<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE root>
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:ali="http://www.niso.org/schemas/ali/1.0/" article-type="research-article" dtd-version="1.2" xml:lang="en"><front><journal-meta><journal-id journal-id-type="publisher-id">Discrete and Continuous Models and Applied Computational Science</journal-id><journal-title-group><journal-title xml:lang="en">Discrete and Continuous Models and Applied Computational Science</journal-title><trans-title-group xml:lang="ru"><trans-title>Discrete and Continuous Models and Applied Computational Science</trans-title></trans-title-group></journal-title-group><issn publication-format="print">2658-4670</issn><issn publication-format="electronic">2658-7149</issn><publisher><publisher-name xml:lang="en">Peoples' Friendship University of Russia named after Patrice Lumumba (RUDN University)</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">44731</article-id><article-id pub-id-type="doi">10.22363/2658-4670-2025-33-1-27-45</article-id><article-id pub-id-type="edn">AFZDUC</article-id><article-categories><subj-group subj-group-type="toc-heading" xml:lang="en"><subject>Computer Science</subject></subj-group><subj-group subj-group-type="toc-heading" xml:lang="ru"><subject>Информатика и вычислительная техника</subject></subj-group><subj-group subj-group-type="article-type"><subject>Research Article</subject></subj-group></article-categories><title-group><article-title xml:lang="en">Statistical and density-based clustering techniques in the context of anomaly detection in network systems: A comparative analysis</article-title><trans-title-group xml:lang="ru"><trans-title>Статистические и плотностные методы кластеризации в задачах обнаружения аномалий сетевых систем: сравнительный анализ</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><contrib-id contrib-id-type="orcid">https://orcid.org/0009-0000-9046-3225</contrib-id><contrib-id contrib-id-type="researcherid">KLZ-4503-2024</contrib-id><name-alternatives><name xml:lang="en"><surname>Baklashov</surname><given-names>Aleksandr S.</given-names></name><name xml:lang="ru"><surname>Баклашов</surname><given-names>А. С.</given-names></name></name-alternatives><bio xml:lang="en"><p>Master’s degree student Department of Probability Theory and Cybersecurity of RUDN University; Mathematician, V. A. Trapeznikov Institute of Control Sciences of Russian Academy of Sciences</p></bio><email>1132239133@pfur.ru</email><xref ref-type="aff" rid="aff1"/><xref ref-type="aff" rid="aff2"/></contrib><contrib contrib-type="author"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-0877-7063</contrib-id><contrib-id contrib-id-type="scopus">35194130800</contrib-id><contrib-id contrib-id-type="researcherid">I-3183-2013</contrib-id><name-alternatives><name xml:lang="en"><surname>Kulyabov</surname><given-names>Dmitry S.</given-names></name><name xml:lang="ru"><surname>Кулябов</surname><given-names>Д. С.</given-names></name></name-alternatives><bio xml:lang="en"><p>Professor, Doctor of Sciences in Physics and Mathematics, Professor of Department of Probability Theory and Cyber Security of RUDN University; Senior Researcher of Laboratory of Information Technologies, Joint Institute for Nuclear Research</p></bio><email>kulyabov_ds@pfur.ru</email><xref ref-type="aff" rid="aff1"/><xref ref-type="aff" rid="aff3"/></contrib></contrib-group><aff-alternatives id="aff1"><aff><institution xml:lang="en">RUDN University</institution></aff><aff><institution xml:lang="ru">Российский университет дружбы народов</institution></aff></aff-alternatives><aff-alternatives id="aff2"><aff><institution xml:lang="en">V. A. Trapeznikov Institute of Control Sciences of Russian Academy of Sciences</institution></aff><aff><institution xml:lang="ru">Институт проблем управления им. В. А. Трапезникова Российской академии наук</institution></aff></aff-alternatives><aff-alternatives id="aff3"><aff><institution xml:lang="en">Joint Institute for Nuclear Research</institution></aff><aff><institution xml:lang="ru">Объединённый институт ядерных исследований</institution></aff></aff-alternatives><pub-date date-type="pub" iso-8601-date="2025-06-15" publication-format="electronic"><day>15</day><month>06</month><year>2025</year></pub-date><volume>33</volume><issue>1</issue><issue-title xml:lang="en">VOL 33, NO1 (2025)</issue-title><issue-title xml:lang="ru">ТОМ 33, №1 (2025)</issue-title><fpage>27</fpage><lpage>45</lpage><history><date date-type="received" iso-8601-date="2025-06-27"><day>27</day><month>06</month><year>2025</year></date></history><permissions><copyright-statement xml:lang="en">Copyright ©; 2025, Baklashov A.S., Kulyabov D.S.</copyright-statement><copyright-statement xml:lang="ru">Copyright ©; 2025, Баклашов А.С., Кулябов Д.С.</copyright-statement><copyright-year>2025</copyright-year><copyright-holder xml:lang="en">Baklashov A.S., Kulyabov D.S.</copyright-holder><copyright-holder xml:lang="ru">Баклашов А.С., Кулябов Д.С.</copyright-holder><ali:free_to_read xmlns:ali="http://www.niso.org/schemas/ali/1.0/"/><license><ali:license_ref xmlns:ali="http://www.niso.org/schemas/ali/1.0/">https://creativecommons.org/licenses/by-nc/4.0</ali:license_ref></license></permissions><self-uri xlink:href="https://journals.rudn.ru/miph/article/view/44731">https://journals.rudn.ru/miph/article/view/44731</self-uri><abstract xml:lang="en"><p>In the modern world, the volume of data stored electronically and transmitted over networks continues to grow rapidly. This trend increases the demand for the development of effective methods to protect information transmitted over networks as network traffic. Anomaly detection plays a crucial role in ensuring net security and safeguarding data against cyberattacks. This study aims to review statistical and density-based clustering methods used for anomaly detection in network systems and to perform a comparative analysis based on a specific task. To achieve this goal, the authors analyzed existing approaches to anomaly detection using clustering methods. Various algorithms and clustering techniques applied within network environments were examined in this study. The comparative analysis highlights the high effectiveness of clustering methods in detecting anomalies in network traffic. These findings support the recommendation to integrate such methods into intrusion detection systems to enhance information security levels. The study identified common features, differences, strengths, and limitations of the different methods. The results offer practical insights for improving intrusion detection systems and strengthening data protection in network infrastructures.</p></abstract><trans-abstract xml:lang="ru"><p>В современном мире количество данных, хранящихся в электронном виде и передающихся по сети, непрерывно растёт. Это создаёт потребность в разработке эффективных методов защиты информации, передающейся в виде сетевого трафика. Выявление аномалий играет ключевую роль в обеспечении безопасности сетей и защите информации от кибератак. Цель данной работы заключается в проведении обзора статистических и плотностных методов кластеризации, применяемых для определения аномалий в сетевых системах, и проведении их сравнительного анализа на конкретной задаче. Для достижения цели исследования использовались методы анализа существующих подходов к обнаружению аномалий с помощью методов кластеризации. В исследовании рассматривались различные алгоритмы и методы кластеризации, применяемые в сетевых системах. Результаты проведённого сравнительного анализа продемонстрировали высокую эффективность методов кластеризации в задачах обнаружения аномалий сетевого трафика, что позволяет рекомендовать их для интеграции в системы обнаружения вторжений с целью повышения уровня информационной безопасности. Был проведён сравнительный анализ различных методов, выявлены их общие черты, различия, достоинства и недостатки. Полученные результаты могут быть использованы для улучшения систем обнаружения вторжений и повышения уровня защиты информации в сетевых системах.</p></trans-abstract><kwd-group xml:lang="en"><kwd>intrusion detection systems</kwd><kwd>network systems</kwd><kwd>clustering methods</kwd></kwd-group><kwd-group xml:lang="ru"><kwd>системы обнаружения вторжений</kwd><kwd>сетевые системы</kwd><kwd>методы кластеризации</kwd></kwd-group><funding-group/></article-meta></front><body></body><back><ref-list><ref id="B1"><label>1.</label><mixed-citation>Kosmacheva, I., Davidyuk, N., Belov, S., Kuchin, Y. S., Kvyatkovskaya, Y., Rudenko, M. &amp; Lobeyko, V. I. Predicting of cyber attacks on critical information infrastructure. Journal of Physics: Conference Series 2091 (2021).</mixed-citation></ref><ref id="B2"><label>2.</label><mixed-citation>Bhuyan, M. H., Bhattacharyya, D. K. &amp; Kalita, J. K. Network Anomaly Detection: Methods, Systems and Tools. IEEE Communications Surveys &amp; Tutorials 16, 303-336 (2014).</mixed-citation></ref><ref id="B3"><label>3.</label><mixed-citation>Schynol, L. &amp; Pesavento, M. Deep Unrolling for Anomaly Detection in Network Flows in (Dec. 2023), 61-65. doi:10.1109/CAMSAP58249.2023.10403513.</mixed-citation></ref><ref id="B4"><label>4.</label><mixed-citation>Maheswari, G., Vinith, A., Sathyanarayanan, A. S., Sowmi, S. M. &amp; Sambath, M. An Ensemble Framework for Network Anomaly Detection Using Isolation Forest and Autoencoders. 2024 International Conference on Advances in Data Engineering and Intelligent Computing Systems (ADICS), 1-6 (2024).</mixed-citation></ref><ref id="B5"><label>5.</label><mixed-citation>Olateju, O., Okon, S., Igwenagu, U., Salami, A., Oladoyinbo, T. &amp; Olaniyi, O. Combating the Challenges of False Positives in AI-Driven Anomaly Detection Systems and Enhancing Data Security in the Cloud. Asian Journal of Research in Computer Science 17, 264-292. doi:10.9734/ ajrcos/2024/v17i6472 (June 2024).</mixed-citation></ref><ref id="B6"><label>6.</label><mixed-citation>Lavanya, A. &amp; Sekar, D. Traditional Methods and Machine Learning for Anomaly Detection in Self-Organizing Networks. International Journal of Scientific Research in Science, Engineering and Technology 10, 352-360. doi:10.32628/IJSRSET2310662 (Dec. 2023).</mixed-citation></ref><ref id="B7"><label>7.</label><mixed-citation>Sheela, S. N., Prasad, E., Srinath, M. V. &amp; Basha, M. S. Intrusion Detection Systems, Tools and Techniques - An Overview. Indian journal of science and technology 8 (2015).</mixed-citation></ref><ref id="B8"><label>8.</label><mixed-citation>Al-Ghamdi, M. An Assessment of Intrusion Detection System (IDS) and Data-Set Overview: A Comprehensive Review of Recent Works. Journal of Scientific Research and Development 5, 979- 982 (Feb. 2021).</mixed-citation></ref><ref id="B9"><label>9.</label><mixed-citation>Rozendaal, K., Mailewa, A. &amp; Dissanayake Mohottalalage, T. Neural Network Assisted IDS/IPS: An Overview of Implementations, Benefits, and Drawbacks. International Journal of Computer Applications 184, 21-28. doi:10.5120/ijca2022922098 (May 2022).</mixed-citation></ref><ref id="B10"><label>10.</label><mixed-citation>Satilmiş, H., Akleylek, S. &amp; Tok, Z. A Systematic Literature Review on Host-Based Intrusion Detection Systems. IEEE Access PP, 1-1. doi:10.1109/ACCESS.2024.3367004 (Jan. 2024).</mixed-citation></ref><ref id="B11"><label>11.</label><mixed-citation>Mahfuz, N. M., Yusoff, M. &amp; Ahmad, Z. Review of single clustering methods. IAES International Journal of Artificial Intelligence 8, 221-227 (2019).</mixed-citation></ref><ref id="B12"><label>12.</label><mixed-citation>Burkov, A. Machine learning engineering (True Positive, Sept. 2020).</mixed-citation></ref><ref id="B13"><label>13.</label><mixed-citation>Park, H.-S. &amp; Jun, C.-H. A simple and fast algorithm for K-medoids clustering. Expert Systems with Applications 36, 3336-3341. doi:10.1016/j.eswa.2008.01.039 (2009).</mixed-citation></ref><ref id="B14"><label>14.</label><mixed-citation>Campello, R., Kröger, P., Sander, J. &amp; Zimek, A. Density-based clustering. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 10. doi:10.1002/widm.1343 (Oct. 2019).</mixed-citation></ref><ref id="B15"><label>15.</label><mixed-citation>Ankerst, M., Breunig, M. M., Kriegel, H.-P. &amp; Sander, J. OPTICS: ordering points to identify the clustering structure. SIGMOD Rec. 28, 49-60. doi:10.1145/304181.304187 (June 1999).</mixed-citation></ref><ref id="B16"><label>16.</label><mixed-citation>Sahli, Y. Comparison of the NSL-KDD dataset and its predecessor the KDD Cup ’99 dataset. International Journal of Scientific Research and Management 10, 832-839. doi:10.18535/ijsrm/v10i4.ec05 (Apr. 2022).</mixed-citation></ref><ref id="B17"><label>17.</label><mixed-citation>L.Dhanabal &amp; Shantharajah, D. S. P. A Study on NSL-KDD Dataset for Intrusion Detection System Based on Classification Algorithms in. 4 (June 2015), 446-452.</mixed-citation></ref><ref id="B18"><label>18.</label><mixed-citation>Kunhare, N. &amp; Tiwari, R. Study of the Attributes using Four Class Labels on KDD99 and NSL-KDD Datasets with Machine Learning Techniques in (Nov. 2018), 127-131. doi:10.1109/CSNT.2018.8820244.</mixed-citation></ref><ref id="B19"><label>19.</label><mixed-citation>Gorban, A., Kégl, B., Wunsch, D. &amp; Zinovyev, A. Principal Manifolds for Data Visualisation and Dimension Reduction, LNCSE 58 338 pp. (Jan. 2008).</mixed-citation></ref></ref-list></back></article>
