M. Komarov, N. Zaika, I. Martinyk
Èlektron. model. 2026, 48(1):87-98
https://doi.org/10.15407/emodel.48.01.087
ABSTRACT
The application of artificial intelligence and machine learning technologies for ensuring the cybersecurity of critical information infrastructure objects has been researched. A methodology for training machine learning models for the detection and classification of cyber incidents has been developed and generalized. Approaches to the formulation of a family of models and methods for representing events in a multidimensional feature space have been considered. The use of linear decision boundaries and logistic (sigmoid) functions for estimating the probability of fraudulent events is described. Loss functions for classification and regression tasks are analyzed, in particular, the sum of squared errors and negative logarithmic likelihood. First- and second-order optimization algorithms are researched, including gradient descent, stochastic gradient descent, and its variations of AdaGrad and Adam. The principle of the gradient descent method is demonstrated, and practical recommendations are given for selecting optimization algorithms depending on the type of task and data size. An example of the proposed methodology application for analyzing transactions in the energy sector to detect fraud is given.
KEYWORDS
artificial intelligence, machine learning, cybersecurity, critical information infrastructure, classification, loss function, optimization, gradient descent.
REFERENCES
- Komarov M.Yu., Honchar S.F., Dmytriieva D.O. (2021). Research on the Problem of Cyber Resilience of Critical Information Infrastructure Objects. Nuclear and Radiation Safety, 1(89), pp. 59-66.
https://doi.org/10.32918/nrs.2021.1(89).07 - Komarov M.Yu., Honchar S.F. (2021). The Relevance of Ensuring Cyber Resilience of Energy Sector Facilities. Energy Security in the Era of Digital Transformation. In Proceedings of the 3rd Scientific and Practical Conference December 22, 2021, p. 79.
- Meltdown and Spectre. Graz University of Technology, accessed January 23, 2018. https://spec-treattack.com/.
- Komarov M., Davydiuk A., Onyskova A., Tkachenko V., Honchar S. (2021) Requirements for a Taxonomy of Cyber Threats of Critical Infrastructure Facilities and an Analysis of Existing Approaches. In: Zaporozhets A., Artemchuk V. (eds) Systems, Decision and Control in Energy II. Studies in Systems, Decision and Control, vol 346. Springer, Cham. 22 March 2021.
https://doi.org/10.1007/978-3-030-69189-9_11 - Clarence Chio and David Freeman “Machine Learning and Security” — OʼReilly, 2020, 388 p. https://scikit-learn.org/stable/.
- Rong-En Fan et al. LIBLINEAR: A Library for Large Linear Classification. Journal of Machine Learning Research 9 (2008): 1871-1874.
- Francis Bach. Stochastic Optimization: Beyond Stochastic Gradients and Convexity. INRIA Ecole Normale Supérieure, Paris, France. Joint tutorial with Suvrit Sra, MIT—NIPS, 2016.
- Stephen Boyd et al. (2011). Distributed Optimization and Statistical Learning via the Alternating Direction Method of Multipliers. Foundations and Trends in Machine Learning 3. Р. 1-122.
https://doi.org/10.1561/2200000016