<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Y. Kostiuk);</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Machine learning methods for detecting intrusions based on network traffic analysis⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Yuliia Kostiuk</string-name>
          <email>y.kostiuk@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Pavlo Skladannyi</string-name>
          <email>p.skladannyi@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Volodymyr Sokolov</string-name>
          <email>v.sokolov@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Svitlana Rzaieva</string-name>
          <email>s.rzaieva@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Karyna Khorolska</string-name>
          <email>k.khorolska@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Borys Grinchenko Kyiv Metropolitan University</institution>
          ,
          <addr-line>18/2 Bulvarno-Kudriavska str., 04053 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Institute of Mathematical Machines and Systems Problems of the National Academy of Sciences of Ukraine</institution>
          ,
          <addr-line>42 Ac. Glushkov ave., 03680 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>The article discusses modern machine learning methods for detecting intrusions in computer networks based on network traffic analysis. An architecture for an intelligent intrusion detection system is proposed, combining an autoencoder, a one-class support vector machine, an Isolation Forest, and Extreme Gradient Boosting (XGBoost), using a deep representation of traffic in the feature vector space. The scientific novelty lies in the integration of One-Class Neural Network with an adaptive update mechanism based on Markov decision processes (MDP), which provides automatic retraining in case of changes in traffic characteristics. The study employs procedures to reduce the dimensionality of the feature space using Principal Component Analysis (PCA), t-distributed Stochastic Neighbor Embedding (tSNE), and Uniform Manifold Approximation and Projection (UMAP). (Uniform Manifold Approximation and Projection-UMAP). Explainable Artificial Intelligence (XAI) modules are proposed using SHAP (SHapley Additive exPlanations) and LIME (Local Interpretable Model-Agnostic Explanations) methods. The developed system has been tested on the CICIDS2017 (Canadian Institute for Cybersecurity Intrusion Detection System 2017) and UNSW-NB15 (University of New South Wales Network Behavior 2015) open datasets. The results demonstrate classification accuracy of up to 97%, high interpretability, and model adaptability in detecting zero-day attacks in real-time, making it suitable for critical information infrastructures.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;network traffic</kwd>
        <kwd>intrusion detection</kwd>
        <kwd>machine learning</kwd>
        <kwd>anomalies</kwd>
        <kwd>classification</kwd>
        <kwd>Autoencoder</kwd>
        <kwd>gradient boosting (XGBoost)</kwd>
        <kwd>one-class support vector machine (One-Class SVM)</kwd>
        <kwd>explainable artificial intelligence (XAI)</kwd>
        <kwd>CICIDS2017</kwd>
        <kwd>UNSW-NB15</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Ensuring reliable protection of computer networks in today’s environment of rapidly growing
cyber threats is one of the key challenges for the information security sector. Every day, dozens of
new types of attacks appear that turn off network infrastructure, steal confidential information, or
disrupt service availability [
        <xref ref-type="bibr" rid="ref1 ref2 ref3">1–3</xref>
        ]. According to data from the European Union Agency for Network
and Information Security (ENISA) and the US Cybersecurity and Infrastructure Security Agency
(CISA), an unauthorized device connected to the Internet can be compromised in a matter of
minutes by automated botnets, vulnerability scanners, and malicious scripts, as confirmed in the
ENISA Threat Landscape 2024 and MITRE ATT&amp; CK Evaluation Reports 2024, which particularly
highlight the growth of attacks using multi-layered scenarios, AI-generated exploits, and zero-day
vulnerabilities in network infrastructures [
        <xref ref-type="bibr" rid="ref4 ref5 ref6">4–6</xref>
        ]. Distributed denial-of-service (DDoS) attacks,
zeroday exploits, and modern methods of covert intrusion significantly complicate the work of
traditional protection systems.
The vast majority of traditional intrusion detection systems (IDSs), particularly signature-based
ones, have several limitations related to the need for constant updates of attack databases, high
false positive rates, and limited adaptability [
        <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
        ]. With the increasing complexity of traffic and the
rapid evolution of attack methods, there is a need to implement intelligent solutions that can learn,
self-correct, and operate in real-time [
        <xref ref-type="bibr" rid="ref6 ref9">6, 9</xref>
        ]. This determines the relevance of developing
newgeneration intrusion detection systems based on machine learning (ML) algorithms [
        <xref ref-type="bibr" rid="ref10 ref2">2, 10</xref>
        ], which
can perform in-depth analysis of network traffic, recognize patterns in node behavior, and detect
anomalous actions before an attack can cause harm.
      </p>
      <p>
        The problem is that in practice, building an effective ML-IDS requires solving several tasks:
correctly representing traffic as a set of features [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], reducing its dimensionality without losing
significance [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], selecting an optimal classifier capable of working with mixed or unbalanced data
[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], and ensuring that the results are interpretable for cybersecurity specialists [
        <xref ref-type="bibr" rid="ref13 ref4 ref7">4, 7, 13</xref>
        ]. The
complexity of the problem is compounded by the need to process large amounts of data in real
time, which requires effective algorithmic solutions and optimized software implementation.
      </p>
      <p>
        The scientific novelty of the study lies in the proposed architecture of an intelligent intrusion
detection system, which combines an autoencoder for detecting hidden dependencies in traffic [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ],
a one-class support vector method (One-Class SVM) [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], an isolation forest for detecting deviations
[
        <xref ref-type="bibr" rid="ref10 ref2 ref3">2, 3, 10</xref>
        ], and gradient boosting (Extreme Gradient Boosting XGBoost) for accurate classification of
attacks [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. In addition, dimensionality reduction methods (PCA, t-SNE, UMAP) were applied,
which allows optimizing the model training process [
        <xref ref-type="bibr" rid="ref12 ref7">7, 12</xref>
        ]. An important feature is the integration
of explainable artificial intelligence (Explainable Artificial Intelligence XAI) based on SHAP
(SHapley Additive exPlanations) and LIME (Local Interpretable Model-Agnostic Explanations),
which provides analysts with an understanding of the model’s solutions.
      </p>
      <p>
        The practical significance of the proposed approach lies in the development of a software
prototype of an intrusion detection system suitable for deployment in real computer networks. The
system has been tested on the CICIDS2017 and UNSW-NB15 open datasets [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], achieving a
classification accuracy of over 97% with a minimum false positive rate [
        <xref ref-type="bibr" rid="ref14 ref15 ref16">14–16</xref>
        ]. The research results
can be applied to monitor critical information infrastructure, industrial enterprise networks,
financial institutions, and government agencies, where not only detection accuracy but also
transparency of decision-making is essential.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Literature review</title>
      <p>Research focuses on the application of machine learning methods to analyze behavioral patterns in
network traffic, driven by the growth of data volumes, the increasing complexity of attacks, and the
limitations of signature-based systems. Hybrid and deep models that can detect anomalies without
labels and provide explainability for security professionals are becoming relevant.</p>
      <p>
        Feng et al. [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] proposed a Tensor Recurrent Neural Network with a built-in differential privacy
mechanism. The proposed model achieved an accuracy of over 95% in classifying dynamic network
flows, confirming the effectiveness of combining privacy and deep learning in security tasks.
      </p>
      <p>
        Chua et al. [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] developed a multi-stage framework for network traffic analysis using entropy
filtering and the Isolation Forest algorithm. This approach enabled the effective detection of
anomalies in web traffic, particularly in cases of unpredictable activity without prior sample
labeling.
      </p>
      <p>
        Djidjev [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] presented the Set-Structured Isolation Forest (siForest) method, adapted to the
specifics of network traffic. The siForest architecture was tested on complex, structured flows and
demonstrated high efficiency in detecting non-standard behavior, indicating the feasibility of
integrating structured learning into IDS.
The work of Ripan et al. [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] considers the application of isolation forests in the context of hybrid
intelligent systems. The authors noted that the use of outlier detection methods enables the
effective classification of anomalies in mixed traffic, particularly in IoT environments. However, the
model’s limitations regarding deep contextual dependencies indicate the advisability of combining
it with Autoencoder or RNN.
      </p>
      <p>
        Liu et al. [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] proposed a hybrid intrusion detection system that combines scalable k-means+
clustering, Random Forest, and deep learning. The system architecture enables the processing of
large amounts of traffic, demonstrating high accuracy and scalability, which is particularly valuable
in distributed networks.
      </p>
      <p>
        Maseer et al. [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] benchmarked several machine learning models on the CICIDS2017 dataset.
XGBoost and deep autoencoders showed the best results, providing a balance between accuracy,
completeness, and speed. The authors also emphasized the importance of forming an optimal set of
features and the system’s adaptability to changes in traffic.
      </p>
      <p>
        Mane and Rao [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] focused on the explainability of IDS models. They integrated the Explainable
AI (XAI) framework, specifically SHAP, to build understandable interpretations of classification
decisions. This increases trust in the models and facilitates the audit of security system results.
      </p>
      <p>
        A review of the literature showed that models based on decision trees, k-NN, and heuristics
provide high speed but insufficient accuracy in multi-class and zero-day detection tasks. In
contrast, deep models (Autoencoder, LSTM, One-Class SVM) demonstrate better ability to detect
anomalies in the absence of complete labeling, although they require significant computational
resources and feature preparation (PCA, UMAP, t-SNE) [
        <xref ref-type="bibr" rid="ref11 ref12 ref13 ref5">5, 11–13</xref>
        ]. The integration of XAI methods
(SHAP, LIME) improves interpretability [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], but challenges remain in real-time, false positives, and
working with partially labeled data. Most existing solutions are not scalable and do not cover all
classes of attacks. Thus, it is relevant to create an integrated IDS framework that incorporates
traffic vectorization, feature reduction, ensemble models, and XAI explanations, which represents
the scientific novelty of this study.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Research methods</title>
      <p>
        The research methods employ a step-by-step approach to developing an intelligent intrusion
detection system for computer networks, with a focus on network traffic analysis. At the first stage,
data from the CICIDS2017 and UNSW-NB15 public datasets [
        <xref ref-type="bibr" rid="ref17 ref5">5, 17</xref>
        ] were collected and
preprocessed, which included cleaning, normalization, and feature encoding. Traffic is represented
as a vector space of features, taking into account the quantitative and behavioral characteristics of
flows. To optimize training, dimensionality reduction methods were employed, including principal
components analysis (PCA), stochastic neighbor embedding (t-SNE), and uniform manifold
approximation and projection (UMAP) [
        <xref ref-type="bibr" rid="ref11 ref12">11, 12</xref>
        ].
      </p>
      <p>
        Based on the prepared data, machine learning models were trained, specifically the
Autoencoder, One-Class SVM [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], Isolation Forest [
        <xref ref-type="bibr" rid="ref10 ref2 ref3">2, 3, 10</xref>
        ], and gradient boosting (XGBoost) [
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ].
Performance was evaluated using accuracy, completeness, F1-measure, and AUC-ROC metrics [
        <xref ref-type="bibr" rid="ref17 ref5">5,
17</xref>
        ]. To increase the transparency of decisions, explainable artificial intelligence (XAI) was
implemented using SHAP and LIME methods [
        <xref ref-type="bibr" rid="ref13 ref7">7, 13</xref>
        ]. The final stage was the development of a
prototype system with a REST API that can be integrated into environments such as Zeek or
Splunk [
        <xref ref-type="bibr" rid="ref14 ref15 ref18">14, 15, 18</xref>
        ] for practical network traffic monitoring.
      </p>
    </sec>
    <sec id="sec-4">
      <title>4. Main material</title>
      <p>
        Modern information security threats are characterized by increasing complexity and intensity of
attacks, which requires the implementation of intelligent intrusion detection systems (IDS) [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. In
highly loaded networks, traditional signature-based IDS are ineffective against new or modified
attacks, which necessitates a transition to machine learning-based models [
        <xref ref-type="bibr" rid="ref19 ref5">5, 19</xref>
        ]. Such systems
must operate in near real-time, ensuring high accuracy, low false positives (FP) and false negatives
(FN), and adaptation to new threats [
        <xref ref-type="bibr" rid="ref17 ref20 ref4">4, 17, 20</xref>
        ]. Key metrics are accuracy (CR), performance (PPS),
noise resistance, and generalization ability.
      </p>
      <p>
        The effectiveness of IDS largely depends on constructing a relevant feature space, which is
formed by vectorizing network traffic and applying dimension reduction methods (PCA, t-SNE,
UMAP) [
        <xref ref-type="bibr" rid="ref11 ref12 ref13">11–13</xref>
        ] to mitigate the “curse of dimensionality” and reduce computational resource load.
Network traffic is based on TCP, UDP, ICMP, and IP protocol packets, which often carry malicious
activity [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Since most attacks are session-based, it is advisable to analyze complete TCP sessions
or streams [
        <xref ref-type="bibr" rid="ref10 ref2 ref4 ref5">2, 4, 5, 10</xref>
        ]. To this end, a set of 45 features has been developed, covering general
parameters (TTL, ToS, traffic volume), characteristics of ICMP, UDP, and TCP messages, and
specifics of TCP sessions (duration, flags, window dynamics, OS fingerprinting).
      </p>
      <p>
        The resulting feature vectors are fed into machine learning models—from Random Forest and
XGBoost [
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ] to Autoencoder [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], LSTM [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], and One-Class SVM [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. Building such an
architecture enables the implementation of a flexible, scalable, and explainable intrusion detection
system that can effectively respond to the dynamics of modern cyber threats.
      </p>
      <p>
        In Figure 1, the sequence diagram illustrates the process of a machine learning-based intrusion
detection system. Network traffic arrives in the form of raw packets, which are analyzed and
combined into sessions. Next, features are extracted, their dimensionality is reduced [
        <xref ref-type="bibr" rid="ref11 ref12">11, 12</xref>
        ], and
then the classifier determines whether the traffic is normal or abnormal. If a threat is detected, the
system notifies the administrator and records the incident in SIEM [
        <xref ref-type="bibr" rid="ref14 ref15 ref18">14, 15, 18</xref>
        ]. If the traffic is
normal, the event is simply logged.
      </p>
      <p>
        One of the key problems in building an IDS based on machine learning is the inability to
accurately determine the initiator of a TCP session if its beginning is lost, since client ports are
selected randomly, while server ports are mostly fixed [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ]. Due to the lack of explicit information
about the roles of the parties in the TCP header, heuristics are used, including fixed port ranges,
internal server lists, and TCP fingerprinting, to determine the OS and port selection model.
      </p>
      <p>
        In particular, the 1-P0SD algorithm is used to identify the host OS, which allows the type of
network stack to be determined with a single packet with constant complexity O(1) [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. The
Traffic-to-Embedding (TEA) architecture features a Session Data structure based on hash tables,
host activity accounting, and the processing of UDP/IP/ICMP packets or TCP sessions with O(1)
complexity, as well as the formation of a 45-feature vector [
        <xref ref-type="bibr" rid="ref2 ref4 ref5">2, 4, 5</xref>
        ]. To reduce the computational
load, methods are used to reduce the dimensionality of features without losing information, which
avoids the “curse of dimensionality” [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ].
      </p>
      <p>
        Among the methods for reducing dimensionality for real-time IDS, the most effective is the
principal component analysis (PCA) method, which calculates eigenvectors and the values of the
feature covariance matrix [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. PCA transforms the feature matrix X N × M , into the space of new
      </p>
      <p>A
orthogonal variables Y N × A, where A&lt; M , according to the formula X = ∑ va pTa + E , where N is
a= 1
the number of sessions, M is the number of features, va is the components of the evaluation
matrix, pTa is the load, E is the residual matrix.</p>
      <p>
        Advantages of PCA: dimensionality reduction with minimal loss of information, improved
model generalization, and the possibility of parallel processing (in particular on GPUs) [
        <xref ref-type="bibr" rid="ref14 ref15 ref21">14, 15, 21</xref>
        ].
The resulting vectors are fed into ML models (Random Forest, XGBoost, LSTM, Autoencoder,
OneClass SVM) [
        <xref ref-type="bibr" rid="ref11 ref22 ref4 ref5 ref8">4, 5, 8, 11, 22</xref>
        ]. Careful feature construction and reduction have a critical impact on the
accuracy of anomaly detection in loaded networks.
      </p>
      <p>The DFD diagram (Figure 3) illustrates three levels of detail: the contextual level (DFD Level 0),
the basic architecture of subsystems (DFD Level 1), and the detailed feature extractor (DFD
Level 2). The data flow goes from the network sensor to the classifier, where features from network
traffic are analyzed to detect intrusions. Additionally, internal protocol processing and session
aggregation for feature vector formation are shown.</p>
      <p>
        One of the leading areas of development for intelligent IDS is modeling the behavior of dynamic
objects and developing heuristic threat detection mechanisms [
        <xref ref-type="bibr" rid="ref17 ref21 ref8">8, 17, 21</xref>
        ]. In this context, a
computer network is viewed as a complex dynamic system that generates a stream of network
events. In normal mode, traffic is characterized by stable patterns that can be formalized for model
training.
      </p>
      <p>
        Anomalous events, such as attacks or failures, violate these patterns. With a representative
sample of legitimate traffic, a profile of normal behavior is formed, against which current traffic is
compared. Deviations from it indicate a possible anomaly [
        <xref ref-type="bibr" rid="ref22 ref7 ref8">7, 8, 22</xref>
        ]. Since accurate labeling of
normal and abnormal traffic is difficult, one-class classification models or novelty detection
algorithms are used.
      </p>
      <p>The formalized task can be described as follows: given a set X⊂A consisting of objects of a single
(normal) class, it is necessary to construct a function f:A→{0,1} that returns 1 if the object belongs
to the known class (i.e., is not an anomaly), and 0 if the object is potentially harmful or atypical. In
the case of intrusion detection systems, this means that the algorithm must identify a new network
packet as safe or anomalous based on knowledge obtained exclusively from normal traffic.</p>
      <p>
        Modern anomaly detection methods include the use of Autoencoder to detect deviations based
on reconstruction errors [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], One-Class SVM to construct boundaries of normal behavior [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], Deep
SVDD to isolate centers of the normal class [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], Graph Neural Networks to take into account the
connections between nodes [
        <xref ref-type="bibr" rid="ref20 ref23">20, 23</xref>
        ], and ensemble models to improve generalization.
      </p>
      <p>
        The key challenge remains the formation of a relevant vector representation of network events,
which requires effective feature extraction, noise reduction, and model adaptation to traffic changes
[
        <xref ref-type="bibr" rid="ref12 ref17 ref5">5, 12, 17</xref>
        ]. PCA, t-SNE, and UMAP are used to combat the “curse of dimensionality” [
        <xref ref-type="bibr" rid="ref11 ref12">11, 12</xref>
        ]. An
effective intrusion detection model must combine high-quality feature selection, methods for
representing them, and adaptation to the dynamics of the network environment.
      </p>
      <p>
        The diagram (Figure 4) details the process of anomaly detection using a single-class
classification method. The system receives feature vectors, performs normalization, applies an OCC
model (e.g., One-Class SVM or Autoencoder), calculates anomalous values, and transmits the result
to the decision-making subsystem. This approach allows for effective detection of deviations in
network traffic, even if the training sample contains only normal examples.
The diagram (Figure 5) shows three levels of the DFD model. Level 0 illustrates the interaction of
external users with the IDS system as a “black box.” Level 1 reveals the main modules of the
system: traffic processing, session reconstruction, feature construction, classification, and
decisionmaking. Level 2 details the internal logic of the machine learning subsystem, including the stages
of preprocessing, inference, and result verification.
Research on the applicability of one-class classification (OCC) to network traffic anomaly detection
tasks, in particular using one-nearest neighbor (1-NN) and one-class SVM methods, based on the
KDD Cup’99 benchmark dataset, showed that even without deep parameter optimization, these
methods demonstrate competitive results in terms of True Positive Rate (TPR) and False Positive
Rate (FPR) metrics [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. However, their sensitivity to noise in the training set, significant
computational costs, and limited scalability complicate the application of such models in large
datasets (&gt;100,000 feature vectors).
      </p>
      <p>
        One effective approach to implementing one-class classifiers is to use a multilayer perceptron
(MLP) as an adaptive reconstructive filter [
        <xref ref-type="bibr" rid="ref17 ref8">8, 17</xref>
        ]. In this approach, a multilayer feedforward neural
network is constructed in such a way as to learn to reproduce only normal (non-anomalous)
network traffic patterns, identifying anomalies as significant deviations from the expected
reproduction.
      </p>
      <p>Let there be a set of positive feature vectors of dimension m, obtained after preprocessing the
traffic. To evaluate the similarity between the input and output vectors, a metric D (is used (e.g.,
Euclidean or cosine distance). The network consists of m input and output neurons, h hidden layer
neurons with a sigmoid activation function and linear output. The training objective is to minimize
the deviation between the input xi and the corresponding output yi (i.e. D [ x i , y i ]≈ 0).</p>
      <p>After training, a deviation threshold is determined (for example,θ = mean D [ x i , y i ]+ε ),
according to which new vectors are classified: if the deviation does not exceed the threshold, the
vector is considered normal, otherwise it is considered anomalous. Thus, the network approximates
an identical mapping only for normal patterns and acts as an anomaly detector.</p>
      <p>Three key parameters determine the effectiveness of this model:



h the number of neurons in the hidden layer, which regulates the model’s generalization
ability. Too large h leads to overfitting, while too small h leads to a loss of ability to detect
the full spectrum of normal traffic.
η (learning rate) the rate of weight updates, which affects both the convergence rate and
the stability of the model.
β (momentum) an inertial coefficient that smooths out gradient fluctuations and improves
the quality of training.</p>
      <p>
        In intrusion detection systems, modeling normal traffic allows zero-day attacks to be detected
without the need for a complete database of anomalies, which is particularly important for IoT,
cyber-physical systems, cloud environments, and 5G infrastructure [
        <xref ref-type="bibr" rid="ref15 ref24 ref25 ref6">6, 15, 24, 25</xref>
        ]. The approach is
enhanced by the following components: One-Class Neural Networks (OC-NN), which combine
OCC and deep learning [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]; MiniBatch SGD and GPU acceleration for streaming learning [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ];
containerization and deployment in Kubernetes for scalability [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]; XAI methods (SHAP, LIME,
Grad-CAM) for interpreting decisions [
        <xref ref-type="bibr" rid="ref13 ref26 ref7">7, 13, 26</xref>
        ]. The integration of these technologies enables the
construction of adaptive, scalable, and explainable anomaly detection systems in network traffic.
      </p>
      <p>The diagram in Figure 6 shows the main stages of network traffic processing: from reception to
classification using a multilayer perceptron trained only on normal traffic. The reconstruction error
determines whether the input sample is abnormal. In case of an anomaly, an alert is generated and
a record is made in SIEM.</p>
      <p>
        The sequence diagram (Figure 7) shows the interaction of the main components of the network
traffic anomaly detection system. The system receives input data from the network, performs
preliminary processing and feature extraction, after which a classifier based on a multilayer
perceptron (MLP) evaluates whether the traffic is abnormal. If deviations are detected, the anomaly
processing module is activated, which can initiate adaptive retraining, automatic threshold updates,
and a self-healing mechanism. All events are logged and sent to the administrator.
The proposed machine learning model for detecting intrusions in network traffic is based on a
oneclass neural network (OC-NN) [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], which is trained exclusively on “reference” (normal) data and
detects anomalies based on deviations from expected behavior [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. The architecture includes two
modes: training and testing, and also implements adaptive update mechanisms through Markov
decision making [
        <xref ref-type="bibr" rid="ref17 ref24">17, 24</xref>
        ]. Data processing stages and mathematical models:
      </p>
      <p>Stage 1. Formation of characteristics</p>
      <p>Network traffic input data (packets or sessions) are presented as feature vectors
X raw = { x (1) , x (2) , … , x (N ) } , x (i ) ∈ R (M ), where N s the number of samples and M is the number of
primary features. Normalization is performed to eliminate large-scale distortions:
x (nio)rm=
x (i )− μ</p>
      <p>σ
where μ mean value, σ standard deviation for each feature in the dataset.</p>
      <p>Stage 2. Dimension reduction (PCA)</p>
      <p>
        To reduce the dimensionality of the feature space and improve generalization, the principal
component analysis (PCA) method is used [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]:
      </p>
      <p>where U Σ V T is d singular value decomposition (SVD) components, M´ is a new dimension
after cutting off less significant components.</p>
      <p>
        Stage 3. Training the Autoencoder
Training a neural network (Autoencoder) involves minimizing the loss function [
        <xref ref-type="bibr" rid="ref1 ref4">1, 4</xref>
        ]:
X norm=U Σ V T , V proj= X norm ∙ V [1 , M´ ]
      </p>
      <p>Lθ =
1 N</p>
      <p>∑ ‖V (pir)oj− f θ ( V (pir)oj )‖2</p>
      <p>N i=1
where f θ is the neural network with parameters θ , which performs reconstruction of input
vectors.</p>
      <p>The parameters are updated using the stochastic gradient descent method with momentum:
θ t+1= θ t− η ∇ 0 L (θ t )+ α ∙ (θ t− θ t− 1)
where η is a learning rate, α is a moment coefficient, t is an iteration number.</p>
      <p>Stage 4. Setting the rejection threshold
Based on reconstruction errors, the limit (threshold) value is determined:
θ res= max ‖V (pir)oj− f θ ( V (pir)oj )‖2</p>
      <p>
        i
This value is used as the boundary between normal and abnormal samples during testing.
Stage 5. Classification of new traffic
For new incoming traffic xnew after normalization and transformation through PCA [
        <xref ref-type="bibr" rid="ref1 ref3 ref8">1, 3, 8</xref>
        ]:
reconstruction and calculation of Euclidean distance are performed:
Then the classification rule is applied:
x new → x new , proj= PCA ( x new )
d =‖ f θ ( x new , proj )−( x new , proj )‖2
label ( x new )= { Normal , d ≤ θ res
      </p>
      <p>Anomaly , d &gt;θ res
(1)
(2)
(3)
(4)
(5)
(6)
(7)
(8)
To improve sensitivity to deviations, a standardized anomaly score is calculated:
AnomalyScore ( x new )=
d − μd
σ d
where μ d mean reconstruction error, σ d standard deviation. This allows you to standardize the
distance and make the threshold value dynamic.</p>
      <p>The probability that the sample is abnormal is calculated using the function:</p>
      <p>P Anomaly ( x )=1−exp (
−d 2 )
2 σ 2d
w j =1−</p>
      <p>H j
log K
x (wie)ighted =x ( i ) ∙ w
Precision=</p>
      <p>T P</p>
      <p>T P + F P
Recall =</p>
      <p>T P</p>
      <p>T P + F N
Stage 6. Suppression of non-informative features.</p>
      <p>
        To improve feature quality before submission to PCA, entropy-based weight scaling is used
[
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]:
      </p>
      <p>where H j entropy jth features, K the number of clusters or bins for estimating the distribution.
After that, weights are applied to the input vectors:</p>
      <p>This allows you to reduce the impact of noise or non-informative parameters.</p>
      <p>
        Stage 7. Metrics for measuring the effectiveness of the anomaly detection system
Classic binary classification metrics are used to quantitatively assess the quality of the proposed
classification system [
        <xref ref-type="bibr" rid="ref13 ref8">8, 13</xref>
        ]. The calculations are based on an error matrix containing: TP (True
Positive)—the number of correctly detected anomalies, FP (False Positive)—the number of false
positives in normal data, FN (False Negative)—the number of missed anomalies, TN (True
Negative) —the number of correctly classified normal samples.
      </p>
      <p>Precision is the proportion of correctly classified anomalies among all detections:
Recall (completeness)—the proportion of detected anomalies among all actual anomalies:
(9)
(10)
(11)
(12)
(13)
(14)
(15)
(16)
(17)</p>
      <p>F1-score is the harmonic mean between Precision and Recall, which allows for a balanced
evaluation of the model:</p>
      <p>Precision ∙ Recall
F 1= 2 ∙</p>
      <p>Precision+ Recall
True Positive Rate (TPR) or sensitivity:
False Positive Rate (FPR)—the proportion of false positives among all normal samples:
T P R=
F P R=</p>
      <p>T P
T P + F N</p>
      <p>F P
F P + TN
Overall accuracy is the proportion of correctly classified samples among all samples:
Accuracy=</p>
      <p>T P + TN</p>
      <p>T P + F P + TN + F N</p>
      <p>AUC-ROC (Area Under Curve—Receiver Operating Characteristic)—the area under the ROC
curve, which is constructed based on the dependence of TPR on FPR:</p>
      <p>A = { DoNothing , UpdateThreshold , Relearn , Retrain }</p>
      <p>
        T ( s , a , ´s ) transition function: the probability that after performing action a in state s the
system will transition to state s′, R ( s , a ) reward function that evaluates the benefit of the action
(for example, R =− FPR , γ ∈ [
        <xref ref-type="bibr" rid="ref1">0,1</xref>
        ] discount factor that determines the weight of future rewards.
      </p>
      <p>The goal is to maximize the expected cumulative reward:</p>
      <p>V π ( s )= E [∑ γt R ( st , π ( st ))∨ s0= s ]
∞
t= 0
where π is a policy that determines action a= π ( s ) in state s.</p>
      <p>Decision-making policy updates are performed using a Q learning algorithm:
where α is a learning coefficient, Q ( s , a ) is the current estimate of the action value a in state s.</p>
      <p>
        The system supports automatic updates in case of model degradation, adaptation of the θ res
threshold based on current statistics, and online learning with data flow preservation [
        <xref ref-type="bibr" rid="ref1 ref3 ref8">1, 3, 8</xref>
        ]. It is
formalized, adaptive, and effective for detecting zero-day attacks, working in IoT and edge
environments, cloud infrastructures (Docker, Kubernetes) with GPU and MiniBatch SGD support
[
        <xref ref-type="bibr" rid="ref20 ref21 ref25 ref26 ref6">6, 20, 21, 25, 26</xref>
        ]. The use of PCA, autoencoders, and Markov decision processes (MDP) ensures
scalability, flexibility, and resistance to real network threats [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]. The proposed model responds
adaptively to changes, operates in real time, and ensures continuous protection in complex
computing environments.
      </p>
      <p>DFD Level 1 (Figure 8) illustrates the functional components and data flows of the network
traffic anomaly detection system using a One-Class neural network. The system consists of
preprocessing modules, dimensionality reduction (PCA), a neural network for reconstruction,
deviation assessment, and an adaptive model update block based on statistics or MDP. The data
source is real network traffic, which is converted into feature vectors, analyzed, and classified using
a specified deviation threshold. If an anomaly is detected, the data is forwarded to the security
analyst and stored in the event log.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Computational experiment</title>
      <p>
        The practical implementation of the proposed model for detecting intrusions in network traffic
(Intrusion Detection System, IDS) is based on a one-class neural network (OC-NN) integrated with
an autoencoder architecture [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. This approach allows the model to be trained exclusively on
normal (reference) data and to detect anomalous actions as deviations from normal traffic behavior
[
        <xref ref-type="bibr" rid="ref17 ref8">8, 17</xref>
        ]. The solution includes components for processing incoming traffic, building a latent
normality profile, detecting anomalies, and adaptively updating the model in response to changes
in the environment.
The overall software architecture is implemented as a modular system in Python using the
following libraries: Scapy—for capturing and analyzing packets in the network [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]; Pandas and
NumPy—for processing and forming features [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]; Scikit-learn—for normalization, implementation
of the principal component analysis (PCA) method, and other preliminary transformations [
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ];
TensorFlow or PyTorch—for building, training, and deploying an autoencoder [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]; Flask—for
creating a REST API that allows interacting with IDS as a service [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]; Docker—for containerizing
the system and deploying it in an edge or cloud environment [
        <xref ref-type="bibr" rid="ref14 ref21">14, 21</xref>
        ].
      </p>
      <p>
        The system was implemented in Python 3.10 using TensorFlow 2.12 libraries to build the
OCNN neural network [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], Scikit-learn 1.3.0 to implement SVM and Random Forest models and
calculate metrics [
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ], SHAP 0.41.0 and LIME 0.2.0.1 for explaining model decisions (XAI) [
        <xref ref-type="bibr" rid="ref6 ref7">6, 7</xref>
        ],
Scapy 2.5.0 for intercepting and analyzing network traffic, and Flask 2.3.2 for creating a web
interface [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. The experiments were conducted on a machine with an Intel Core i7 processor, 16
GB of RAM, and without the use of GPU acceleration.
      </p>
      <p>
        At the feature formation stage, network data in the form of streams or sessions, which come
from PCAP files or are intercepted in real time, are converted into feature vectors [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]. The feature
set includes the following parameters: total number of bytes in the stream, number of packets, time
intervals between them, TCP header features (flags), traffic direction (inbound/outbound), average
value and dispersion of packet size, time to live (TTL), source and destination port numbers, etc.
[
        <xref ref-type="bibr" rid="ref10 ref11">10, 11</xref>
        ]. Feature normalization is performed using Z-transformation, which brings all values to a
single scale [
        <xref ref-type="bibr" rid="ref13 ref4">4, 13</xref>
        ]. Next, to reduce the dimensionality and eliminate redundant correlated features,
PCA is used, which preserves the most informative components and reduces the input space before
feeding it to the neural network.
      </p>
      <p>The graph in Figure 9 illustrates the distribution of data in two-dimensional space before and
after applying the principal component method. On the left is the projection of the input data
according to the first two features before dimensionality reduction. On the right is a
twodimensional projection after applying the principal component analysis (PCA) method, reflecting
the hidden structure of the data in a reduced latent space.</p>
      <p>
        The Autoencoder is implemented as a symmetric multilayer neural network with direct
propagation (Fully Connected Layers), which has 4–5 layers with ReLU nonlinearity and linear
activation on the output layer. The model is trained exclusively on normal data using stochastic
gradient descent with momentum [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. During training, the reconstruction loss function, which
calculates the difference between the input and reconstructed vectors, is minimized. Optimization
is performed using Adam or SGD optimizers, with GPU acceleration support (NVIDIA CUDA) [
        <xref ref-type="bibr" rid="ref1 ref8">1,
8</xref>
        ]. For training stability, a mini-batch approach with a batch size of 32–128 is used.
      </p>
      <p>The graph (Figure 10) shows a decrease in the model loss function over 50 training cycles
(epochs), indicating a gradual improvement in the model's consistency with the training data.</p>
      <p>
        In test mode, new traffic samples go through the same processing chain: normalization,
dimensionality reduction, and reconstruction via an autoencoder [
        <xref ref-type="bibr" rid="ref26 ref5">5, 26</xref>
        ]. The distance between the
input vector and its reconstructed version is calculated using the Euclidean norm. If this distance
exceeds a predefined threshold θ res, the sample is classified as anomalous [
        <xref ref-type="bibr" rid="ref2 ref23">2, 23</xref>
        ]. Additionally,
AnomalyScore is calculated, which is a standardized deviation score, as well as the probability of
belonging to the anomalous class using an exponential density function [
        <xref ref-type="bibr" rid="ref27 ref8">8, 27</xref>
        ]. In order to reduce
the influence of uninformative or noisy features, entropy weighting is introduced: each feature is
assigned a weight that is inversely proportional to its entropy, followed by scaling of the input
vector.
      </p>
      <p>The graph in Figure 11 shows the density distribution of reconstruction errors: the blue curve
corresponds to normal traffic, the red curve to abnormal traffic. The vertical dotted line reflects the
threshold value θ res, which separates abnormal samples from normal ones.</p>
      <p>
        A distinctive feature of the system is its ability to adapt to changing conditions. To this end, an
update mechanism based on the Markov decision process (MDP) has been implemented, which
tracks changes in classification statistics (in particular, TPR, FPR, Precision, F1, AUC) and makes
decisions about further training or retraining of the model [
        <xref ref-type="bibr" rid="ref17 ref8">8, 17</xref>
        ]. The Q-learning algorithm allows
evaluating actions (threshold update, partial or complete retraining) taking into account the
accumulated reward and selecting the most optimal system response [
        <xref ref-type="bibr" rid="ref19 ref24 ref26">19, 24, 26</xref>
        ]. This ensures the
continuous viability of the model in the face of new threats or changes in traffic patterns.
      </p>
      <p>
        For external integration, the system is equipped with a REST API that accepts incoming
requests in JSON format with a feature vector and returns a response in the form of a label
(Normal/Anomaly), risk value, and meta-information about the reconstruction distance, threshold
value, and calculated probability [
        <xref ref-type="bibr" rid="ref14 ref6 ref7">6, 7, 14</xref>
        ]. Thus, the model can be easily integrated with SIEM
systems, NIDS, or edge devices.
      </p>
      <p>
        The functionality of the system has been tested on public datasets CICIDS-2017, UNSW-NB15,
and NSL-KDD [
        <xref ref-type="bibr" rid="ref12 ref28">12, 28</xref>
        ]. The results demonstrate the high efficiency of the method: the F1-measure
exceeds 92%, TPR is over 94%, FPR is below 3%, and MCC exceeds 0.85, which indicates balanced
system performance even in conditions of unbalanced data. To evaluate the effectiveness of the
actual response, the time between the arrival of a network packet and the generation of an alert by
the IDS system was tested. In a test bed with a packet delay of no more than 2 ms (based on
network monitoring via Scapy), the response time was measured as the sum of processing,
classification, and event display [
        <xref ref-type="bibr" rid="ref29 ref5">5, 29</xref>
        ]. The average response time of the system is: 82 ms for
OCNN (with fuzzy classification), 59 ms for LSTM (without post-processing), 105 ms for Random
Forest, 47 ms for SVM [
        <xref ref-type="bibr" rid="ref11 ref13">11, 13</xref>
        ]. The OC-NN delay is slightly higher due to the fuzzy
postprocessing and XAI interpretation phase, but does not exceed critical limits (&lt;100 ms) for most
attack detection applications in corporate networks [
        <xref ref-type="bibr" rid="ref27 ref30 ref6">6, 27, 30</xref>
        ]. As a result, the system is capable of
responding to attacks in near real-time, allowing anomalies to be effectively blocked without
causing traffic delays.
      </p>
      <p>The graph shows (Figure 12) that SVM demonstrates the fastest response (47 ms), but the
proposed OC-NN model also provides acceptable speed (&lt;100 ms) with additional advantages of
interpretation and accuracy.</p>
      <p>
        The diagram (Figure 13) shows the values of the main intrusion detection quality metrics for
models tested on the CICIDS-2017, UNSW-NB15, and NSL-KDD datasets. It can be seen that the
model on CICIDS-2017 demonstrates the highest balance of results.
The system is easily deployed as a Docker container, ensuring its portability, scalability, and
suitability for use in both cloud environments and on peripheral devices [
        <xref ref-type="bibr" rid="ref14 ref18">14, 18</xref>
        ]. The solution does
not require constant manual data labeling, works in an unsupervised learning format, and supports
real-time adaptation to changes in network traffic [
        <xref ref-type="bibr" rid="ref2 ref27 ref3 ref8">2, 3, 8, 27</xref>
        ]. This makes the model suitable for
modern scenarios involving the protection of information systems from unknown attacks and
zeroday threats.
      </p>
      <p>
        Additionally, a comparison with other modern IDS systems was performed. Table 1 presents a
comparison of classical (Snort, Suricata) and machine learning (Autoencoder, GAN, proposed
model) systems in terms of accuracy (TPR), false positives (FPR), Matthew's correlation coefficient
(MCC), as well as their strengths and weaknesses [
        <xref ref-type="bibr" rid="ref12 ref13 ref4 ref5">4, 5, 12, 13</xref>
        ]. It can be seen that the proposed
One-Class Neural Network (OC-NN) model with PCA and adaptation mechanism (MDP)
demonstrates the highest balance, performance in unsupervised mode, and suitability for
realworld deployment.
      </p>
      <p>Figure 14 illustrates a comparison of the effectiveness of five IDS systems based on three key
metrics: true positive rate (TPR), false positive rate (FPR), and Matthew’s correlation coefficient
(MCC). The proposed OC-NN model demonstrates the highest accuracy (TPR ≈ 96%), the lowest
false positive rate (FPR ≈ 2%), and balanced classification (MCC ≈ 0.88), which exceeds the
performance of classical and hybrid solutions.</p>
      <p>
        To ensure a representative comparison of the effectiveness of the proposed OC-NN model,
experimental testing of classical machine learning algorithms such as Support Vector Machine
(SVM), Long Short-Term Memory (LSTM), and Random Forest (RF) was conducted [
        <xref ref-type="bibr" rid="ref11 ref19">11, 19</xref>
        ]. Table 2
shows a comparison of the main metrics, F1-score and Matthews Correlation Coefficient (MCC), for
the specified models [
        <xref ref-type="bibr" rid="ref12 ref23">12, 23</xref>
        ].
      </p>
      <p>
        The metric values were calculated on test subsets of the CICIDS-2017 and UNSW-NB15 datasets
after hyperparameter optimization [
        <xref ref-type="bibr" rid="ref29 ref5">5, 29</xref>
        ]. OC-NN demonstrates superiority in accuracy and
stability when trained on a single class (normal traffic) and using fuzzy post-processing [
        <xref ref-type="bibr" rid="ref6 ref7">6, 7</xref>
        ]. As
shown in the table, the proposed OC-NN model outperforms other algorithms, particularly in terms
of the MCC metric, which indicates its resistance to class imbalance [
        <xref ref-type="bibr" rid="ref25 ref30 ref8">8, 25, 30</xref>
        ]. It is also more
adaptive to changes in traffic patterns, which is critical for detecting zero-day attacks.
      </p>
    </sec>
    <sec id="sec-6">
      <title>6. Discussion</title>
      <p>
        The results of the study demonstrate the effectiveness of machine learning methods, particularly a
one-class neural network and autoencoder architecture, in detecting intrusions in network traffic
[
        <xref ref-type="bibr" rid="ref20 ref8">8, 20</xref>
        ]. Given the specifics of the problem—the limited amount of labeled attack data and the
constant changes in traffic patterns—the use of a model trained exclusively on normal samples
proved to be both technically and practically appropriate.
      </p>
      <p>
        Analysis of the loss curve (Figure 11) shows stable convergence of the model without retraining,
indicating good generalization ability. The distribution of reconstruction errors (Figure 12)
demonstrates a clear separation of normal and abnormal traffic, which is a key condition for the
correct determination of the threshold θ res.
Probabilistic interpretation of anomalies using the P Anomaly ( x ) function, as well as standardized
scoring metrics, makes the system more flexible to traffic variations [
        <xref ref-type="bibr" rid="ref23 ref8">8, 23</xref>
        ]. It is vital that the
system is capable of adapting in real-time: the built-in MDP decision-making model automatically
activates actions to update thresholds, retrain, or correct the model, which significantly increases
the survivability of the solution in changing conditions [
        <xref ref-type="bibr" rid="ref24 ref26">24, 26</xref>
        ] (for example, when Zero-Day
attacks occur).
      </p>
      <p>
        The comparative metrics chart (Figure 14) demonstrates the high accuracy of the model on
different datasets: F1-measure exceeds 0.9, TPR exceeds 94%, while FPR does not exceed 3%, and
MCC remains stable at 0.85–0.90 [
        <xref ref-type="bibr" rid="ref12 ref13 ref31 ref5">5, 12, 13, 31</xref>
        ]. These indicators demonstrate the model’s balance
even on unbalanced datasets, which is a significant advantage over classical rules or clustering
algorithms.
      </p>
      <p>
        Special attention should be paid to the practicality of the proposed solution. It is implemented as
a Python module with a REST API, which allows the system to be integrated into the existing
infrastructure without requiring a complete overhaul of the network architecture [
        <xref ref-type="bibr" rid="ref14 ref18 ref32">14, 18, 32</xref>
        ].
Containerization via Docker simplifies deployment in edge devices, SIEM, or NIDS systems.
      </p>
      <p>However, several limitations should also be noted: the need for a sufficiently representative set
of normal traffic for initial training, possible sensitivity to PCA parameters and feature weight
coefficients, and limited ability to explain decisions without integrating XAI modules (planned as
the next step).</p>
      <p>
        In the future, further research should focus on: integrating Explainable AI (XAI) methods to
explain detected deviations, adapting to wireless protocols and IoT [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], using federated learning
for distributed environments [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], and combining with SIEM/SOAR platforms [
        <xref ref-type="bibr" rid="ref32">32</xref>
        ] for automating
incident responses.
      </p>
      <p>
        Thus, the proposed solution combines scientific novelty, technical efficiency, and practical
feasibility, making it competitive in both scientific research and industrial applications [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. XAI
methods SHAP and LIME [
        <xref ref-type="bibr" rid="ref6 ref7">6, 7</xref>
        ] were used to explain the decisions of the OC-NN model. SHAP
plots allowed us to visualize the impact of individual traffic features (e.g., Flow Duration, Packet
Length Std) on classification results, revealing key factors that cause a flow to be classified as
anomalous. LIME graphs provided local explanations for individual predictions, demonstrating the
weight of each feature in the context of a specific example of network traffic [
        <xref ref-type="bibr" rid="ref11 ref7">7, 11</xref>
        ]. Despite the
additional time overhead, OC-NN with fuzzy logic provides acceptable response times (up to 100
ms), making it suitable for networks with real-time requirements.
      </p>
      <p>
        Despite the high accuracy of classification and the explainability of decisions, the proposed
method has several limitations. First, the OC-NN model is focused on training from a single class
(normal traffic), which can reduce its effectiveness when new, atypical attacks appear that differ
significantly from the training profile [
        <xref ref-type="bibr" rid="ref1 ref8">1, 8</xref>
        ]. Second, fuzzy post-processing and XAI interpretation
increase the system’s response time, which is crucial for certain real-world applications with
stringent latency requirements [
        <xref ref-type="bibr" rid="ref30 ref7">7, 30</xref>
        ]. In addition, the model was tested on open datasets
(CICIDS-2017, UNSW-NB15), which do not always reflect the specifics of real corporate traffic,
limiting its versatility [
        <xref ref-type="bibr" rid="ref29 ref5">5, 29</xref>
        ]. In the future, we plan to adapt the methodology to multi-class
scenarios and validate it in a real environment.
      </p>
    </sec>
    <sec id="sec-7">
      <title>7. Conclusions</title>
      <p>The study employed an effective approach to intrusion detection, based on network traffic analysis
using machine learning methods, with a focus on one-class learning. The proposed model is based
on an autoencoder-type neural network that can form a normal traffic profile and detect deviations
in the form of potential threats without the need for a large amount of labeled anomalous data. The
scientific novelty of the work lies in the combination of XAI explanations with one-class neural
network models to improve the interpretability of decisions in NIDS tasks. However, the model
requires a representative profile of normal traffic to ensure stability in real conditions.
A full cycle of practical implementation was carried out: from forming a set of features from real
network traffic, normalizing and reducing the dimension using the principal component analysis
(PCA) method, to training the Autoencoder and building an anomaly classification mechanism
based on reconstruction error. A distinctive feature of the solution is a built-in adaptive update
system based on the Markov decision process (MDP), which provides a dynamic response to
changes in quality statistics (TPR, FPR, F1) and automates model retraining or updating actions.</p>
      <p>The results of experimental testing on well-known datasets—CICIDS-2017, UNSW-NB15, and
NSL-KDD—demonstrated the high effectiveness of the chosen approach. An F1 score of over 0.92, a
TPR of over 94%, and an FPR of no more than 3% were achieved, demonstrating the model's
accuracy, stability, and practical applicability for real-world use. In addition, the system
demonstrated scalability, deployment as a microservice (REST API), and support for distributed
scenarios (edge, cloud, SIEM).</p>
      <p>Thus, the model provides a combination of unsupervised deep learning, adaptive response to
threats, high interpretability (through anomaly scoring and threshold classification), and suitability
for practical integration into real information and communication systems. The proposed
architecture is scientifically novel due to the combination of One-Class Neural Network
mechanisms, autoencoder profiling, PCA, and adaptive MDP-based updating, which forms a new
approach to intrusion detection without the use of labeled attacks. Despite the additional time
costs, OC-NN with fuzzy logic provides an acceptable response time (up to 100 ms), making it
suitable for networks with real-time requirements.</p>
      <p>The results confirm that machine learning methods, in particular autoencoders and One-Class
Neural Networks, are powerful tools for building modern intrusion detection systems. In the
future, it will be promising to expand the model using Explainable AI (XAI), homomorphic
encryption, federated learning, and deeper integration with SIEM/SOAR infrastructures. At the
same time, the system has certain limitations, particularly the dependence of classification quality
on the completeness of the normal traffic profile and its sensitivity to dimension reduction
parameters. This creates a basis for further research.</p>
      <p>In the future, further research will focus on expanding the functionality of the proposed
intrusion detection system by integrating explainable artificial intelligence (Explainable AI)
mechanisms, specifically SHAP and LIME methods, to ensure the real-time interpretability of
results. A key direction is the adaptation of the system to operate in wireless network
environments, such as 5G, ZigBee, and LoRaWAN, where there is a high level of dynamism and
limited resources. Additionally, federated learning is planned to be implemented, which will enable
the model to be deployed in distributed edge networks without transferring sensitive data to a
central node. To improve data processing security, we also plan to use homomorphic encryption,
which will allow us to analyze encrypted traffic without decryption. Additionally, integration with
SIEM and SOAR platforms will ensure automated response to detected incidents, expanding the
system's capabilities to the level of a full-fledged cyber threat response center.</p>
      <p>Declaration on Generative AI
While preparing this work, the authors used the AI programs Grammarly Pro to correct text
grammar and Strike Plagiarism to search for possible plagiarism. After using this tool, the authors
reviewed and edited the content as needed and took full responsibility for the publication’s content.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>J.</given-names>
            <surname>Feng</surname>
          </string-name>
          , et al.,
          <source>Tensor Recurrent Neural Network with Differential Privacy</source>
          ,
          <source>IEEE Trans. Comput.</source>
          ,
          <volume>73</volume>
          (
          <issue>3</issue>
          ) (
          <year>2024</year>
          )
          <fpage>683</fpage>
          -
          <lpage>693</lpage>
          . doi:
          <volume>10</volume>
          .1109/TC.
          <year>2023</year>
          .3236868
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>W.</given-names>
            <surname>Chua</surname>
          </string-name>
          , et al.,
          <source>Web Traffic Anomaly Detection using Isolation Forest, Informatics</source>
          ,
          <volume>11</volume>
          (
          <issue>4</issue>
          ) (
          <year>2024</year>
          )
          <article-title>83</article-title>
          . doi:
          <volume>10</volume>
          .3390/informatics11040083
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>C.</given-names>
            <surname>Djidjev</surname>
          </string-name>
          , siForest:
          <article-title>Detecting Network Anomalies with Set-Structured Isolation Forest</article-title>
          , arXiv preprint,
          <year>2024</year>
          . doi:
          <volume>10</volume>
          .48550/arXiv.2412.06015
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>C.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Gu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A Hybrid</given-names>
            <surname>Intrusion</surname>
          </string-name>
          <article-title>Detection System based on Scalable K-Means+ Random Forest and Deep Learning</article-title>
          , IEEE Access,
          <volume>9</volume>
          (
          <year>2021</year>
          )
          <fpage>75729</fpage>
          -
          <lpage>75740</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2021</year>
          .3082147
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Z. K.</given-names>
            <surname>Maseer</surname>
          </string-name>
          , et al.,
          <article-title>Benchmarking of Machine Learning for Anomaly-based Intrusion detection Systems in the CICIDS2017 Dataset</article-title>
          , IEEE Access,
          <volume>9</volume>
          (
          <year>2021</year>
          )
          <fpage>22351</fpage>
          -
          <lpage>22370</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2021</year>
          .3056614
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>I. H.</given-names>
            <surname>Ji</surname>
          </string-name>
          , et al.,
          <source>Artificial Intelligence-based Anomaly Detection Technology over Encrypted Traffic: A Systematic Literature Review, Sensors</source>
          ,
          <volume>24</volume>
          (
          <issue>3</issue>
          ) (
          <year>2024</year>
          )
          <article-title>898</article-title>
          . doi:
          <volume>10</volume>
          .3390/s24030898
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>S.</given-names>
            <surname>Mane</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Rao</surname>
          </string-name>
          ,
          <article-title>Explaining Network Intrusion Detection System using Explainable AI Framework, arXiv</article-title>
          .
          <source>doi:10.48550/arXiv.2103.07110</source>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>A. B.</given-names>
            <surname>Nassif</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Talib</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Nasir</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. M.</given-names>
            <surname>Dakalbab</surname>
          </string-name>
          ,
          <article-title>Machine Learning for Anomaly Detection: A Systematic Review</article-title>
          , IEEE Access,
          <volume>9</volume>
          (
          <year>2021</year>
          )
          <fpage>78658</fpage>
          -
          <lpage>78700</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2021</year>
          .3083060
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A.</given-names>
            <surname>Iqbal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Gope</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Sikdar</surname>
          </string-name>
          ,
          <article-title>Privacy-Preserving Collaborative Split Learning Framework for Smart Grid Load Forecasting</article-title>
          ,
          <source>IEEE Trans. Dependable Secure Comput.</source>
          ,
          <year>2025</year>
          . doi:
          <volume>10</volume>
          .1109/TDSC.
          <year>2025</year>
          .3585297
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>R. C.</given-names>
            <surname>Ripan</surname>
          </string-name>
          , et al.,
          <article-title>An Isolation Forest Learning based Outlier Detection Approach for Effectively Classifying Cyber Anomalies</article-title>
          ,
          <source>in: Hybrid Intelligent Systems (HIS</source>
          <year>2020</year>
          ),
          <source>Adv. Intell. Syst. Comput.</source>
          , vol.
          <volume>1375</volume>
          , Springer, Cham,
          <year>2021</year>
          ,
          <fpage>367</fpage>
          -
          <lpage>379</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -73050-5_
          <fpage>27</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>T.-Y. Kim</surname>
          </string-name>
          , S.-B. Cho,
          <article-title>Web Traffic Anomaly Detection using C-LSTM Neural Networks</article-title>
          ,
          <source>Expert Syst. Appl.</source>
          ,
          <volume>106</volume>
          (
          <year>2018</year>
          )
          <fpage>66</fpage>
          -
          <lpage>76</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.eswa.
          <year>2018</year>
          .
          <volume>04</volume>
          .004
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>J.</given-names>
            <surname>Trivedi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Shah</surname>
          </string-name>
          ,
          <string-name>
            <surname>A Systematic</surname>
          </string-name>
          <source>and Comprehensive Study on Machine Learning and Deep Learning Models in Web Traffic Prediction, Arch. Comput. Methods Eng</source>
          .,
          <volume>31</volume>
          (
          <year>2024</year>
          )
          <fpage>3171</fpage>
          -
          <lpage>3195</lpage>
          . doi:
          <volume>10</volume>
          .1007/s11831-024-10077-8
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>B. A.</given-names>
            <surname>Tama</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Nkenyereye</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. M. R.</given-names>
            <surname>Islam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.-S.</given-names>
            <surname>Kwak</surname>
          </string-name>
          ,
          <article-title>An Enhanced Anomaly Detection in Web Traffic using a Stack of Classifier Ensemble</article-title>
          , IEEE Access,
          <volume>8</volume>
          (
          <year>2020</year>
          )
          <fpage>24120</fpage>
          -
          <lpage>24134</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2020</year>
          .2969428
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kostyuk</surname>
          </string-name>
          , et al.,
          <source>Tools for Providing Information Security from Hidden Threats in Cloud Computing Infrastructure, Cybersecur.: Educ. Sci. Tech</source>
          .,
          <volume>4</volume>
          (
          <issue>28</issue>
          ) (
          <year>2025</year>
          )
          <fpage>633</fpage>
          -
          <lpage>655</lpage>
          . doi:
          <volume>10</volume>
          .28925/
          <fpage>2663</fpage>
          -
          <lpage>4023</lpage>
          .
          <year>2025</year>
          .
          <volume>28</volume>
          .857
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kostiuk</surname>
          </string-name>
          , et al.,
          <article-title>Protection of Information and Secure Data Exchange in Wireless Mobile Networks with Authentication and Key Exchange Protocols</article-title>
          , Cybersecur.:
          <source>Educ. Sci. Tech</source>
          .,
          <volume>1</volume>
          (
          <issue>25</issue>
          ) (
          <year>2024</year>
          )
          <fpage>229</fpage>
          -
          <lpage>252</lpage>
          . doi:
          <volume>10</volume>
          .28925/
          <fpage>2663</fpage>
          -
          <lpage>4023</lpage>
          .
          <year>2024</year>
          .
          <volume>25</volume>
          .229252
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kostiuk</surname>
          </string-name>
          , et al.,
          <article-title>A system for assessing the interdependencies of information system agents in information security risk management using cognitive maps</article-title>
          ,
          <source>in: Cyber Hygiene &amp; Conflict Management in Global Information Networks</source>
          , vol.
          <volume>3925</volume>
          ,
          <year>2025</year>
          ,
          <fpage>249</fpage>
          -
          <lpage>264</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>P.</given-names>
            <surname>Skladannyi</surname>
          </string-name>
          , et al.,
          <source>Development of Modular Neural Networks for Detecting Different Classes of Network Attacks, Cybersecur.: Educ. Sci. Tech</source>
          .,
          <volume>3</volume>
          (
          <issue>27</issue>
          ) (
          <year>2025</year>
          )
          <fpage>534</fpage>
          -
          <lpage>548</lpage>
          . doi:
          <volume>10</volume>
          .28925/
          <fpage>2663</fpage>
          -
          <lpage>4023</lpage>
          .
          <year>2025</year>
          .
          <volume>27</volume>
          .772
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kostiuk</surname>
          </string-name>
          , et al.,
          <article-title>The Methodology for Protecting Grid Environments from Malicious Code during the Execution of Computational Tasks</article-title>
          , Cybersecur.:
          <source>Educ. Sci. Tech</source>
          .,
          <volume>3</volume>
          (
          <issue>27</issue>
          ) (
          <year>2025</year>
          )
          <fpage>22</fpage>
          -
          <lpage>40</lpage>
          . doi:
          <volume>10</volume>
          .28925/
          <fpage>2663</fpage>
          -
          <lpage>4023</lpage>
          .
          <year>2025</year>
          .
          <volume>27</volume>
          .710
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>M. M. Inuwa</surname>
          </string-name>
          ,
          <string-name>
            <surname>R. Das</surname>
            ,
            <given-names>A Comparative</given-names>
          </string-name>
          <article-title>Analysis of Various Machine Learning Methods for Anomaly Detection in Cyber Attacks on IoT Networks</article-title>
          ,
          <source>Internet Things</source>
          ,
          <volume>26</volume>
          (
          <year>2024</year>
          )
          <article-title>101162</article-title>
          . doi:
          <volume>10</volume>
          .1016/j.iot.
          <year>2024</year>
          .101162
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>P.</given-names>
            <surname>Skladannyi</surname>
          </string-name>
          , et al.,
          <article-title>Adaptive Methods for Embedding Digital Watermarks to Protect Audio and Video Images in Information and Communication Systems</article-title>
          , in: Classic, Quantum, and
          <string-name>
            <surname>Post-Quantum Cryptography</surname>
          </string-name>
          (CQPC), vol.
          <volume>4016</volume>
          ,
          <year>2025</year>
          ,
          <fpage>13</fpage>
          -
          <lpage>31</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kostiuk</surname>
          </string-name>
          , et al.,
          <article-title>Integrated Protection Strategies and Adaptive Resource Distribution for Secure Video Streaming over a Bluetooth Network, in: Cybersecurity Providing in Inf</article-title>
          .
          <source>Telecommun. Syst. II</source>
          <year>2024</year>
          , vol.
          <volume>3826</volume>
          ,
          <year>2024</year>
          ,
          <fpage>129</fpage>
          -
          <lpage>138</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>X.</given-names>
            <surname>Li</surname>
          </string-name>
          , et al.,
          <article-title>Quality Monitoring of Real-Time PPP Service using Isolation Forest-based Residual Anomaly Detection, GPS Solut</article-title>
          .,
          <volume>28</volume>
          (
          <year>2024</year>
          )
          <article-title>118</article-title>
          . doi:
          <volume>10</volume>
          .1007/s10291-024-01657-z
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>F.</given-names>
            <surname>Carrera</surname>
          </string-name>
          , et al.,
          <article-title>Combining Unsupervised Approaches for Near Real-Time Network Traffic Anomaly Detection</article-title>
          , Appl. Sci.,
          <volume>12</volume>
          (
          <issue>3</issue>
          ) (
          <year>2022</year>
          )
          <article-title>1759</article-title>
          . doi:
          <volume>10</volume>
          .3390/app12031759
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kostiuk</surname>
          </string-name>
          , et al.,
          <article-title>Models and Algorithms for Analyzing Information Risks during the Security Audit of Personal Data Information System</article-title>
          ,
          <source>in: Cyber Hygiene &amp; Conflict Management in Global Information Networks</source>
          , vol.
          <volume>3925</volume>
          ,
          <year>2025</year>
          ,
          <fpage>155</fpage>
          -
          <lpage>171</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Wang</surname>
          </string-name>
          , et al.,
          <article-title>DLPriv: Deep Learning-based Dynamic Location Privacy Mechanism for LBS in Internet-of-</article-title>
          <string-name>
            <surname>Vehicles</surname>
          </string-name>
          , in
          <source>: PROC. Int. Conf. Netw. Netw. Appl</source>
          . (NaNA), IEEE,
          <year>2023</year>
          ,
          <fpage>514</fpage>
          -
          <lpage>519</lpage>
          . doi:
          <volume>10</volume>
          .1109/NaNA60121.
          <year>2023</year>
          .00091
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kostiuk</surname>
          </string-name>
          , et al.,
          <article-title>Information and intelligent forecasting systems based on the methods of neural network theory, in: Smart Inf</article-title>
          .
          <source>Syst. Technol., SIST</source>
          ,
          <year>2023</year>
          ,
          <fpage>168</fpage>
          -
          <lpage>173</lpage>
          . doi:
          <volume>10</volume>
          .1109/SIST58284.
          <year>2023</year>
          .10223499
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Elsaid</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Binbusayyis</surname>
          </string-name>
          ,
          <article-title>An Optimized Isolation Forest-based Intrusion Detection System for Heterogeneous and Streaming Data in the Industrial Internet of Things (IIoT) Networks, Discov</article-title>
          . Appl. Sci.,
          <volume>6</volume>
          (
          <year>2024</year>
          )
          <article-title>483</article-title>
          . doi:
          <volume>10</volume>
          .1007/s42452-024-06165-w
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kostiuk</surname>
          </string-name>
          , et al.,
          <article-title>Application of Statistical and Neural Network Algorithms in Steganographic Synthesis and Analysis of Hidden Information in Audio and Graphic Files</article-title>
          , in: Classic, Quantum, and
          <string-name>
            <surname>Post-Quantum Cryptography</surname>
          </string-name>
          (CQPC), vol.
          <volume>4016</volume>
          ,
          <year>2025</year>
          ,
          <fpage>45</fpage>
          -
          <lpage>65</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>P.</given-names>
            <surname>Skladannyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kostiuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Mazur</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Pitaychuk</surname>
          </string-name>
          ,
          <article-title>Study of Characteristics and Performance of Access Protocols to Cloud Computing Environments based on Universal Testing, Telecommun</article-title>
          . Inf. Technol.,
          <volume>1</volume>
          (
          <issue>86</issue>
          ) (
          <year>2025</year>
          )
          <fpage>61</fpage>
          -
          <lpage>74</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>T.</given-names>
             
            <surname>Al-Shehari</surname>
          </string-name>
          , et al.,
          <article-title>Insider Threat Detection Model using Anomaly-based Isolation Forest Algorithm</article-title>
          , IEEE Access,
          <volume>11</volume>
          (
          <year>2023</year>
          )
          <fpage>118170</fpage>
          -
          <lpage>118185</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2023</year>
          .3326750
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Ding</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Fei</surname>
          </string-name>
          ,
          <article-title>An Anomaly Detection Approach based on Isolation Forest Algorithm for Streaming Data using Sliding Window</article-title>
          ,
          <source>IFAC Proc. 46</source>
          (
          <year>2013</year>
          )
          <fpage>12</fpage>
          -
          <lpage>17</lpage>
          . doi:
          <volume>10</volume>
          .3182/20130902-3- CN-
          <volume>3020</volume>
          .
          <fpage>00044</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>P.</given-names>
             
            <surname>Petriv</surname>
          </string-name>
          ,
          <string-name>
            <surname>I.</surname>
          </string-name>
           Opirskyy,
          <string-name>
            <given-names>N.</given-names>
             
            <surname>Mazur</surname>
          </string-name>
          , Modern Technologies of Decentralized Databases, Authentication, and
          <article-title>Authorization Methods, in: Cybersecurity Providing in Information and Telecommunication Systems II</article-title>
          , vol.
          <volume>3826</volume>
          ,
          <year>2024</year>
          ,
          <fpage>60</fpage>
          -
          <lpage>71</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>