheme of attack detection is presented in Fig. <ref type="figure" target="#fig_1">1</ref>.  In the paper the Hurst exponents for four metrics of traffic by the iterative method in real time are calculated. Next, the collection and normalization of the results of anomaly detection to assess the security of network traffic is carried out.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Search of critical points</head><p>The following scheme of traffic network security assessment is proposed (Fig. <ref type="figure" target="#fig_2">2</ref>). The algorithm for assessing traffic safety is divided into five stages: 1. Traffic collection.</p><p>2. Statistical analysis.</p><p>3. Assessment of the Hurst exponent Hearst index. 4. Detection of anomalies. 5. Security assessment.</p><p>To reduce the impact on the normal functioning of the network, traffic is duplicated on a special server that collects traffic. The software for collecting traffic on the server includes a hardware and technica complex, which has excellent performance when collecting network packets.</p><p>From the packets received from the router, information about the packet type is extracted, as well as four traffic metrics: the total number of packets, the number of TCP packets, UDP packets, ARP packets per unit of time. The Hurst exponent Hearst indices for four traffic metrics are calculated by an iterative real-time estimation method. These values are used to detect deviations and update the normal traffic model.</p><p>The current calculated value of the Hurst exponent is compared with the value from the normal model of traffic behavior. If the value is outside the allowable range, the traffic is considered abnormal. A normal traffic model is built by analyzing the normal operation of the network over a period of time.</p><p>The model includes a normal value of the Hurst exponent Hearst index and a confidence interval, and can be updated when a deviation is detected.</p><p>The criterion for assessing safety is the level of risk, which is calculated by the method of weighted averages, which takes into account the results of detection of deviations from the four traffic metrics. The level of risk provides administrators with the current state of data transmission in the network in terms of security.</p><p>Let X n (n = 1,2,3, … ) -discrete stochastic process, and it is performed as follows:</p><formula xml:id="formula_15">X i (m) = 1 m ∑ X k im k=(i−1)m+1<label>(25)</label></formula><p>Then X i (m) is called aggregated processes X n of the order m with autocorrelation function p m (k) of the order m. The stationary in a broad sense stochastic process X n (n = 1,2, … ) is called self-similar, provided X n and its aggregated processes X n (m) , of the order m which have the same autocorrelation functions p m (k) = p(k)(m = 1,2, … ).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7.">Algorithm for Iterative Evaluation of the Hurst Exponent</head><p>If the stationary mode, in a broad sense, is the time seriesХ i of network traffic acquires selfsimilarity function during the i th period of time, and its autocorrelation function satisfies:</p><formula xml:id="formula_16">p K = H(2H − 1)K 2H−2 , K → ∞<label>(26</label></formula><p>) where H(0,5&lt;H&lt;1) -the Hurst exponent, which increases with increasing degree of self-similarity of the process.</p><p>∑ k p k → ∞ self-similar process is often called long-scale correlation. The greater is K, the more relevance a time series has . The iterative formula for calculating H:</p><formula xml:id="formula_17">H i+1 = √(p k k 2−2H i ) • 0,5, k → ∞ (27) For a given time series Х 1 , … , Х n it is calculated as: 1) expected value: μ ̂= X ̅ = 1 n ∑ X i n i=1 (28) 2) co-variance: y k ̂= 1 n−k ∑ (X i − X ̅ )(X i+k − X ̅ ) n−k i=1</formula><p>(29) 3) the autocorrelation function:</p><formula xml:id="formula_18">p k ̂= y k ŷ0 ̂, k = 0,1, …<label>(30)</label></formula><p>The estimate of the autocorrelation function (p_k) serves as a replacement for p_k, then the iterative formula for calculating H takes the form:</p><formula xml:id="formula_19">H i+1 ̂= √ (p k ̂k2−2H i ̂+ H i ̂) • 0.5,k → ∞<label>(31)</label></formula><p>The results of the experiment showed that the iterative estimation of the Hurst exponent has a high speed and accuracy and also smaller confidence intervals for normal values compared to the methods of VarianceTime Plot. For a long-term large-scale correlation process is considered as H 0 ̂= 0,5.</p><p>An important condition for the execution of the iterative formula for H i+1 ̂ is that k → ∞, but the results of the experiment show that at k = 1 using this formula you can get the Hurst exponent with sufficient accuracy, reducing a significant number of calculations. In addition, the result is imperfect, even if k is large enough, so we take k = 1, and the formula takes the simplified form:</p><formula xml:id="formula_20">H i+1 ̂= √(p 1 ̂+ H i ) • 0,5<label>(32)</label></formula><p>In normal operating mode, network traffic satisfies the pattern of daytime use. To reduce the impact of network traffic periodicity on the Hurst exponent, it is necessary to process traffic at different periods of time.</p><p>In practice, the four above-mentioned normal traffic metrics are at first calculated during the week. Then the average weekly normal values of the Hurst exponents for four traffic metrics are calculated for each day.</p><p>After that it is necessary to use the effective method of Ketani and Gubner to calculate 98% of the confidence intervals of the Hurst exponent (0,5 ≤ Н ≤ 0,95).</p><p>It is necessary to establish the initial state of the normal traffic model. When detected in real time mode, the value of the current calculated Hurst exponent is checked to fall into the confidence interval of the normal traffic model for each metric. If the value falls within the confidence interval, the traffic is considered normal, the detection result is 0, otherwise the traffic is considered with a deviation, and the detection result is 1. In the first case it is necessary to update the Hurst exponent and the confidence interval in the normal traffic model</p><p>The method of normalized security assessment is based on the weighted average method for accounting of all four traffic metrics. The level of risk is calculated as follows:</p><p>F traffic = ∑ w(i) • F obs (i), In order to conduct the study, software was used for fractal analysis of time series (Fig. <ref type="figure" target="#fig_4">3</ref>).  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="8.">Conclusions</head><p>In this review we are talking mainly about network traffic, for which numerous studies have shown that it has the property of self-similarity, which allows us to use this fact to create a model of normal behavior.</p><p>In this article, an experiment was performed for a time series of CPU usage, the fractal properties of which are unknown.</p><p>The results show that the Hurst exponent of the time series of this parameter changes when changing the type of user activity in a wide range, which does not allow to make a conclusion about the presence or absence of self-similarity and makes it impossible to detect anomalies using only this method for this parameter.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="9.">References</head></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: General scheme of attack detection</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Assessment of local network traffic security</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head></head><label></label><figDesc>obs = {1 − allpackets, 2 − TCPpackets, 3 − udppackets, 4arppackets}</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: General view of the investigated program</figDesc><graphic coords="7,72.00,635.74,265.88,119.80" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: Time series of processor's load</figDesc><graphic coords="8,72.00,109.95,275.83,123.10" type="bitmap" /></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">I</forename><surname>Shelukhin</surname></persName>
		</author>
		<title level="m">Multifractals: infocommunication applications / O. I. Shelukhin</title>
				<imprint>
			<publisher>Hotline-Telecom</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page">579</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">V</forename><surname>Porshnev</surname></persName>
		</author>
		<title level="m">Mathematical models of information flows in high-speed backbone Internet channels: a tutorial</title>
				<editor>
			<persName><forename type="first">S</forename><forename type="middle">V</forename><surname>Porshnev</surname></persName>
		</editor>
		<imprint>
			<publisher>Hotline-Telecom</publisher>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page">233</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Modeling and analysis of security and risk in complex systems</title>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the International Scientific School IABR -2016</title>
				<meeting>the International Scientific School IABR -2016<address><addrLine>St. Petersburg</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2016">October 25 -28, 2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<title level="m" type="main">Theory and practice of functional resistance to cyber attacks</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">P</forename><surname>Zegzhda</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">B</forename><surname>Alexandrova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">O</forename><surname>Kalinin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">S</forename><surname>Markov ; Zhukov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">V</forename><surname>Ivanov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">S</forename><surname>Konoplev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">S</forename><surname>Lavrova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">A</forename><surname>Moskvin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Pavlenko</surname></persName>
		</author>
		<editor>.A. Poltavtseva, N.N. Shenets, A.D. Dakhnovich, V.M. Krundyshev</editor>
		<imprint>
			<date type="published" when="2020">2020</date>
			<publisher>Moscow. Hotline -Telecom</publisher>
			<biblScope unit="page">560</biblScope>
		</imprint>
	</monogr>
	<note>Cybersecurity of the digital industry</note>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Information security and data transmission department</title>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">Y</forename><surname>Ruslyachenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">O</forename><surname>Osadchuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Module 3: Teaching manual for laboratory works and practical seminars</title>
				<editor>
			<persName><forename type="first">S</forename><surname>Popov</surname></persName>
		</editor>
		<imprint>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page">60</biblScope>
		</imprint>
	</monogr>
	<note>ONAT by the name of A</note>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Monitoring Subsystem for Wireless Systems Based on Miniature Spectrum Analyzers</title>
		<author>
			<persName><forename type="first">I</forename><surname>Bogachuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Sokolov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Buriachok</surname></persName>
		</author>
		<idno type="DOI">10.1109/infocommst.2018.8632151</idno>
	</analytic>
	<monogr>
		<title level="m">International Scientific-Practical Conference Problems of Infocommunications</title>
				<imprint>
			<publisher>PIC S&amp;T</publisher>
			<date type="published" when="2018">2018. 2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Design method access network radio over fiber</title>
		<author>
			<persName><forename type="first">A</forename><surname>Pereverzev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Ageyev</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2013 12th International Conference: The Experience of Designing and Application of CAD Systems in Microelectronics</title>
				<meeting><address><addrLine>CADSM</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2013">2013. 2013</date>
			<biblScope unit="volume">6543268</biblScope>
			<biblScope unit="page" from="288" to="292" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Intrusion detection systems</title>
		<author>
			<persName><forename type="first">D</forename><surname>Kostrov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Byte</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="issue">49</biblScope>
			<biblScope unit="page" from="14" to="21" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<author>
			<persName><forename type="first">T</forename><surname>Radivilova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">A</forename><surname>Hassan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2nd International Conference on Information and Telecommunication Technologies and Radio Electronics</title>
		<title level="s">-Proceedings</title>
		<meeting><address><addrLine>UkrMiCo</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2017">2017. 2017</date>
			<biblScope unit="page">8095429</biblScope>
		</imprint>
	</monogr>
	<note>Test for penetration in Wi-Fi network: Attacks on WPA2-PSK and WPA2-enterprise</note>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Modelling instruments in risk management</title>
		<author>
			<persName><forename type="first">S</forename><surname>Bondarenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Liliya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Krynytska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Inna</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Civil Engineering and Technology</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="1561" to="1568" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Use of Approaches to the Methodology of Factor Analysis of Information Risks for the Quantitative Assessment of Information Risks Based on the Formation of Cause-And-Effect Links</title>
		<author>
			<persName><forename type="first">I</forename><surname>Dobrynin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Radivilova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Maltseva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Ageyev</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Scientific-Practical Conference on Problems of Infocommunications Science and Technology</title>
		<title level="s">-Proceedings</title>
		<meeting><address><addrLine>PIC S and T</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">2019. 2018. 2018</date>
			<biblScope unit="volume">8632022</biblScope>
			<biblScope unit="page" from="229" to="232" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
