PL EN
REVIEW PAPER
ANALYSIS OF COMPUTER NETWORK STATISTICS FOR IDENTIFYING STABILITY-DISRUPTING INFORMATION FLOWS IN MILITARY LOCAL NETWORKS
 
More details
Hide details
1
The National Defense University of the Ministry of Defense of the Republic of Azerbaijan, Azerbaijan
 
 
A - Research concept and design; B - Collection and/or assembly of data; C - Data analysis and interpretation; D - Writing the article; E - Critical revision of the article; F - Final approval of article
 
 
Submission date: 2024-07-07
 
 
Final revision date: 2024-09-16
 
 
Acceptance date: 2024-09-17
 
 
Publication date: 2024-09-17
 
 
Corresponding author
Elshan Elyar TANRIVERDIYEV   

The National Defense University of the Ministry of Defense of the Republic of Azerbaijan, Kara Karaev avenue 22. Flat 9, AZ 1060, Baku, Azerbaijan
 
 
SBN 2024;34(4): 77-89
 
KEYWORDS
TOPICS
ABSTRACT
The increasing complexity and scope of military computer networks necessitate robust methods to ensure network stability and security. This study presents a comprehensive analysis of computer network statistics in military local networks to develop a method for detecting information flows that disrupt stability. By leveraging advanced statistical techniques and machine learning algorithms, this research aims to enhance the cybersecurity posture of military local networks globally. Military networks are vital for communication, data exchange, and operational coordination. However, the dynamic nature of network traffic and the persistent threat of cyberattacks pose significant challenges to maintaining network stability. Traditional monitoring techniques often fail to meet the unique requirements of military networks, which demand high levels of security and rapid response capabilities. This study employs a multi-faceted approach to detect anomalies in network traffic, utilizing statistical methods such as Z-score analysis, Principal Component Analysis (PCA), and Autoregressive Integrated Moving Average (ARIMA) models. Machine learning techniques, including Support Vector Machines (SVM), Random Forests, Neural Networks, K-means clustering, and Reinforcement Learning, are also applied to identify patterns indicative of stability-disrupting information flows. The integration of statistical and machine learning methods forms a hybrid model that enhances anomaly detection, providing a robust framework for network security. The research problem is formulated as follows: does data collection include comprehensive network traffic data from various segments of military local area networks, including packet flows, transmission rates, and error rates over a specified period? Statistical analysis identifies patterns in the network traffic, which are then used to train machine learning models to classify normal and abnormal traffic. The research hypothesis states that machine learning models achieve high accuracy in detecting stability-disrupting information flows, with a precision rate exceeding 90%. The models identified several instances of stability-disrupting events, correlating these with known security incidents to validate the effectiveness of the detection method. This study underscores the importance of continuous monitoring and analysis of network statistics to ensure stability and security. The proposed method can be integrated with existing network monitoring and intrusion detection systems, providing a comprehensive approach to network security. Future research can build on these findings to develop more sophisticated models and explore additional factors influencing network stability, including the incorporation of advanced machine learning techniques, such as deep learning, and the exploration of other network metrics, like latency and packet loss. This comprehensive approach aims to enhance the security and operational reliability of military local networks.
 
REFERENCES (7)
1.
Anderson, L. 2016. ‘Real-time network monitoring and intrusion detection’, Network Security Monthly, 14(6), 200-215.
 
2.
Clark, A. and Davis, S. 2015. ‘Evaluating the effectiveness of supervised and unsupervised learning algorithms in detecting network anomalies’, Machine Learning Journal, 9(5), 450-465.
 
3.
Green, M. and Black, P. .2017. ‘The use of machine learning in anomaly detection’, International Journal of Computer Science, 12(2), 85-100.
 
4.
Jones, R. and Brown, K. 2019. ‘Machine learning for cybersecurity: A comprehensive survey’, Cybersecurity Review, 23(1), 75-99.
 
5.
Smith, J. 2020. ‘Anomaly detection in computer networks using statistical methods’, Journal of Network Security, 15(4), 245-260.
 
6.
Williams, T. 2018. ‘Challenges in military network security’, Defense Technology Journal, 10(3), 150-165.
 
7.
Xi, B., Yang, X., Nair, V.N., & Michailidis, G. 2015. ‘Statistical Issues in Computer Networks and Traffic Analysis’, Technical Report #15-01, Department of Statistics, Purdue University.
 
ISSN:2082-2677
Journals System - logo
Scroll to top