Preview

Modern Science and Innovations

Advanced search

Comprehensive anomaly detection model for distributed systems using spectral and biometric methods

https://doi.org/10.37493/2307-910X.2025.4.3

Abstract

Introduction. The article discusses the integration of spectral analysis of network behavior and modern biometric authentication methods.

Goal. The goal of the research is to improve the security of distributed computing systems. Further research prospects include the use of wavelet transformations for analyzing non-stationary traffic, and the adaptation of detection thresholds based on the user's context.

Materials and methods. The model includes the use of Fourier series to analyze the periodicity of network processes, as well as the use of FaceNet, VGGFace, and IrisCode for the correct identification of users. A correlation model is presented that combines the biometric and spectral characteristics of a user, allowing for the formation of an integrated risk indicator.

Results and discussion. A numerical analysis has been conducted to demonstrate the possibility of separating normal users and attackers based on the spectral characteristics of their behavior. The graphical results confirm the effectiveness of the proposed model.

Conclusion. Based on the results of this study, it can be concluded that the use of Fourier series decomposition allows for the formalization of a user's behavioral profile in the frequency domain and the identification of high-frequency components characteristic of automated attacks.

About the Author

I. V. Kaliberda
North-Caucasus Federal University, Pyatigorsk Institute (branch) of NCFU
Россия

Igor V. Kaliberda – Senior Lecturer, Pyatigorsk Institute of the North Caucasus Federal University.

46 Yermolova Street, Pyatigorsk, Stavropol Territory, 357500



References

1. Oppengeim A. Tsifrovaya obrabotka signalov. Prentice Hall, 2010.

2. Schroff F., Kalenichenko D., Philbin J. FaceNet: Unified Embedding for Face Recognition and Clustering. Proc. IEEE CVPR. 2015. pp. 815–823.

3. Parkhi O., Vedaldi A., Zisserman A. Deep Face Recognition. Proc. BMVC. Oxford Univ., 2015.

4. Daugman J. How IrisCode Works. IEEE Trans. Circuits and Systems Video Technology. 2003. Vol. 14. pp. 21–30.

5. Tanenbaum EH., Van Stin M. Raspredelennye sistemy: printsipy i paradigmy. Pearson, 2020.

6. Stollings V. Osnovy setevoi bezopasnosti. Pearson, 2018.

7. Chen L., Sun M., Zhao Q. Hybrid Fourier-Wavelet Models for Encrypted Traffic Analysis. Computers & Security. 2023.

8. Mallat S. A Wavelet Tour of Signal Processing. Academic Press, 2008.

9. Nguyen T., Vo M., Huynh D. FaceNet++: Enhanced Embedding Representations. Pattern Recognition Letters. 2024.

10. ISO/IEC 19794-5:2011. Informatsionnye tekhnologii. Biometricheskie formaty obmena dannymi. Chast' 5: Geometricheskie dannye litsa.

11. Zhang Y., Liu H., Wang P. Fourier-Based Profiling of Network Behavior. IEEE Access. 2021.

12. Kumar S., Patel R. Deep Biometric Fusion for Anomaly Detection. Journal of Network and Computer Applications. 2022.


Review

For citations:


Kaliberda I.V. Comprehensive anomaly detection model for distributed systems using spectral and biometric methods. Modern Science and Innovations. 2025;(4):37-46. (In Russ.) https://doi.org/10.37493/2307-910X.2025.4.3

Views: 6

JATS XML


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2307-910X (Print)