Previous Article in Journal
A Method for Synthesizing Self-Checking Discrete Systems with Calculations Testing Based on Parity and Self-Duality of Calculated Functions
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

Adaptive Neural Network System for Detecting Unauthorised Intrusions Based on Real-Time Traffic Analysis

1
Department of Scientific Activity Organization, Kharkiv National University of Internal Affairs, 27, L. Landau Avenue, 61080 Kharkiv, Ukraine
2
Information Systems and Networks Department, Lviv Polytechnic National University, 12, Bandera Street, 79013 Lviv, Ukraine
3
Lviv State University of Life Safety, 35, Kleparivska Street, 79000 Lviv, Ukraine
*
Author to whom correspondence should be addressed.
Computation 2025, 13(9), 221; https://doi.org/10.3390/computation13090221
Submission received: 16 August 2025 / Revised: 2 September 2025 / Accepted: 8 September 2025 / Published: 11 September 2025
(This article belongs to the Section Computational Engineering)

Abstract

This article solves the anomalies’ operational detection in the network traffic problem for cyber police units by developing an adaptive neural network platform combining a variational autoencoder with continuous stochastic dynamics of the latent space (integration according to the Euler–Maruyama scheme), a continuous–discrete Kalman filter for latent state estimation, and Hotelling’s T2 statistical criterion for deviation detection. This paper implements an online learning mechanism (“on the fly”) via the Euler Euclidean gradient step. Verification includes variational autoencoder training and validation, ROC/PR and confusion matrix analysis, latent representation projections (PCA), and latency measurements during streaming processing. The model’s stable convergence and anomalies’ precise detection with the metrics precision is ≈0.83, recall is ≈0.83, the F1-score is ≈0.83, and the end-to-end delay of 1.5…6.5 ms under 100…1000 sessions/s load was demonstrated experimentally. The computational estimate for typical model parameters is ≈5152 operations for a forward pass and ≈38,944 operations, taking into account batch updating. At the same time, the main bottleneck, the O(m3) term in the Kalman step, was identified. The obtained results’ practical significance lies in the possibility of the developed adaptive neural network platform integrating into cyber police units (integration with Kafka, Spark, or Flink; exporting incidents to SIEM or SOAR; monitoring via Prometheus or Grafana) and in proposing applied optimisation paths for embedded and high-load systems.
Keywords: neural network system; variational autoencoder; network traffic; latent dynamics; Euler-Maruyama scheme; Hotelling’s T2 criterion; cyber police; anomalies neural network system; variational autoencoder; network traffic; latent dynamics; Euler-Maruyama scheme; Hotelling’s T2 criterion; cyber police; anomalies

Share and Cite

MDPI and ACS Style

Vladov, S.; Vysotska, V.; Lytvyn, V.; Komziuk, A.; Prokudin, O.; Ostapiuk, A. Adaptive Neural Network System for Detecting Unauthorised Intrusions Based on Real-Time Traffic Analysis. Computation 2025, 13, 221. https://doi.org/10.3390/computation13090221

AMA Style

Vladov S, Vysotska V, Lytvyn V, Komziuk A, Prokudin O, Ostapiuk A. Adaptive Neural Network System for Detecting Unauthorised Intrusions Based on Real-Time Traffic Analysis. Computation. 2025; 13(9):221. https://doi.org/10.3390/computation13090221

Chicago/Turabian Style

Vladov, Serhii, Victoria Vysotska, Vasyl Lytvyn, Anatolii Komziuk, Oleksandr Prokudin, and Andrii Ostapiuk. 2025. "Adaptive Neural Network System for Detecting Unauthorised Intrusions Based on Real-Time Traffic Analysis" Computation 13, no. 9: 221. https://doi.org/10.3390/computation13090221

APA Style

Vladov, S., Vysotska, V., Lytvyn, V., Komziuk, A., Prokudin, O., & Ostapiuk, A. (2025). Adaptive Neural Network System for Detecting Unauthorised Intrusions Based on Real-Time Traffic Analysis. Computation, 13(9), 221. https://doi.org/10.3390/computation13090221

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop