<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article
PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20190208//EN"
       "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="research-article" dtd-version="1.4" xml:lang="en">
 <front>
  <journal-meta>
   <journal-id journal-id-type="publisher-id">Modeling of systems and processes</journal-id>
   <journal-title-group>
    <journal-title xml:lang="en">Modeling of systems and processes</journal-title>
    <trans-title-group xml:lang="ru">
     <trans-title>Моделирование систем и процессов</trans-title>
    </trans-title-group>
   </journal-title-group>
   <issn publication-format="print">2219-0767</issn>
  </journal-meta>
  <article-meta>
   <article-id pub-id-type="publisher-id">105271</article-id>
   <article-id pub-id-type="doi">10.12737/2219-0767-2025-18-3-114-120</article-id>
   <article-categories>
    <subj-group subj-group-type="toc-heading" xml:lang="ru">
     <subject>Технические науки</subject>
    </subj-group>
    <subj-group subj-group-type="toc-heading" xml:lang="en">
     <subject></subject>
    </subj-group>
    <subj-group>
     <subject>Технические науки</subject>
    </subj-group>
   </article-categories>
   <title-group>
    <article-title xml:lang="en">Construction of a mathematical model of the neural network learning process to control the security against cyber attacks</article-title>
    <trans-title-group xml:lang="ru">
     <trans-title>Применение математических моделей процесса обучения нейронной сети для контроля защищённости от кибератак</trans-title>
    </trans-title-group>
   </title-group>
   <contrib-group content-type="authors">
    <contrib contrib-type="author">
     <name-alternatives>
      <name xml:lang="ru">
       <surname>Титов</surname>
       <given-names>Михаил Юрьевич</given-names>
      </name>
      <name xml:lang="en">
       <surname>Titov</surname>
       <given-names>Mihail Yur'evich</given-names>
      </name>
     </name-alternatives>
     <email>mtitov_u@list.ru</email>
     <bio xml:lang="ru">
      <p>кандидат технических наук;</p>
     </bio>
     <bio xml:lang="en">
      <p>candidate of technical sciences;</p>
     </bio>
     <xref ref-type="aff" rid="aff-1"/>
    </contrib>
    <contrib contrib-type="author">
     <name-alternatives>
      <name xml:lang="ru">
       <surname>Скворцова</surname>
       <given-names>Татьяна Владимировна</given-names>
      </name>
      <name xml:lang="en">
       <surname>Skvortsova</surname>
       <given-names>Tatyana Vladimirovna</given-names>
      </name>
     </name-alternatives>
     <xref ref-type="aff" rid="aff-2"/>
    </contrib>
   </contrib-group>
   <aff-alternatives id="aff-1">
    <aff>
     <institution xml:lang="ru">РТУ МИРЭА</institution>
     <city>Москва</city>
     <country>Россия</country>
    </aff>
    <aff>
     <institution xml:lang="en">РТУ МИРЭА</institution>
     <city>Москва</city>
     <country>Russian Federation</country>
    </aff>
   </aff-alternatives>
   <aff-alternatives id="aff-2">
    <aff>
     <institution xml:lang="ru">Воронежский государственный лесотехнический университет имени Г.Ф. Морозова</institution>
    </aff>
    <aff>
     <institution xml:lang="en">Voronezh State University of Forestry and Technologies named after G.F. Morozov</institution>
    </aff>
   </aff-alternatives>
   <pub-date publication-format="print" date-type="pub" iso-8601-date="2025-10-10T00:00:00+03:00">
    <day>10</day>
    <month>10</month>
    <year>2025</year>
   </pub-date>
   <pub-date publication-format="electronic" date-type="pub" iso-8601-date="2025-10-10T00:00:00+03:00">
    <day>10</day>
    <month>10</month>
    <year>2025</year>
   </pub-date>
   <volume>18</volume>
   <issue>3</issue>
   <fpage>114</fpage>
   <lpage>120</lpage>
   <history>
    <date date-type="received" iso-8601-date="2025-10-10T00:00:00+03:00">
     <day>10</day>
     <month>10</month>
     <year>2025</year>
    </date>
   </history>
   <self-uri xlink:href="https://naukaru.ru/en/nauka/article/105271/view">https://naukaru.ru/en/nauka/article/105271/view</self-uri>
   <abstract xml:lang="ru">
    <p>В статье речь идет о применении математических моделей процесса обучения нейронной сети, позволяющей обеспечить требуемую защиту системы информационного обмена (СИО) объектов критической информационной инфраструктуры (КИИ). Приведен анализ моделей различных типов кибератак на основе применения аппарата математической статистики. Определено, что для контроля защищённости СИО объектов КИИ случайные кибератаки являются основополагающим элементом процесса обучения нейронной сети. Приведено обоснование необходимости выявления случайных кибератак до выхода параметров безопасности за пределы предупредительного допуска.  Установлено, что для определения параметров безопасности целесообразно использовать характеристики внешних программных запросов. Затронут вопрос об оптимизации нейросетевых моделей.</p>
   </abstract>
   <trans-abstract xml:lang="en">
    <p>The article deals with the application of mathematical models of the neural network learning process, which makes it possible to ensure the required protection of the information exchange system (IES) of critical information infrastructure objects (CIIO). Presented the analysis of models of various types of cyber attacks. It is determined that random cyber attacks are a fundamental element of the neural network learning process to control the security of IES CIIO. The rationale for the need to identify accidental cyber attacks before the security parameters exceed the warning tolerance is given. It has been established that it is advisable to use the characteristics of external program requests to determine security parameters. An approach to determining the fundamental expediency of using neural network tools for assessing security parameters is considered. The issue of optimization of neural network models is raised.</p>
   </trans-abstract>
   <kwd-group xml:lang="ru">
    <kwd>система информационного обмена</kwd>
    <kwd>кибератаки</kwd>
    <kwd>нейронные сети</kwd>
    <kwd>объекты критической информационной инфраструктуры</kwd>
   </kwd-group>
   <kwd-group xml:lang="en">
    <kwd>information exchange system</kwd>
    <kwd>cyber attacks</kwd>
    <kwd>neural network</kwd>
    <kwd>critical information infrastructure objects.</kwd>
   </kwd-group>
  </article-meta>
 </front>
 <body>
  <p></p>
 </body>
 <back>
  <ref-list>
   <ref id="B1">
    <label>1.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Щеглов К.А., Щеглов А.Ю. Надежность информационной безопасности. основные понятия и постановка задачи моделирования // Вопросы защиты информации. - 2017. - № 1 (116). - С. 27-35.</mixed-citation>
     <mixed-citation xml:lang="en">Shcheglov K.A., Shcheglov A.Y. Reliability of information security. basic concepts and formulation of the modeling problem // Information security issues. - 2017. - № 1 (116). - Pp. 27-35.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B2">
    <label>2.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Орлов А. И. Высокие статистические технологи / А. И. Орлов // Заводская лаборатория. - 2003. - Т. 69, №11. - С. 55-60.</mixed-citation>
     <mixed-citation xml:lang="en">Orlov A. I. High statistical technologists / A. I. Orlov // Factory Laboratory. - 2003. - Vol. 69, No. 11. - pp. 55-60.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B3">
    <label>3.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Орлов А. И. Прикладная статистика. - М.: КноРус, 2015.. - 656 с.</mixed-citation>
     <mixed-citation xml:lang="en">Orlov A. I. Applied Statistics, Moscow: KnoRus, 2015.. - 656 p .</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B4">
    <label>4.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Кендалл М. Многомерный статистический анализ и временные ряды / Кендалл М., Стюарт А.; пер. с англ. - М .: Наука, 1976. - 722 с.</mixed-citation>
     <mixed-citation xml:lang="en">Kendall M. Multidimensional statistical analysis and time series / Kendall M., Stewart A.; translated from English - Moscow: Nauka, 1976. - 722 p.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B5">
    <label>5.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Шапорев С.Д. Математические методы прикладной статистики: учебное пособие; М-во образования и науки Российской Федерации, Федеральное гос. авт. образовательное учреждение высш. образования Санкт-Петербургский гос. ун-т аэрокосмического приборостроения. - Санкт-Петербург : ГУАП, 2016. - 407 с.</mixed-citation>
     <mixed-citation xml:lang="en">Shaporev S.D. Mathematical methods of applied statistics: a textbook; Ministry of Education and Science of the Russian Federation, Federal State Autonomous Educational Institution of Higher Education. St. Petersburg State University of Aerospace Engineering. - St. Petersburg : GUAP, 2016. - 407 p.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B6">
    <label>6.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Игнатов В. А. Элементы теории оптимального обслуживания технических изделий / В. А. Игнатов, Г. Г. Маньшин, В. В. Костановский. -Минск: Наука и техника, 1974. - 192 с.</mixed-citation>
     <mixed-citation xml:lang="en">Ignatov V. A. Elements of the theory of optimal maintenance of technical products / V. A. Ignatov, G. G. Manshin, V. V. Kostanovsky. Minsk: Science and Technology, 1974. 192 p.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B7">
    <label>7.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Корченко А.А. Система выявления аномального состояния в компьютерных сетях / А.А. Корченко // Безопасность. - 2012. - № 2 (18). - С. 80-84.</mixed-citation>
     <mixed-citation xml:lang="en">Korchenko A.A. A system for detecting abnormal conditions in computer networks / A.A. Korchenko // Safety. - 2012. - № 2 (18). - Pp. 80-84.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B8">
    <label>8.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Руденко О.Г. Искусственные нейронные сети. Учеб. пособие. / А.Г. Руденко, Е.В. Бодянский. - Харьков: ООО &quot;Компания СМИТ&quot;, 2016. - 404 с.</mixed-citation>
     <mixed-citation xml:lang="en">Rudenko O.G. Artificial neural networks. Textbook / A.G. Rudenko, E.V. Bodyansky.  Kharkiv: SMITH Company LLC, 2016. 404 p.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B9">
    <label>9.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Богданова Е.А. Инженерия знаний: учебное пособие; Поволжский государственный университет телекоммуникаций и информатики, Кафедра Экономических и информационных систем. - Самара : Поволжский государственный университет телекоммуникаций и информатики, 2016. – С. 93.</mixed-citation>
     <mixed-citation xml:lang="en">Bogdanova E.A. Engineering of knowledge: a textbook; Volga State University of Telecommunications and Informatics, Department of Economics and Information Systems.  Samara : Volga Region State University of Telecommunications and Informatics, 2016, p. 93.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B10">
    <label>10.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Богуш В.Н. Информационная безопасность: терминологический учебный справочник / В. Богуш, В. Г. Кривуца, А. М. Кудин. - М.: УИК, 2004. - 508 с.</mixed-citation>
     <mixed-citation xml:lang="en">Bogush V.N. Information security: a terminological educational handbook / V. Bogush, V. G. Krivutsa, A.M. Kudin. Moscow: PEC, 2004. 508 p.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B11">
    <label>11.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Марьенков А.Н. Обеспечение информационной безопасности вычислтельных сетей : учебно-методическое пособие для студентов направления подготовки 10.03.01 &quot;Информационная безопасность&quot; / [А. Н. Марьенков, В. Г. Лим] ; Министерство образования и науки РФ, Федеральное государственное бюджетное образовательное учреждение высшего образования &quot;Астраханский государственный университет&quot;, Факультет математики и информационных технологий, Кафедра &quot;Информационная безопасность&quot;. - Астрахань : издатель Сорокин Р. В., 2018. - 72 с.</mixed-citation>
     <mixed-citation xml:lang="en">Marienkov A.N. Ensuring information security of computing networks : an educational and methodological guide for students of the training area 10.03.01 &quot;Information security&quot; / [A. N. Marienkov, V. G. Lim] ; Ministry of Education and Science of the Russian Federation, Federal State Budgetary Educational Institution of Higher Education &quot;Astrakhan State University, Faculty of Mathematics and Information Technologies, Department of Information Security. - Astrakhan : publisher Sorokin R. V., 2018. - 72 p.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B12">
    <label>12.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Бубнов А.А. Основы информационной безопасности : учебник для студентов, обучающихся по специальностям укрупненной группы специальностей среднего профессионального образования &quot;Информационная безопасность&quot; / А. А. Бубнов, В. Н. Пржегорлинский, О. А. Савинкин. - 2-е изд., стер. - Москва : Академия, 2019. - 253 с.</mixed-citation>
     <mixed-citation xml:lang="en">Bubnov A.A. Fundamentals of information security : a textbook for students studying in the specialty group of secondary vocational education &quot;Information security&quot; / A. A. Bubnov, V. N. Przhegorlinsky, O. A. Savinkin. - 2nd ed., ster.  Moscow : Akademiya Publ., 2019. 253 p.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B13">
    <label>13.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Ежов А. А. Нейрокомпьютинг и его применения в экономике и бизнесе / А. А. Ежов, С. А. Шумский. - М.: МИФИ, 1998. - 224 с.</mixed-citation>
     <mixed-citation xml:lang="en">Yezhov A. A. Neurocomputing and its applications in economics and business / A. A. Yezhov, S. A. Shumsky, Moscow: MEPhI, 1998, 224 p.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B14">
    <label>14.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Лукацкий А.В. Обнаружение атак / А. В. Лукацкий. - СПб. БХВ-Петербург, 2003. - 624 с.</mixed-citation>
     <mixed-citation xml:lang="en">Lukatsky A.V. Detection of attacks / A.V. Lukatsky. - St. Petersburg. BHV-Petersburg, 2003. - 624 p.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B15">
    <label>15.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Cross-layered distributed data-driven framework for enhanced smart grid cyber-physical security / A. Starke, K. Nagaraj, C. Ruben [et al.] // IET Smart Grid. – 2022. – Vol. 5, No. 6. – P. 398-416. – DOI 10.1049/stg2.12070. – EDN BDFPTU.</mixed-citation>
     <mixed-citation xml:lang="en">Cross-layered distributed data-driven framework for enhanced smart grid cyber-physical security / A. Starke, K. Nagaraj, C. Ruben [et al.] // IET Smart Grid. – 2022. – Vol. 5, No. 6. – P. 398-416. – DOI 10.1049/stg2.12070. – EDN BDFPTU.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B16">
    <label>16.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Guest editorial: Applications of advanced machine learning and big data techniques in renewable energy-based power grids / M. Dabbaghjamanesh, A. Kavousi-Fard, Zh. Ya. Dong, A. Jolfaei // IET Renewable Power Generation. – 2022. – Vol. 16, No. 16. – P. 3445-3448. – DOI 10.1049/rpg2.12622. – EDN FLBGTO.</mixed-citation>
     <mixed-citation xml:lang="en">Guest editorial: Applications of advanced machine learning and big data techniques in renewable energy-based power grids / M. Dabbaghjamanesh, A. Kavousi-Fard, Zh. Ya. Dong, A. Jolfaei // IET Renewable Power Generation. – 2022. – Vol. 16, No. 16. – P. 3445-3448. – DOI 10.1049/rpg2.12622. – EDN FLBGTO.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B17">
    <label>17.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Joint Security and Resources Allocation Scheme Design in Edge Intelligence Enabled CBTCs: A Two-Level Game Theoretic Approach / Ya. Li, Li. Zhu, H. Wang [et al.] // IEEE Transactions on Intelligent Transportation Systems. – 2023. – Vol. 24, No. 12. – P. 13948-13961. – DOI 10.1109/tits.2023.3294546. – EDN LESEIK.</mixed-citation>
     <mixed-citation xml:lang="en">Joint Security and Resources Allocation Scheme Design in Edge Intelligence Enabled CBTCs: A Two-Level Game Theoretic Approach / Ya. Li, Li. Zhu, H. Wang [et al.] // IEEE Transactions on Intelligent Transportation Systems. – 2023. – Vol. 24, No. 12. – P. 13948-13961. – DOI 10.1109/tits.2023.3294546. – EDN LESEIK.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B18">
    <label>18.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Metaparameter optimized hybrid deep learning model for next generation cybersecurity in software defined networking environment / C. L. Kumar, S. Betam, D. Pustokhin [et al.] // Scientific Reports. – 2025. – Vol. 15, No. 1. – P. 14166. – DOI 10.1038/s41598-025-96153-w. – EDN RLPTJY.</mixed-citation>
     <mixed-citation xml:lang="en">Metaparameter optimized hybrid deep learning model for next generation cybersecurity in software defined networking environment / C. L. Kumar, S. Betam, D. Pustokhin [et al.] // Scientific Reports. – 2025. – Vol. 15, No. 1. – P. 14166. – DOI 10.1038/s41598-025-96153-w. – EDN RLPTJY.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B19">
    <label>19.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Towards symbiotic autonomous systems / O. Kaynak, W. He, Z. Liu, F. Flammini // Philosophical Transactions: Mathematical, Physical and Engineering Sciences (Series A). – 2021. – Vol. 379, No. 2207. – P. 20200359. – DOI 10.1098/rsta.2020.0359. – EDN BXKCKG.</mixed-citation>
     <mixed-citation xml:lang="en">Towards symbiotic autonomous systems / O. Kaynak, W. He, Z. Liu, F. Flammini // Philosophical Transactions: Mathematical, Physical and Engineering Sciences (Series A). – 2021. – Vol. 379, No. 2207. – P. 20200359. – DOI 10.1098/rsta.2020.0359. – EDN BXKCKG.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B20">
    <label>20.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Guest editorial: Resilient fuzzy control synthesis of non-linear networked systems against various cyber-attacks / X. Xie, T. H. Lee, J. Xia [et al.] // IET Control Theory and Applications. – 2024. – DOI 10.1049/cth2.12729. – EDN QPGFRB.</mixed-citation>
     <mixed-citation xml:lang="en">Guest editorial: Resilient fuzzy control synthesis of non-linear networked systems against various cyber-attacks / X. Xie, T. H. Lee, J. Xia [et al.] // IET Control Theory and Applications. – 2024. – DOI 10.1049/cth2.12729. – EDN QPGFRB.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B21">
    <label>21.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Security, Privacy, and Trust Management on Decentralized Systems and Networks / W. Meng, S. K. Katsikas, J. Chen, Ch. Chen // International Journal of Network Management. – 2024. – Vol. 34, No. 6. – DOI 10.1002/nem.2311. – EDN QYCHBC.</mixed-citation>
     <mixed-citation xml:lang="en">Security, Privacy, and Trust Management on Decentralized Systems and Networks / W. Meng, S. K. Katsikas, J. Chen, Ch. Chen // International Journal of Network Management. – 2024. – Vol. 34, No. 6. – DOI 10.1002/nem.2311. – EDN QYCHBC.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B22">
    <label>22.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">MalDroid: Secure DL-enabled intelligent malware detection framework / I. Ul. Haq, T. A. Khan, A. Akhunzada, X. Liu // IET Communications. – 2022. – Vol. 16, No. 10. – P. 1160-1171. – DOI 10.1049/cmu2.12265. – EDN FKFDJD.</mixed-citation>
     <mixed-citation xml:lang="en">MalDroid: Secure DL-enabled intelligent malware detection framework / I. Ul. Haq, T. A. Khan, A. Akhunzada, X. Liu // IET Communications. – 2022. – Vol. 16, No. 10. – P. 1160-1171. – DOI 10.1049/cmu2.12265. – EDN FKFDJD.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B23">
    <label>23.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Zahednejad, B. An improved integral distinguisher scheme based on neural networks / B. Zahednejad, L. Lyu // International Journal of Intelligent Systems. – 2022. – Vol. 37, No. 10. – P. 7584-7613. – DOI 10.1002/int.22895. – EDN JQCUYT.</mixed-citation>
     <mixed-citation xml:lang="en">Zahednejad, B. An improved integral distinguisher scheme based on neural networks / B. Zahednejad, L. Lyu // International Journal of Intelligent Systems. – 2022. – Vol. 37, No. 10. – P. 7584-7613. – DOI 10.1002/int.22895. – EDN JQCUYT.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B24">
    <label>24.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Emerging applications of IoT and cybersecurity for electrical power systems / M. M. F. Darwish, M. Elsisi, M. M. Fouda [et al.] // IET Generation, Transmission &amp; Distribution. – 2023. – Vol. 17, No. 20. – P. 4453-4456. – DOI 10.1049/gtd2.13012. – EDN ZBRVVC.</mixed-citation>
     <mixed-citation xml:lang="en">Emerging applications of IoT and cybersecurity for electrical power systems / M. M. F. Darwish, M. Elsisi, M. M. Fouda [et al.] // IET Generation, Transmission &amp; Distribution. – 2023. – Vol. 17, No. 20. – P. 4453-4456. – DOI 10.1049/gtd2.13012. – EDN ZBRVVC.</mixed-citation>
    </citation-alternatives>
   </ref>
  </ref-list>
 </back>
</article>
