(D.A. Tsenov Academy of Economics, Svishtov, Bulgaria, 2022) Pakhomova, Victoria N.; Kulyk, Victoria
ENG: The "RBF_U2R" program based on the implementation of the RBF network, the configuration of which is N-M-K (where N is the number of input neurons; M is the number of basic functions; K is the number of resulting neurons) was created in Python for detecting the following classes of attacks: Buffer_overflow; Loadmodule; Perl; Rootkit; Normal and using network traffic parameters from the open KDDCup database. Studies of the accuracy parameter were carried out during the training epochs of the neural network on the created program.