Information and communication and chemical technologies

No. 1 (26) - 2025 / 2025-03-31 / Number of views: 60

ADAPTATION OF MULTI-FACTOR FORECASTING ALGORITHM FOR DETECTING NETWORK VULNERABILITIES

Authors

K.Kulazhanov Kazakh University of Technology and Business
https://orcid.org/0000-0002-9212-251X
L.N. Gumilyov Eurasian National University
https://orcid.org/0000-0003-2811-9997
Kazakh University of Technology and Business
https://orcid.org/0009-0002-5754-4001
Abylkas Saginov Karaganda Technical University
https://orcid.org/0000-0003-4353-1728
Kazakh University of Technology and Business named after K. Kulazhanov
https://orcid.org/0000-0002-8435-7773
Astana IT University
https://orcid.org/0000-0001-9029-5102

Keywords

multivariate forecasting, machine learning, neural networks, network vulnerabilities, exploits

Link to DOI:

https://doi.org/10.58805/kazutb.v.1.26-743

How to quote

A. Ш., A. О., N. С., B. Р., S. А., and L. К. “ADAPTATION OF MULTI-FACTOR FORECASTING ALGORITHM FOR DETECTING NETWORK VULNERABILITIES”. Vestnik KazUTB, vol. 1, no. 26, Mar. 2025, doi:10.58805/kazutb.v.1.26-743.

Abstract

Network security understandably remains one of the fastest changing areas in the digital world. In addition, with the development of new technologies and the emergence of new cyber attacks, the obsolescence of security methods and technologies occurs at a rapid pace. Nowadays, network and computer security in production environments is becoming increasingly important due to the growing number of cyber attacks and network vulnerabilities. Due to the increase in the number of remotely connected devices, the increase in the volume of data and the complexity of network technologies. Given the large number of vulnerabilities identified each year, automating their prediction is crucial. The objective of this study is to comprehensively analyze network vulnerabilities and attacks using a multi-factor forecasting algorithm. The multi-factor forecasting algorithm improves the accuracy of attack forecasting by taking into account parameters such as network failure rate, network traffic activity and threat response time. The study included a literature review of articles published in Scopus and Web of Science, data collection from various sources, their normalization and analysis using machine learning methods such as neural networks, logistic regression and random forests. The practical value of the study is that the developed algorithm can be used to create systems for monitoring network vulnerabilities and assessing the effectiveness of operation in real time. This significantly improves the protection of corporate and government networks, reduces damage from cyberattacks and improves overall cybersecurity.

Versions