<?xml version="1.0" encoding="UTF-8"?>
<article article-type="research-article" dtd-version="1.3" xml:lang="ru" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamespaceSchemaLocation="https://metafora.rcsi.science/xsd_files/journal3.xsd">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">moitvivt</journal-id>
      <journal-title-group>
        <journal-title xml:lang="ru">Моделирование, оптимизация и информационные технологии</journal-title>
        <trans-title-group xml:lang="en">
          <trans-title>Modeling, Optimization and Information Technology</trans-title>
        </trans-title-group>
      </journal-title-group>
      <issn pub-type="epub">2310-6018</issn>
      <publisher>
        <publisher-name>Издательство</publisher-name>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.26102/2310-6018/2022.39.4.020</article-id>
      <article-id pub-id-type="custom" custom-type="elpub">1267</article-id>
      <title-group>
        <article-title xml:lang="ru">Гибридная система обнаружения атак на основе комитета классификаторов</article-title>
        <trans-title-group xml:lang="en">
          <trans-title>Hybrid intrusion detection system with the use of a classifiers committee</trans-title>
        </trans-title-group>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author" corresp="yes">
          <name-alternatives>
            <name name-style="eastern" xml:lang="ru">
              <surname>Васильев</surname>
              <given-names>Владимир Иванович</given-names>
            </name>
            <name name-style="western" xml:lang="en">
              <surname>Vasilyev</surname>
              <given-names>Vladimir Ivanovich</given-names>
            </name>
          </name-alternatives>
          <email>vas0015@yandex.ru</email>
          <xref ref-type="aff">aff-1</xref>
        </contrib>
        <contrib contrib-type="author" corresp="yes">
          <contrib-id contrib-id-type="orcid">0000-0001-5857-2413</contrib-id>
          <name-alternatives>
            <name name-style="eastern" xml:lang="ru">
              <surname>Вульфин</surname>
              <given-names>Алексей Михайлович</given-names>
            </name>
            <name name-style="western" xml:lang="en">
              <surname>Vulfin</surname>
              <given-names>Alexey Mikhailovich</given-names>
            </name>
          </name-alternatives>
          <email>vulfin.alexey@gmail.com</email>
          <xref ref-type="aff">aff-2</xref>
        </contrib>
        <contrib contrib-type="author" corresp="yes">
          <name-alternatives>
            <name name-style="eastern" xml:lang="ru">
              <surname>Гвоздев</surname>
              <given-names>Владимир Ефимович</given-names>
            </name>
            <name name-style="western" xml:lang="en">
              <surname>Gvozdev</surname>
              <given-names>Vladimir Efimovich</given-names>
            </name>
          </name-alternatives>
          <email>wega55@mail.ru</email>
          <xref ref-type="aff">aff-3</xref>
        </contrib>
        <contrib contrib-type="author" corresp="yes">
          <contrib-id contrib-id-type="orcid">0000-0002-4178-5284</contrib-id>
          <name-alternatives>
            <name name-style="eastern" xml:lang="ru">
              <surname>Шамсутдинов</surname>
              <given-names>Ринат Рустемович</given-names>
            </name>
            <name name-style="western" xml:lang="en">
              <surname>Shamsutdinov</surname>
              <given-names>Rinat Rustemovich</given-names>
            </name>
          </name-alternatives>
          <email>shrr2019@yandex.ru</email>
          <xref ref-type="aff">aff-4</xref>
        </contrib>
      </contrib-group>
      <aff-alternatives id="aff-1">
        <aff xml:lang="ru">Уфимский университет науки и технологий</aff>
        <aff xml:lang="en">Ufa University of Science and Technology</aff>
      </aff-alternatives>
      <aff-alternatives id="aff-2">
        <aff xml:lang="ru">Уфимский университет науки и технологий</aff>
        <aff xml:lang="en">Ufa University of Science and Technology</aff>
      </aff-alternatives>
      <aff-alternatives id="aff-3">
        <aff xml:lang="ru">Уфимский университет науки и технологий</aff>
        <aff xml:lang="en">Ufa University of Science and Technology</aff>
      </aff-alternatives>
      <aff-alternatives id="aff-4">
        <aff xml:lang="ru">Уфимский университет науки и технологий</aff>
        <aff xml:lang="en">Ufa University of Science and Technology</aff>
      </aff-alternatives>
      <pub-date pub-type="epub">
        <day>01</day>
        <month>01</month>
        <year>2026</year>
      </pub-date>
      <volume>1</volume>
      <issue>1</issue>
      <elocation-id>10.26102/2310-6018/2022.39.4.020</elocation-id>
      <permissions>
        <copyright-statement>Copyright © Авторы, 2026</copyright-statement>
        <copyright-year>2026</copyright-year>
        <license license-type="creative-commons-attribution" xlink:href="https://creativecommons.org/licenses/by/4.0/">
          <license-p>This work is licensed under a Creative Commons Attribution 4.0 International License</license-p>
        </license>
      </permissions>
      <self-uri xlink:href="https://moitvivt.ru/ru/journal/article?id=1267"/>
      <abstract xml:lang="ru">
        <p>В статье проанализированы вопросы обнаружения сетевых атак на системы промышленного Интернета вещей (Industrial Internet of Things, IIoT), рассмотрены существующие подходы к обнаружению таких атак, основанные на применении методов искусственного интеллекта. Подчеркнут высокий интерес к интеграции машинного обучения и методов искусственного интеллекта в составе гибридных систем. Такая интеграция позволяет компенсировать недостатки одних алгоритмов преимуществами других. Целью работы является повышение эффективности обнаружения сетевых атак. В статье предложено применение многоуровневой гибридной системы обнаружения атак на IIoT, основанной на комбинации нескольких классификаторов в составе комитета, включающего искусственную иммунную систему, многослойный персептрон, алгоритм случайного леса. Выбор этих классификаторов обусловлен их высокой эффективностью решения задач классификации, а также способностью искусственной иммунной системы обнаруживать неизвестные сетевые атаки. Решение принимается в результате вывода каждого эксперта (классификатора) на основе голосования. В соответствии с теорией присяжных Кондорсе такой подход обеспечивает более точный результат. Для проведения вычислительных экспериментов по оценке эффективности предлагаемой системы использовался набор данных сетевых соединений NSL-KDD. Результаты экспериментов демонстрируют высокую эффективность предлагаемой гибридной системы обнаружения атак на основе комитета классификаторов.</p>
      </abstract>
      <trans-abstract xml:lang="en">
        <p>The issues of detecting network attacks to Industrial Internet of Things (IIoT) systems are analyzed. Existing approaches for detecting such attacks based on the use of artificial intelligence methods are considered. The high interest to integration of machine learning and artificial intelligence methods as a part of hybrid systems is emphasized. Such integration makes it possible to compensate the shortcomings of some algorithms due to the advantages of others. The goal of this research is to improve the efficiency of network attacks detection. The paper proposes the implementation of a multi-level hybrid attack detection system on the basis of combining several classifiers in the committee including the artificial immune system, the multilayer perceptron, and the random forest algorithm. The choice of these classifiers is due to their high classification efficiency and the ability of artificial immune system to detect unknown network attacks. The decision is made on the basis of the conclusion of each expert (classifiers) with the use of voting mechanism. Such approach provides more accurate result in accordance with the Condorcet's jury theorem. To carry out computational experiments for assessing the effectiveness of the proposed system, the NSL-KDD network traffic data set was employed. The results of experiments carried out demonstrate the high efficiency of the proposed hybrid attack detection system based on use of classifiers committee.</p>
      </trans-abstract>
      <kwd-group xml:lang="ru">
        <kwd>информационная безопасность</kwd>
        <kwd>промышленный Интернет вещей</kwd>
        <kwd>система обнаружения атак</kwd>
        <kwd>сетевая атака</kwd>
        <kwd>NSL-KDD</kwd>
      </kwd-group>
      <kwd-group xml:lang="en">
        <kwd>information security</kwd>
        <kwd>Industrial Internet of Things</kwd>
        <kwd>intrusion detection system</kwd>
        <kwd>network attack</kwd>
        <kwd>NSL-KDD dataset</kwd>
      </kwd-group>
      <funding-group>
        <funding-statement xml:lang="ru">Работа выполнена при поддержке грантов РФФИ №20-37-90024 и №20-08-00668.</funding-statement>
        <funding-statement xml:lang="en">The study was performed without external funding.</funding-statement>
      </funding-group>
    </article-meta>
  </front>
  <back>
    <ref-list>
      <title>References</title>
      <ref id="cit1">
        <label>1</label>
        <mixed-citation xml:lang="ru">1.	Threat Intelligence Report 2020. NOKIA. Доступно по: https://pages.nokia.com/T005JU-Threat-Intelligence-Report-2020.html?_ga=2.216248470.16 53315497.1608038999-829562352.1608038999 (дата обращения: 23.09.2021).</mixed-citation>
      </ref>
      <ref id="cit2">
        <label>2</label>
        <mixed-citation xml:lang="ru">2.	Что угрожает промышленному интернету вещей и как от этого защититься. Kaspersky Lab, Vc.ru. Kaspersky Lab, Vc.ru. Доступно по: https://vc.ru/kaspersky/265770-chto-ugrozhaet-promyshlennomu-internetu-veshchey-i-kak-ot-etogo-zashchititsya (дата обращения: 23.09.2021).</mixed-citation>
      </ref>
      <ref id="cit3">
        <label>3</label>
        <mixed-citation xml:lang="ru">3.	Браницкий А.А., Котенко И.В. Анализ и классификация методов обнаружения сетевых атак. Труды СПИИРАН. 2016;2(45):207–244. DOI: 10.15622/sp.45.13.</mixed-citation>
      </ref>
      <ref id="cit4">
        <label>4</label>
        <mixed-citation xml:lang="ru">4.	Dobkach L. An analysis of methods for identifying computer attacks. Legal Informatics. 2020;1:67–75.</mixed-citation>
      </ref>
      <ref id="cit5">
        <label>5</label>
        <mixed-citation xml:lang="ru">5.	ICT219 Lecture 11 – Hybrid Intelligent Systems. StuDocu. Доступно по: https://www.studocu.com/en-au/document/murdoch-university/intelligent-systems/ict219-lecture-11-hybrid-intelligent-systems/1280311 (дата обращения: 23.09.2021).</mixed-citation>
      </ref>
      <ref id="cit6">
        <label>6</label>
        <mixed-citation xml:lang="ru">6.	Аверкин А.А., Ярушев С.А., Павлов В.У. Когнитивные гибридные системы поддержки принятия решений и прогнозирования. Программные продукты и системы. 2017;4(30):632–642. DOI: 10.15827/0236-235X.120.632-642.</mixed-citation>
      </ref>
      <ref id="cit7">
        <label>7</label>
        <mixed-citation xml:lang="ru">7.	Lin L. An intelligent fault diagnosis model of WSN based on artificial immune system. 2020 5th International Conference on Smart Grid and Electrical Automation (ICSGEA). 2020:405–408. DOI: 10.1109/ICSGEA51094.2020.00093.</mixed-citation>
      </ref>
      <ref id="cit8">
        <label>8</label>
        <mixed-citation xml:lang="ru">8.	Dounias G. Hybrid computational intelligence in medicine. Доступно по: http://citeseerx.ist.psu.edu/viewdoc/download;jsessionid=EE461823CC470C45FC8909C60AC93956?doi=10.1.1.71.6170&amp;rep=rep1&amp;type=pdf (дата обращения: 25.07.2021).</mixed-citation>
      </ref>
      <ref id="cit9">
        <label>9</label>
        <mixed-citation xml:lang="ru">9.	Panda M., Abraham A., Patra M.R. Hybrid intelligent systems for detecting network intrusions. Security and Communication Networks. 2012;8(16). Доступно по: https://www.researchgate.net/publication/260408971_Hybrid_intelligent_systems_for_detecting_network_intrusions. DOI: 10.1002/sec.592 (дата обращения: 15.08.2021).</mixed-citation>
      </ref>
      <ref id="cit10">
        <label>10</label>
        <mixed-citation xml:lang="ru">10.	Salama M.A., Ramadan R., Darwish A., Eid H.F. Hybrid intelligent intrusion detection scheme. Advances in Intelligent and Soft Computing. 2011;96:295–302. DOI: 10.1007/978-3-642-20505-7_26.</mixed-citation>
      </ref>
      <ref id="cit11">
        <label>11</label>
        <mixed-citation xml:lang="ru">11.	Khan M.A., Kim Y. Deep learning-based hybrid intelligent intrusion detection system. Computers, Materials &amp; Continua. 2021;1(68):671–687. DOI: 10.32604/cmc.2021.015647.</mixed-citation>
      </ref>
      <ref id="cit12">
        <label>12</label>
        <mixed-citation xml:lang="ru">12.	Panda M., Abraham A., Patrac M.R. A hybrid intelligent approach for network intrusion detection. Procedia Engineering. 2012;30:1–9. DOI: 10.1016/j.proeng.2012.01.827.</mixed-citation>
      </ref>
      <ref id="cit13">
        <label>13</label>
        <mixed-citation xml:lang="ru">13.	Chavez A., Lai C., Jacobs N., Hossain-McKenzie S., Jones C.B., Johnson J., Summers A. Hybrid intrusion detection system design for distributed energy resource systems. IEEE CyberPELS; 2019. Доступно по: https://ieeexplore.ieee.org/document/8925064 (дата обращения: 28.07.2021).</mixed-citation>
      </ref>
      <ref id="cit14">
        <label>14</label>
        <mixed-citation xml:lang="ru">14.	Alem S., Espes D., Martin E., Nana L., De Lamotte F. A Hybrid Intrusion Detection System in Industry 4.0 Based on ISA95 Standard.  2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA), 2019:1–8, DOI: 10.1109/AICCSA47632.2019.9035260.</mixed-citation>
      </ref>
      <ref id="cit15">
        <label>15</label>
        <mixed-citation xml:lang="ru">15.	Alaparthy V., Morgera S. A multi-level intrusion detection system for wireless sensor networks based on immune theory. IEEE Access. 2018;6:47364–47373. DOI: 10.1109/ACCESS.2018.2866962.</mixed-citation>
      </ref>
      <ref id="cit16">
        <label>16</label>
        <mixed-citation xml:lang="ru">16.	Xiao X., Zhang R. A danger theory inspired protection approach for hierarchical wireless sensor networks. KSII Transactions on Internet and Information Systems. 2019;5(13):2732-2753.</mixed-citation>
      </ref>
      <ref id="cit17">
        <label>17</label>
        <mixed-citation xml:lang="ru">17.	Aldhaheri S., Alghazzawi D., Cheng L., Alzahrani B., Al-Barakat A., DeepDCA: novel network-based detection of IoT attacks using artificial immune system. Applied Sciences. 2020;10:1909–1932.</mixed-citation>
      </ref>
      <ref id="cit18">
        <label>18</label>
        <mixed-citation xml:lang="ru">18.	Powers S.T., He J. A hybrid artificial immune system and Self Organising Map for network intrusion detection. Information Sciences. 2008;178(15):3024–3042. DOI: 10.1016/j.ins.2007.11.028.</mixed-citation>
      </ref>
      <ref id="cit19">
        <label>19</label>
        <mixed-citation xml:lang="ru">19.	Nguyen V.T., Dung L.H., Le T.D. A combination of artificial immune system and deep learning for virus detection. International Journal of Applied Engineering Research. 2018;13(22):15622–15628.</mixed-citation>
      </ref>
      <ref id="cit20">
        <label>20</label>
        <mixed-citation xml:lang="ru">20.	Mahboubian M., Hamid N.A.W.A. A machine learning based AIS IDS. International Journal of Machine Learning and Computing. 2013;3(3):259–262.</mixed-citation>
      </ref>
      <ref id="cit21">
        <label>21</label>
        <mixed-citation xml:lang="ru">21.	Vaitsekhovich L. Intrusion detection in TCP/IP networks using immune systems paradigm and neural network detectors. XI International PhD Workshop OWD. 2009:219–224. Доступно по: https://www.researchgate.net/publication/306194779_Intrusion_detectio n_in_TCPIP_networks_using_immune_systems_paradigm_and_neural_network_detectors (дата обращения: 25.08.2021).</mixed-citation>
      </ref>
      <ref id="cit22">
        <label>22</label>
        <mixed-citation xml:lang="ru">22.	Komar M., Golovko V., Sachenko A., Bezobrazov S. Development of neural network immune detectors for computer attacks recognition and classification. 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS). 2013:665-668. DOI: 10.1109/IDAACS.2013.6663008.</mixed-citation>
      </ref>
      <ref id="cit23">
        <label>23</label>
        <mixed-citation xml:lang="ru">23.	Golovko V., Komar M., Sachenko A., Principles of neural network artificial immune system design to detect attacks on computers. International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET). 2010:237–237. Доступно по: https://ieeexplore.ieee.org/document/5446089 (дата обращения: 12.08.2021).</mixed-citation>
      </ref>
      <ref id="cit24">
        <label>24</label>
        <mixed-citation xml:lang="ru">24.	Сухов В.Е. Система обнаружения аномалий сетевого трафика на основе искусственных иммунных систем и нейросетевых детекторов. Вестник Рязанского государственного радиотехнического университета. 2015;54-1:84–90.</mixed-citation>
      </ref>
      <ref id="cit25">
        <label>25</label>
        <mixed-citation xml:lang="ru">25.	Khang M.T., Nguyen V.T., Le T.D. A combination of artificial neural network and artificial immune system for virus detection. Journal on Electronics and Communications. 2015;(5)3-4:52–57. DOI: 10.21553/rev-jec.133.</mixed-citation>
      </ref>
      <ref id="cit26">
        <label>26</label>
        <mixed-citation xml:lang="ru">26.	Estlund D.M. Opinion leaders, independence, and Condorcet's Jury Theorem. Theory and Decision. 1994;36:131–162. DOI: 10.1007/BF01079210.</mixed-citation>
      </ref>
      <ref id="cit27">
        <label>27</label>
        <mixed-citation xml:lang="ru">27.	Combining multiple learners, Lecture Notes for E Alpaydın 2004 Introduction to Machine Learning, The MIT Press (V1.1). Доступно по: http://people.sabanciuniv.edu/berrin/cs512/lectures/9-i2ml-chap15-classifier-combination-short.pdf (дата обращения: 24.09.2021).</mixed-citation>
      </ref>
      <ref id="cit28">
        <label>28</label>
        <mixed-citation xml:lang="ru">28.	Le T.-T.-H., Park T., Cho D., Kim H. An effective classification for DoS attacks in wireless sensor networks. 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN). 2018:689–692. DOI: 10.1109/ICUFN.2018.8436999.</mixed-citation>
      </ref>
      <ref id="cit29">
        <label>29</label>
        <mixed-citation xml:lang="ru">29.	Alsulaimanand L., Al-Ahmadi S. Performance evaluation of machine learning techniques for DoS detection in wireless sensor network. International Journal of Network Security &amp; Its Applications (IJNSA). 2021;13(2):21–29.</mixed-citation>
      </ref>
      <ref id="cit30">
        <label>30</label>
        <mixed-citation xml:lang="ru">30.	NSL-KDD. University of New Brunswick. Доступно по: https://www.unb.ca/cic/datasets/nsl.html (дата обращения: 25.09.2022).</mixed-citation>
      </ref>
      <ref id="cit31">
        <label>31</label>
        <mixed-citation xml:lang="ru">31.	Васильев В.И. Шамсутдинов Р.Р. Интеллектуальная система обнаружения сетевых атак на основе механизмов искусственной имунной системы. Моделирование, оптимизация и информационные технологии. 2019;7(1). Доступно по: https://moit.vivt.ru/wp-content/uploads/2019/01/VasilyevShamsutdinov_1_19_1.pdf. DOI: 10.26102/2310-6018/2019.24.1.010 (дата обращения: 23.09.2021).</mixed-citation>
      </ref>
      <ref id="cit32">
        <label>32</label>
        <mixed-citation xml:lang="ru">32.	Han H., Wang W.Y., Mao B.H. Borderline-SMOTE: a new over-sampling method in imbalanced data sets learning. International conference on intelligent computing, Springer, Berlin, Heidelberg. 2005:878-887.</mixed-citation>
      </ref>
    </ref-list>
    <fn-group>
      <fn fn-type="conflict">
        <p>The authors declare that there are no conflicts of interest present.</p>
      </fn>
    </fn-group>
  </back>
</article>