Paper The following article is Open access

Analysis of training of deep neural networks with heterogeneous architecture while detecting malicious network traffic

, , and

Published under licence by IOP Publishing Ltd
, , Citation V A Chastikova et al 2021 IOP Conf. Ser.: Mater. Sci. Eng. 1047 012135 DOI 10.1088/1757-899X/1047/1/012135

1757-899X/1047/1/012135

Abstract

The given article presents the study of the training process of a composite heterogeneous neural network with deep architecture. A brief description of the architecture of the analyzed neural network system has been given. The key nodes of computational load distribution on each of the layers of the neural network have been tracked. The monitoring results have been analyzed and the following conclusions have been made: the most resource-intensive part of the system during training is the LSTM network. The results of the study of structural features of the neural network hidden layers have been presented. Graphs have been constructed and there has been carried out the study of a statistical distribution of weights on each unique layer of the architecture: on a fully connected layer, on the first hidden layer of the subnet-encoder, on the second hidden layer of the subnet-encoder, on the first and second fully connected output layers of the neural network. Based on the research results, a qualitative assessment of the effectiveness and accuracy of the entire neural network system has been given.

Export citation and abstract BibTeX RIS

Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.

Please wait… references are loading.