{"id":9896,"date":"2021-12-14T19:48:33","date_gmt":"2021-12-14T17:48:33","guid":{"rendered":"http:\/\/journals.khnu.km.ua\/vestnik\/?p=9896"},"modified":"2022-03-15T10:40:30","modified_gmt":"2022-03-15T08:40:30","slug":"kontrol-dodatkiv-internet-trafika-kompyuternyh-merezh-metodamy-mashynnogo-navchannya","status":"publish","type":"post","link":"https:\/\/journals.khnu.km.ua\/vestnik\/?p=9896","title":{"rendered":"\u041a\u043e\u043d\u0442\u0440\u043e\u043b\u044c  \u0434\u043e\u0434\u0430\u0442\u043a\u0456\u0432 \u0456\u043d\u0442\u0435\u0440\u043d\u0435\u0442-\u0442\u0440\u0430\u0444\u0456\u043a\u0430 \u043a\u043e\u043c\u043f&#8217;\u044e\u0442\u0435\u0440\u043d\u0438\u0445 \u043c\u0435\u0440\u0435\u0436 \u043c\u0435\u0442\u043e\u0434\u0430\u043c\u0438 \u043c\u0430\u0448\u0438\u043d\u043d\u043e\u0433\u043e \u043d\u0430\u0432\u0447\u0430\u043d\u043d\u044f"},"content":{"rendered":"<p><!--more--><\/p>\n<p style=\"text-align: center;\">\u041a\u041e\u041d\u0422\u0420\u041e\u041b\u042c\u00a0 \u0414\u041e\u0414\u0410\u0422\u041a\u0406\u0412 \u0406\u041d\u0422\u0415\u0420\u041d\u0415\u0422-\u0422\u0420\u0410\u0424\u0406\u041a\u0410 \u041a\u041e\u041c\u041f&#8217;\u042e\u0422\u0415\u0420\u041d\u0418\u0425 \u041c\u0415\u0420\u0415\u0416 \u041c\u0415\u0422\u041e\u0414\u0410\u041c\u0418 \u041c\u0410\u0428\u0418\u041d\u041d\u041e\u0413\u041e \u041d\u0410\u0412\u0427\u0410\u041d\u041d\u042f<\/p>\n<p style=\"text-align: center;\">CONTROL OF APPLICATIONS OF INTERNET TRAFFIC OF COMPUTER NETWORKS METHODS OF MACHINE LEARNING<\/p>\n<p><strong>\u00a0<\/strong><strong>\u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: <\/strong><strong>22-26<\/strong><strong>. \u041d\u043e\u043c\u0435\u0440: \u21165, 2021 (301)<\/strong> <a href=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/12\/301-text_2021_5_t-22-26.pdf\"> <img loading=\"lazy\" class=\"size-full wp-image-69 alignnone\" src=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/pdf.png\" alt=\"\" width=\"76\" height=\"32\" \/><\/a><br \/>\n<strong>\u00a0<\/strong><strong>\u0410\u0432\u0442\u043e\u0440\u0438:<\/strong><br \/>\n\u0414\u0416\u0423\u041b\u0406\u0419 \u0412.\u041c.<br \/>\n\u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\nORCID <a href=\"http:\/\/orcid.org\/0000-0003-1878-4301\">http:\/\/orcid.org\/0000-0003-1878-4301<\/a><br \/>\ne-mail:dg2303@ukr.net<br \/>\n\u041a\u041b\u042c\u041e\u0426 \u042e.\u041f.<br \/>\n\u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\nORCID https:\/\/orcid.org\/0000-0002-3914-0989<br \/>\ne-mail:sprklyots@gmail.com<br \/>\n\u041c\u0423\u041b\u042f\u0420 \u0406.\u0412.<br \/>\n\u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\nORCID <a href=\"http:\/\/orcid.org\/0000-0002-6659-605X\">http:\/\/orcid.org\/0000-0002-6659-605X<\/a><br \/>\ne-mail:iga2000@yahoo.com<br \/>\n\u0416\u0418\u041b\u0415\u0412\u0418\u0427 \u041c.\u041b.<br \/>\n\u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\ne-mail:dg2303@ukr.net<br \/>\n\u0414\u0416\u0423\u041b\u0406\u0419 \u0410.\u0412.<br \/>\n\u0423\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442 \u0435\u043a\u043e\u043d\u043e\u043c\u0456\u043a\u0438 \u0456 \u043f\u0456\u0434\u043f\u0440\u0438\u0454\u043c\u043d\u0438\u0446\u0442\u0432\u0430, \u043c.\u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439<br \/>\nORCID ID: 0000-0001-5011-3052<br \/>\ne-mail: kksmkhnu@gmail.com<br \/>\nDzhuliy Volodymyr M., Klyots Yurii P., Mulyar Ihor V.,\u00a0 Zhilevich Mykhailo L.<br \/>\nKhmelnytskyi National University<br \/>\nDzhuliy Andrii V.<br \/>\nUniversity of Economics and Entrepreneurship, Khmelnytsky, Ukraine<br \/>\n<strong>DOI:<\/strong> <a href=\"https:\/\/www.doi.org\/10.31891\/2307-5732-2021-301-5-22-26\">https:\/\/www.doi.org\/10.31891\/2307-5732-2021-301-5-22-26<\/a><br \/>\n<strong>\u0420\u0435\u0446\u0435\u043d\u0437\u0456\u044f\/Peer review <\/strong>: 17.09.2021\u0440.<br \/>\n<strong>\u041d\u0430\u0434\u0440\u0443\u043a\u043e\u0432\u0430\u043d\u0430\/Printed :<\/strong> 10.10.2021 \u0440.<\/p>\n<p style=\"text-align: center;\"><strong>\u0410\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u043c\u043e\u0432\u043e\u044e \u043e\u0440\u0438\u0433\u0456\u043d\u0430\u043b\u0443<\/strong><\/p>\n<p>\u0420\u043e\u0437\u0433\u043b\u044f\u043d\u0443\u0442\u043e \u0430\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u0435 \u0437\u0430\u0432\u0434\u0430\u043d\u043d\u044f \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044e \u0434\u043e\u0441\u0442\u0443\u043f\u0443 \u0434\u043e \u0406\u043d\u0442\u0435\u0440\u043d\u0435\u0442-\u0440\u0435\u0441\u0443\u0440\u0441\u0456\u0432 \u043c\u0430\u0454 \u0432\u0430\u0436\u043b\u0438\u0432\u0435 \u043f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u0435 \u0437\u043d\u0430\u0447\u0435\u043d\u043d\u044f: \u0431\u043b\u043e\u043a\u0443\u0432\u0430\u043d\u043d\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0443 \u0434\u043e \u043d\u0435\u043b\u0435\u0433\u0430\u043b\u044c\u043d\u043e\u0457, \u0435\u043a\u0441\u0442\u0440\u0435\u043c\u0456\u0441\u0442\u0441\u044c\u043a\u043e\u0457, \u0430\u043d\u0442\u0438\u0441\u043e\u0446\u0456\u0430\u043b\u044c\u043d\u043e\u0457 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457, \u0437\u0430\u043f\u043e\u0431\u0456\u0433\u0430\u043d\u043d\u044f \u0440\u043e\u0437\u0433\u043e\u043b\u043e\u0448\u0435\u043d\u043d\u044e \u043a\u043e\u043d\u0444\u0456\u0434\u0435\u043d\u0446\u0456\u0439\u043d\u043e\u0457 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457 \u0447\u0435\u0440\u0435\u0437 \u0406\u043d\u0442\u0435\u0440\u043d\u0435\u0442 \u0442\u0430 \u0456\u043d. \u0414\u043b\u044f \u0432\u0438\u0440\u0456\u0448\u0435\u043d\u043d\u044f \u043f\u043e\u0434\u0456\u0431\u043d\u0438\u0445 \u0437\u0430\u0432\u0434\u0430\u043d\u044c \u0448\u0438\u0440\u043e\u043a\u043e\u0433\u043e \u043f\u043e\u0448\u0438\u0440\u0435\u043d\u043d\u044f \u043d\u0430\u0431\u0443\u043b\u0438 \u043c\u0435\u0442\u043e\u0434\u0438 \u043c\u0430\u0448\u0438\u043d\u043d\u043e\u0433\u043e \u043d\u0430\u0432\u0447\u0430\u043d\u043d\u044f. \u041e\u0434\u043d\u0438\u043c \u0437 \u043d\u0430\u0439\u0431\u0456\u043b\u044c\u0448 \u0447\u0430\u0441\u0442\u043e \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u043e\u0432\u0443\u0432\u0430\u043d\u0438\u0445 \u0456 \u0435\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u0438\u0445 \u0434\u043b\u044f \u043a\u043b\u0430\u0441\u0438\u0444\u0456\u043a\u0430\u0446\u0456\u0457 \u043c\u0435\u0440\u0435\u0436\u0435\u0432\u043e\u0433\u043e \u0442\u0440\u0430\u0444\u0456\u043a\u0430 \u043c\u0435\u0442\u043e\u0434\u0456\u0432 \u043c\u0430\u0448\u0438\u043d\u043d\u043e\u0433\u043e \u043d\u0430\u0432\u0447\u0430\u043d\u043d\u044f \u0454 \u00ab\u0432\u0438\u043f\u0430\u0434\u043a\u043e\u0432\u0438\u0439 \u043b\u0456\u0441\u00bb (Random Forest), \u0449\u043e \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0454 \u0441\u043e\u0431\u043e\u044e \u0430\u043d\u0441\u0430\u043c\u0431\u043b\u0435\u0432\u0438\u0439 \u043c\u0435\u0442\u043e\u0434, \u044f\u043a\u0438\u0439 \u0434\u0456\u0454 \u0448\u043b\u044f\u0445\u043e\u043c \u043f\u043e\u0431\u0443\u0434\u043e\u0432\u0438 \u043c\u043d\u043e\u0436\u0438\u043d\u0438 \u0432\u0438\u0440\u0456\u0448\u0430\u043b\u044c\u043d\u0438\u0445 \u0434\u0435\u0440\u0435\u0432. \u0414\u043b\u044f \u043e\u0446\u0456\u043d\u043a\u0438 \u0435\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0456 \u0440\u043e\u0431\u043e\u0442\u0438 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u0443 Random Forest \u043f\u0440\u0438 \u043a\u043b\u0430\u0441\u0438\u0444\u0456\u043a\u0430\u0446\u0456\u0457 \u043c\u0435\u0440\u0435\u0436\u0435\u0432\u043e\u0433\u043e \u0442\u0440\u0430\u0444\u0456\u043a\u0430 \u0437\u0430 \u0442\u0438\u043f\u0430\u043c\u0438 \u043f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u0438\u0445 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0456\u0432, \u0449\u043e \u043f\u0440\u0430\u0446\u044e\u044e\u0442\u044c \u0432 \u043c\u0435\u0440\u0435\u0436\u0456 \u0406\u043d\u0442\u0435\u0440\u043d\u0435\u0442, \u0431\u0443\u0432 \u0437\u0434\u0456\u0439\u0441\u043d\u0435\u043d\u0438\u0439 \u0437\u0431\u0456\u0440 \u0442\u0440\u0430\u0444\u0456\u043a\u0430 \u0432 \u043c\u0435\u0440\u0435\u0436\u0456. \u0414\u043e\u0441\u043b\u0456\u0434\u0436\u0443\u0432\u0430\u043b\u0438\u0441\u044f \u0434\u043e\u0434\u0430\u0442\u043a\u0438, \u044f\u043a\u0456 \u0433\u0435\u043d\u0435\u0440\u0443\u044e\u0442\u044c \u043f\u0430\u043a\u0435\u0442\u0438, \u0449\u043e \u0432\u0456\u0434\u043d\u043e\u0441\u044f\u0442\u044c\u0441\u044f \u0434\u043e \u0440\u0456\u0437\u043d\u0438\u0445 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0456\u0432 \u043f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0433\u043e \u0440\u0456\u0432\u043d\u044f: BitTorrent, DNS, HTTP, SSL, Skype, Steam. \u041f\u0456\u0441\u043b\u044f \u0432\u0456\u0434\u0431\u043e\u0440\u0443 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0438\u0445 \u043e\u0437\u043d\u0430\u043a \u0456 \u043f\u043e\u043f\u0435\u0440\u0435\u0434\u043d\u044c\u043e\u0457 \u043e\u0431\u0440\u043e\u0431\u043a\u0438 \u0434\u0430\u043d\u0438\u0445 \u0441\u0444\u043e\u0440\u043c\u043e\u0432\u0430\u043d\u0456 \u043d\u0430\u0432\u0447\u0430\u043b\u044c\u043d\u0430 \u0456 \u0442\u0435\u0441\u0442\u043e\u0432\u0430 \u0432\u0438\u0431\u0456\u0440\u043a\u0438, \u043e\u0434\u043d\u0430 \u0437 \u044f\u043a\u0438\u0445 \u043c\u0456\u0441\u0442\u0438\u043b\u0430 \u0444\u043e\u043d\u043e\u0432\u0438\u0439 \u0442\u0440\u0430\u0444\u0456\u043a. \u0412 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0456 \u0437\u0430\u0441\u0442\u043e\u0441\u0443\u0432\u0430\u043d\u043d\u044f \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u0443 \u043a\u043b\u0430\u0441\u0438\u0444\u0456\u043a\u0430\u0446\u0456\u0457 Random Forest \u0434\u043e \u043e\u0442\u0440\u0438\u043c\u0430\u043d\u0438\u0445 \u0434\u0430\u043d\u0438\u0445 \u0437\u043d\u0430\u0439\u0434\u0435\u043d\u0456 \u043e\u0446\u0456\u043d\u043a\u0438 \u0435\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0456 \u0440\u043e\u0431\u043e\u0442\u0438 \u0434\u0430\u043d\u043e\u0433\u043e \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u0443 \u0432 \u0443\u043c\u043e\u0432\u0430\u0445 \u043d\u0430\u044f\u0432\u043d\u043e\u0441\u0442\u0456 \u0456 \u0432\u0456\u0434\u0441\u0443\u0442\u043d\u043e\u0441\u0442\u0456 \u0444\u043e\u043d\u043e\u0432\u043e\u0433\u043e \u043c\u0435\u0440\u0435\u0436\u0435\u0432\u043e\u0433\u043e \u0442\u0440\u0430\u0444\u0456\u043a\u0443.<br \/>\n<strong>\u041a\u043b\u044e\u0447\u043e\u0432\u0456 \u0441\u043b\u043e\u0432\u0430:<\/strong> \u043c\u043e\u0434\u0435\u043b\u0456, \u0435\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u0456\u0441\u0442\u044c, \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u0438, \u043c\u0435\u0440\u0435\u0436\u0435\u0432\u0438\u0439 \u0442\u0440\u0430\u0444\u0456\u043a, \u0432\u0438\u0440\u0456\u0448\u0430\u043b\u044c\u043d\u0456 \u0434\u0435\u0440\u0435\u0432\u0430, \u043c\u0430\u0448\u0438\u043d\u043d\u0435 \u043d\u0430\u0432\u0447\u0430\u043d\u043d\u044f, \u0444\u043e\u043d\u043e\u0432\u0438\u0439 \u0442\u0440\u0430\u0444\u0456\u043a.<\/p>\n<p style=\"text-align: center;\"><strong>\u00a0<\/strong><strong>\u0420\u043e\u0437\u0448\u0438\u0440\u0435\u043d\u0430 \u0430\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u0430\u043d\u0433\u043b\u0456\u0439\u0441\u044c\u043a\u043e\u044e \u043c\u043e\u0432\u043e\u044e<\/strong><\/p>\n<p>The considered actual problem of controlling access to Internet resources has an important applied value: blocking access to illegal, extremist, antisocial information, preventing the disclosure of confidential information via the Internet, etc. For the development of a wide range of enterprises, the methods of machine technology have been developed. One of the most frequently victorious and effective methods for the classification of hedgehog traffic is the Random Forest, an ensemble method, which is a kind of tree path to inspire a multitude of virgins. To assess the effectiveness of the Random Forest algorithm in the classification of network traffic by types of application protocols operating on the Internet, the collection of network traffic was performed. Applications that generate packets related to different application layer protocols were studied: BitTorrent, DNS, HTTP, SSL, Skype, Steam. After selection of information features and preliminary data processing, training and test samples were formed, one of which contained background traffic. As a result of applying the Random Forest classification algorithm to the obtained data, estimates of the efficiency of this algorithm in the presence and absence of background network traffic were found. The presence of background traffic belonging to classes that did not participate in the training of the algorithm significantly impairs the accuracy of classification. It is shown that the number of attributes for traffic classification is not as important as the choice of classification algorithms. The results of the classification at the testing stage showed that the machine learning algorithms using the &#8220;decision trees&#8221; Random Forest and C4.5 are best suited for classification with a large number of classes. Classification accuracy indicators using AdaBoost and Bagging suggest that in most cases, combining multiple classifiers into an ensemble and making a decision based on &#8220;voting&#8221; can improve the results of the classification. To achieve classification accuracy, it is sufficient to calculate the classification attributes for a sample containing 5 &#8230;. 10 consecutive packets. Accuracy can be improved to 99% and higher if the statistics were calculated on the basis of 35 consecutive packets.<br \/>\n<strong>Keywords:<\/strong> models, efficiency, algorithms, network traffic, decision trees, machine learning, background traffic.<\/p>\n<p style=\"text-align: center;\"><strong>References<\/strong><\/p>\n<ol>\n<li>Sheluhin O.I. Setevye anomalii. Obnaruzhenie, lokalizaciya, prognozirovanie \/ O.I. Sheluhin. \u2013 M. : Goryachaya liniya -Telekom, 2019. \u2013 448 s.<\/li>\n<li>Sheluhin O.I. Klassifikaciya IP-trafika metodami mashinnogo obucheniya \/ O.I. Sheluhin, S.D. Erohin. \u2013 M. : Goryachaya liniya -Telekom, 2018. \u2013 284 s.<\/li>\n<li>Baturin Yu.M. Kompyuternaya prestupnost i kompyuternaya bezopasnost \/ Yu.M. Baturin, A.M. Zhodzinskij. \u2013 M. : Yuridicheskaya literatura, 2006. \u2013 160 s.<\/li>\n<li>Nesterov S.A. Osnovy informacionnoj bezopasnosti : uchebnik \/ S. A. Nesterov. \u2013 SPb : Lan, 2017. \u2013 423 s.<\/li>\n<li>Olifer V.G. Bezopasnost kompyuternyh setej \/ V. G. Olifer, N. A. Olifer. \u2013 M. : Goryachaya liniya-Telekom, 2017. \u2013 644 s.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[58],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/9896"}],"collection":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=9896"}],"version-history":[{"count":8,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/9896\/revisions"}],"predecessor-version":[{"id":11084,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/9896\/revisions\/11084"}],"wp:attachment":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=9896"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=9896"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=9896"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}