<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE root>
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:ali="http://www.niso.org/schemas/ali/1.0/" article-type="review-article" dtd-version="1.2" xml:lang="en"><front><journal-meta><journal-id journal-id-type="publisher-id">Informacionnye Tehnologii</journal-id><journal-title-group><journal-title xml:lang="en">Informacionnye Tehnologii</journal-title><trans-title-group xml:lang="ru"><trans-title>Информационные технологии</trans-title></trans-title-group></journal-title-group><issn publication-format="print">1684-6400</issn><publisher><publisher-name xml:lang="en">New Technologies Publishing House</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">704122</article-id><article-id pub-id-type="doi">10.17587/it.32.149-156</article-id><article-categories><subj-group subj-group-type="toc-heading" xml:lang="en"><subject>Information security</subject></subj-group><subj-group subj-group-type="toc-heading" xml:lang="ru"><subject>Безопасность информации</subject></subj-group><subj-group subj-group-type="article-type"><subject>Review Article</subject></subj-group></article-categories><title-group><article-title xml:lang="en">The adaptive firewall with log predictive analysis based on neural network</article-title><trans-title-group xml:lang="ru"><trans-title>Адаптивный файрвол с предиктивным анализом логов на основе нейронной сети</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="en"><surname>Kuznetsov</surname><given-names>D. A.</given-names></name><name xml:lang="ru"><surname>Кузнецов</surname><given-names>Д. А.</given-names></name></name-alternatives><address><country country="RU">Russian Federation</country></address><bio xml:lang="en"><p>Master’s Degree Student</p></bio><bio xml:lang="ru"><p>магистрант</p></bio><email>daniil.kuznetsov2001@mail.ru</email><xref ref-type="aff" rid="aff1"/></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="en"><surname>Rysin</surname><given-names>M. L.</given-names></name><name xml:lang="ru"><surname>Рысин</surname><given-names>М. Л.</given-names></name></name-alternatives><address><country country="RU">Russian Federation</country></address><bio xml:lang="en"><p>Cand. of Pedagog. Sc.</p></bio><bio xml:lang="ru"><p>канд. пед. наук, доц.</p></bio><email>rysin@mirea.ru</email><xref ref-type="aff" rid="aff1"/></contrib></contrib-group><aff-alternatives id="aff1"><aff><institution xml:lang="en">Russian Technological University — MIREA</institution></aff><aff><institution xml:lang="ru">МИРЭА — Российский технологический университет</institution></aff></aff-alternatives><pub-date date-type="pub" iso-8601-date="2026-03-13" publication-format="electronic"><day>13</day><month>03</month><year>2026</year></pub-date><volume>32</volume><issue>3</issue><issue-title xml:lang="en">Informacionnye Tehnologii</issue-title><issue-title xml:lang="ru">Информационные технологии</issue-title><fpage>149</fpage><lpage>156</lpage><history><date date-type="received" iso-8601-date="2026-03-11"><day>11</day><month>03</month><year>2026</year></date><date date-type="accepted" iso-8601-date="2026-03-11"><day>11</day><month>03</month><year>2026</year></date></history><permissions><copyright-statement xml:lang="en">Copyright ©; 2026, Informacionnye Tehnologii</copyright-statement><copyright-statement xml:lang="ru">Copyright ©; 2026, Информационные технологии</copyright-statement><copyright-year>2026</copyright-year><copyright-holder xml:lang="en">Informacionnye Tehnologii</copyright-holder><copyright-holder xml:lang="ru">Информационные технологии</copyright-holder></permissions><self-uri xlink:href="https://journals.eco-vector.com/1684-6400/article/view/704122">https://journals.eco-vector.com/1684-6400/article/view/704122</self-uri><abstract xml:lang="en"><p>The article considers the development of an adaptive IDS/IPS system based on neural networks, capable of detecting both known and previously unknown attacks. The analysis is conducted using the NF-ToN-IoT dataset. Three neural networks were trained: for attack detection, attack type identification, and unknown threat prediction. The results demonstrate high attack detection accuracy (96.97 %) and the ability to identify new threats (81.94 %), surpassing existing solutions.The developed firewall and intrusion prevention system demonstrates high efficiency, enabling the creation of a domestic security system capable of minimizing the risk of hacker attacks and ensuring reliable protection of network infrastructure.</p></abstract><trans-abstract xml:lang="ru"><p>Рассматривается разработка адаптивной программной системы обнаружения и предотвращения вторжений (IDS/IPS), основанной на нейронных сетях, способной выявлять как известные, так и ранее неизвестные атаки. Используется анализ сетевого трафика на основе датасета NF-ToN-IoT. Проведено обучение трех нейронных сетей: для обнаружения атак, идентификации типов атак и предсказания неизвестных угроз. Результаты показывают высокую точность обнаружения атак (96,97 %) и способность выявления новых угроз (81,94 %), что превосходит существующие решения.</p> <p>Разработанный комплекс файрвола и IDS/IPS демонстрирует высокую эффективность, что позволяет создать отечественную защитную систему, способную минимизировать риск хакерских атак и обеспечить надежную защиту сетевой инфраструктуры.</p></trans-abstract><kwd-group xml:lang="en"><kwd>IDS</kwd><kwd>IPS</kwd><kwd>information security</kwd><kwd>neural networks</kwd><kwd>machine learning</kwd><kwd>network infrastructure protection</kwd><kwd>network attack</kwd><kwd>predictive analysis</kwd><kwd>adaptive firewall</kwd><kwd>0-day attack</kwd></kwd-group><kwd-group xml:lang="ru"><kwd>IDS</kwd><kwd>IPS</kwd><kwd>информационная безопасность</kwd><kwd>нейронные сети</kwd><kwd>машинное обучение</kwd><kwd>защита сетевой инфраструктуры</kwd><kwd>сетевая атака</kwd><kwd>предиктивный анализ</kwd><kwd>адаптивный файрвол</kwd><kwd>0-day атака</kwd></kwd-group><funding-group/></article-meta></front><body></body><back><ref-list><ref id="B1"><label>1.</label><citation-alternatives><mixed-citation xml:lang="en">Kochergin S. V., Artemova S. V., Bakaev A. A., Mityakov E. S., Vegera Zh. G., Maksimova E. A. Cybersecurity of smart grids: Comparison of machine learning approaches for anomaly detection, Russian technological journal, 2024, pp. 7—9 (in Russian).</mixed-citation><mixed-citation xml:lang="ru">Кочергин С. В., Артемова С. В., Бакаев А. А., Митяков Е. С., Вегера Ж. Г., Максимова Е. А. Кибербезопасность смарт-сетей: Сравнение подходов машинного обучения для обнаружения аномалий // Russian technological journal. 2024. С. 7—9.</mixed-citation></citation-alternatives></ref><ref id="B2"><label>2.</label><citation-alternatives><mixed-citation xml:lang="en">Ryapolova E. I., Tsvetkova K. E. Analysis of anomaly detection systems and hybrid intrusion detection systems, Problems and Prospects of Implementing Innovative Telecommunication Technologies, 2020, pp. 130—142 (in Russian).</mixed-citation><mixed-citation xml:lang="ru">Ряполова Е. И., Цветкова К. Е. Анализ систем обнаружения аномалий и гибридных систем обнаружения вторжений // Проблемы и перспективы внедрения инновационных телекоммуникационных технологий. 2020. С. 130—142.</mixed-citation></citation-alternatives></ref><ref id="B3"><label>3.</label><citation-alternatives><mixed-citation xml:lang="en">Yugai P. E., Moskvin D. A. Use of machine learning algorithms and honeypot systems for detecting adversarial attacks on intrusion detection systems, Problems of Information Security. Computer Systems, 2023, pp. 145—155 (in Russian).</mixed-citation><mixed-citation xml:lang="ru">Югай П. Э., Москвин Д. А. Использование алгоритмов машинного обучения и Honeypot-систем для обнаружения состязательных атак на системы обнаружения вторжений // Проблемы информационной безопасности. Компьютерные системы. 2023. С. 145—155.</mixed-citation></citation-alternatives></ref><ref id="B4"><label>4.</label><citation-alternatives><mixed-citation xml:lang="en">Ivkin А. N. Training and implementation of an adaptive system in an intrusion detection system, Current Problems of Radio Electronics and Telecommunications, 2021, pp. 172—174 (in Russian).</mixed-citation><mixed-citation xml:lang="ru">Ивкин А. Н. Обучение и внедрение адаптивной системы в систему обнаружения вторжений // Актуальные проблемы радиоэлектроники и телекоммуникаций. 2021. С. 172—174.</mixed-citation></citation-alternatives></ref><ref id="B5"><label>5.</label><citation-alternatives><mixed-citation xml:lang="en">Moskvichev А. D. The Intrusion Detection System Based on Immune System and Neural Network Detectors, Colloquium-journal, 2024, pp. 84—85 (in Russian).</mixed-citation><mixed-citation xml:lang="ru">Москвичев А. Д. Система обнаружения вторжений на основе иммунной системы и нейросетевых детекторов// Colloquium-journal. 2024. С. 84—85.</mixed-citation></citation-alternatives></ref><ref id="B6"><label>6.</label><citation-alternatives><mixed-citation xml:lang="en">Glushenko M. V., Shirjaev A. A., Glushenko S. A. IDS / IPS — Intrusion Detection and Prevention Systems, Koncepcija obshhestv aznanij v sovremennoj nauke, 2019, pp. 115—117 (in Russian).</mixed-citation><mixed-citation xml:lang="ru">Глущенко М. В., Ширяев А. А., Глушенко С. А. IDS / IPS — системы обнаружения и предотвращения вторжений // Концепция общества знаний в современной науке. 2019. С. 115—117.</mixed-citation></citation-alternatives></ref><ref id="B7"><label>7.</label><citation-alternatives><mixed-citation xml:lang="en">Bazarova I. A. Mathematical modelling means in problems of rectangular covering of random polygon areas, Upravlenie ustojchivym razvitiem toplivno-jenergeticheskoho kompleksa, 2021, pp. 95—99 (in Russian).</mixed-citation><mixed-citation xml:lang="ru">Базарова И. А. Анализ сравнительных характеристик систем защиты сетей IDS И IPS // Управление устойчивым развитием топливно-энергетического комплекса. 2021. С. 95—99.</mixed-citation></citation-alternatives></ref><ref id="B8"><label>8.</label><citation-alternatives><mixed-citation xml:lang="en">Moustafa N., Slay J. The evaluation of network anomaly detection systems: Statistical analysis of the UNSW-NB15 dataset and the comparison with the KDD99 dataset, Information Security Journal: А Global Perspective, 2016, vol. 25, no. 1—3, pp. 18—31.</mixed-citation><mixed-citation xml:lang="ru">Moustafa N., Slay J. The evaluation of network anomaly detection systems: Statistical analysis of the UNSW-NB15 dataset and the comparison with the KDD99 dataset // Information Security Journal: А Global Perspective. 2016. Vol. 25, N. 1—3. P. 18—31.</mixed-citation></citation-alternatives></ref><ref id="B9"><label>9.</label><citation-alternatives><mixed-citation xml:lang="en">Doshi R., Apthorpe N., Feamster N. Machine Learning DDoS Detection for Consumer Internet of Things Devices, IEEE Symposium on Security and Privacy Workshops, 2018, pp. 29—35.</mixed-citation><mixed-citation xml:lang="ru">Doshi R., Apthorpe N., Feamster N. Machine Learning DDoS Detection for Consumer Internet of Things Devices // IEEE Symposium on Security and Privacy Workshops. 2018. P. 29—35.</mixed-citation></citation-alternatives></ref><ref id="B10"><label>10.</label><citation-alternatives><mixed-citation xml:lang="en">Kim G., Lee S., Kim S. А novel hybrid intrusion detection method integrating anomaly detection with misuse detection, Expert Systems with Applications. 2014, vol. 41, no. 4, pp. 1690—1700.</mixed-citation><mixed-citation xml:lang="ru">Kim G., Lee S., Kim S. А novel hybrid intrusion detection method integrating anomaly detection with misuse detection // Expert Systems with Applications. 2014. Vol. 41, N. 4. P. 1690—1700.</mixed-citation></citation-alternatives></ref><ref id="B11"><label>11.</label><citation-alternatives><mixed-citation xml:lang="en">Sarhan M., Layeghy S., Portmann M. Feature Analysis for Machine Learning-based IOT Intrusion Detection, Digital Communications and Networks, 2024, vol. 10, iss. 1, pp. 205—216.</mixed-citation><mixed-citation xml:lang="ru">Sarhan M., Layeghy S., Portmann M. Feature Analysis for Machine Learning-based IOT Intrusion Detection // Digital Communications and Networks. 2024. Vol. 10, Iss. 1. P. 205—216.</mixed-citation></citation-alternatives></ref></ref-list></back></article>
