ANALYSIS OF THE EFFECTIVENESS OF BORDER TRAFFIC ANOMALY DETECTION BASED ON MACHINE LEARNING MODELS

Authors

DOI:

https://doi.org/10.28925/2663-4023.2025.29.898

Keywords:

anomaly detection, neural networks, network traffic, machine learning, digital twin, DoS attacks, model, Node-RED

Abstract

Abstract. The article presents an approach to constructing a real-time anomaly detection model for DoS (Denial of Service) network traffic and its integration into a monitoring system. This opens new opportunities for visualization, investigation, and development of intrusion detection systems (IDS) and their digital twins, providing a flexible platform for modeling cyber-physical threats and responding to them. The study synthesizes a range of models with various neural network architectures, including CNN (Convolutional Neural Networks), LSTM (Long Short-Term Memory), and Autoencoder variants, performs a comparative analysis, and selects an effective model for predicting anomalies in network traffic using diverse metrics. The chosen model exchanges data with the Node-RED environment, which implements the traffic monitoring system and provides graphical representation of intrusion detection results, automated responses, and additional network traffic simulation. The model functions as a digital twin of the anomaly detection system. This approach enables the development of a prototype system that can be rapidly deployed without the need for complex computational resources or cluster systems. A key feature of the applied approach is the combination of modern neural network models with automated response logic, which allows its behavior to approximate that of an autonomous protection system capable of responding promptly to cyber-physical threats in real time. This significantly expands the capabilities of digital twins in education, testing, and development of modern cybersecurity systems, while also enhancing the effectiveness of research and practical implementations in the field of information security. The presented solution opens prospects for further integration of complex deep learning models, hybrid architectures, and automated network traffic monitoring systems.

Downloads

Download data is not yet available.

References

Skladannyi, P., Kostiuk, Y., Rzaeva, S., Samoilenko, Y., & Savchenko, T. (2025). Development of modular neural networks for detecting different classes of network attacks. Cybersecurity: Education, Science, Technique, 3(27), 534–548. https://doi.org/10.28925/2663-4023.2025.27.772

Bondarchuk, A. P., & Zhebka, V. V. (2023). Protection of a heterogeneous telecommunication network from the influence of destabilizing factors. Telecommunication and Information Technologies, 78(1). https://doi.org/10.31673/2412-4338.2023.010416

Haidur, H. I., Gakhov, S. O., & Bryhynets, A. A. (2023). Detection of network anomalies with neural networks algorithms. Telecommunication and Information Technologies, 78(1). https://doi.org/10.31673/2412-4338.2023.016173

Savchenko, T., Lutska, N., Vlasenko, L., Sashnova, M., Zahorulko, A., Minenko, S., Ibaiev, E., & Tytarenko, N. (2025). Risk analysis and cybersecurity enhancement of Digital Twins in dairy production. Technology audit and production reserves, 2(2(82)), 37–49. https://doi.org/10.15587/2706-5448.2025.325422

da Silva Ruffo, V. G., Brandão Lent, D. M., Komarchesqui, M., Schiavon, V. F., de Assis, M. V. O., Carvalho, L. F., & Proença, M. L. (2024). Anomaly and intrusion detection using deep learning for software-defined networks: A survey. Expert Systems With Applications, 256, 124982. https://doi.org/10.1016/j.eswa.2024.124982

Yin, F., He, B. (2021). Cascaded fault detection system of error back-propagation network based on node association degree. Computer Communications, 175, 142–149. https://doi.org/10.1016/j.comcom.2021.04.011

Ullah, W., Hussain, T., Khan, Z. A., Haroon, U., & Baik, S. W. (2022). Intelligent dual stream CNN and echo state network for anomaly detection. Knowledge-Based Systems, 109456. https://doi.org/10.1016/j.knosys.2022.109456

Dong, S., Su, H., & Liu, Y. (2022). A-CAVE: Network abnormal traffic detection algorithm based on variational autoencoder. ICT Express. https://doi.org/10.1016/j.icte.2022.11.006

Aktar, S., & Yasin Nur, A. (2023). Towards DDoS Attack Detection using Deep Learning Approach. Computers & Security, 103251. https://doi.org/10.1016/j.cose.2023.103251

Bamber, S. S., Katkuri, A. V. R., Sharma, S., & Angurala, M. (2024). A Hybrid CNN-LSTM Approach for Intelligent Cyber Intrusion Detection System. Computers & Security, 104146. https://doi.org/10.1016/j.cose.2024.104146

Qi, G., Mao, J., Huang, K., You, Z., & Lin, J. (2024). Multi-Head attention enhanced parallel dilated convolution and residual learning for network traffic anomaly detection. Computers, Materials & Continua, 1–10. https://doi.org/10.32604/cmc.2024.058396

Calvo-Bascones, P., Voisin, A., Do, P., & Sanz-Bobi, M. A. (2023). A collaborative network of digital twins for anomaly detection applications of complex systems. snitch digital twin concept. Computers in Industry, 144, 103767. https://doi.org/10.1016/j.compind.2022.103767

Liu, Z., Lang, Z.-Q., Gui, Y., Zhu, Y.-P., & Laalej, H. (2024). Digital twin-based anomaly detection for real-time tool condition monitoring in machining. Journal of Manufacturing Systems, 75, 163–173. https://doi.org/10.1016/j.jmsy.2024.06.004

Latsou, C., Farsi, M., & Erkoyuncu, J. A. (2023). Digital twin-enabled automated anomaly detection and bottleneck identification in complex manufacturing systems using a multi-agent approach. Journal of Manufacturing Systems, 67, 242–264. https://doi.org/10.1016/j.jmsy.2023.02.008

Lindemann, B., Maschler, B., Sahlab, N., & Weyrich, M. (2021). A survey on anomaly detection for technical systems using LSTM networks. Computers in Industry, 131, 103498. https://doi.org/10.1016/j.compind.2021.103498

Downloads


Abstract views: 5

Published

2025-09-26

How to Cite

Savchenko, T., Lutska, N., Vlasenko, L., & Tomenko, N. (2025). ANALYSIS OF THE EFFECTIVENESS OF BORDER TRAFFIC ANOMALY DETECTION BASED ON MACHINE LEARNING MODELS. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 1(29), 464–479. https://doi.org/10.28925/2663-4023.2025.29.898