{"id":393,"date":"2026-01-12T15:05:34","date_gmt":"2026-01-12T15:05:34","guid":{"rendered":"https:\/\/greenbeat.tu-sofia.bg\/?post_type=publication&#038;p=393"},"modified":"2026-01-12T15:05:34","modified_gmt":"2026-01-12T15:05:34","slug":"enhancing-network-security-a-modular-neural-network-approach-to-detect-suspicious-patterns","status":"publish","type":"publication","link":"https:\/\/greenbeat.tu-sofia.bg\/index.php\/publication\/enhancing-network-security-a-modular-neural-network-approach-to-detect-suspicious-patterns\/","title":{"rendered":"Enhancing Network Security: A Modular Neural Network Approach to Detect Suspicious Patterns"},"content":{"rendered":"<div  class=\"wp-block-ultimate-post-heading ultp-block-e9681b\"><div class=\"ultp-block-wrapper\"><div class=\"ultp-heading-wrap ultp-heading-style9 ultp-heading-center\"><h1 class=\"ultp-heading-inner\"><span>Enhancing Network Security: A Modular Neural Network Approach to Detect Suspicious Patterns<\/span><\/h1><\/div><\/div><\/div>\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div  class=\"wp-block-ultimate-post-heading ultp-block-676e7e\"><div class=\"ultp-block-wrapper\"><div class=\"ultp-heading-wrap ultp-heading-style9 ultp-heading-left\"><h2 class=\"ultp-heading-inner\"><span>Abstract<\/span><\/h2><\/div><\/div><\/div>\n\n\n<p>The increasing complexity and sophistication of cyber threats pose significant challenges to network security. Detecting suspicious patterns in network traffic-such as unusual activity, unexpected communications, and atypical data patterns\u2014is critical for identifying potential cyber-attacks and unauthorized network use. In this study, we propose a modular neural network approach, integrating Recurrent Neural Networks (RNN) and Nonlinear AutoRegressive eXogenous (NARX) models, to effectively detect these anomalies. The modular structure divides the problem into manageable subproblems, allowing for enhanced accuracy and flexibility. The RNN\u2019s ability to process sequential data, combined with the NARX model\u2019s capacity to capture both internal and external dependencies, makes this hybrid approach particularly effective in analyzing complex network traffic patterns. We trained and tested the proposed model using both typical and atypical network traffic data, achieving a mean squared error close to zero during the training phase. This research contributes to the development of more resilient and adaptive cybersecurity solutions, capable of safeguarding networks against evolving threats.<\/p>\n\n\n<div  class=\"wp-block-ultimate-post-heading ultp-block-557cee\"><div class=\"ultp-block-wrapper\"><div class=\"ultp-heading-wrap ultp-heading-style9 ultp-heading-left\"><h2 class=\"ultp-heading-inner\"><span>Authors<\/span><\/h2><\/div><\/div><\/div>\n\n\n<p>Sotir Sotirov; Vladimir Poulkov; Agata Manolova<\/p>\n\n\n<div  class=\"wp-block-ultimate-post-heading ultp-block-f91a44\"><div class=\"ultp-block-wrapper\"><div class=\"ultp-heading-wrap ultp-heading-style9 ultp-heading-left\"><h2 class=\"ultp-heading-inner\"><span>Venue<\/span><\/h2><\/div><\/div><\/div>\n\n\n<p>2024 27th International Symposium on Wireless Personal Multimedia Communications (WPMC)<\/p>\n\n\n<div  class=\"wp-block-ultimate-post-heading ultp-block-36ef61\"><div class=\"ultp-block-wrapper\"><div class=\"ultp-heading-wrap ultp-heading-style9 ultp-heading-left\"><h2 class=\"ultp-heading-inner\"><span>Links<\/span><\/h2><\/div><\/div><\/div>\n\n\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10863532\/citations?tabFilter=papers#citations\">https:\/\/ieeexplore.ieee.org\/abstract\/document\/10863532\/citations?tabFilter=papers#citations<\/a><\/p>\n\n\n<div  class=\"wp-block-ultimate-post-heading ultp-block-290e5b\"><div class=\"ultp-block-wrapper\"><div class=\"ultp-heading-wrap ultp-heading-style9 ultp-heading-left\"><h2 class=\"ultp-heading-inner\"><span>Keywords<\/span><\/h2><\/div><\/div><\/div>\n\n\n<p>Training; Analytical models; Adaptation models; Recurrent neural networks; Telecommunication traffic; Traffic control; Network security; Data models; Reliability; Monitoring<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sotir Sotirov; Vladimir Poulkov; Agata Manolova<\/p>\n","protected":false},"template":"","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}}},"class_list":["post-393","publication","type-publication","status-publish","hentry"],"uagb_featured_image_src":[],"uagb_author_info":{"display_name":"greenbeat_admin","author_link":"https:\/\/greenbeat.tu-sofia.bg\/index.php\/author\/"},"uagb_comment_info":0,"uagb_excerpt":"Sotir Sotirov; Vladimir Poulkov; Agata Manolova","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/greenbeat.tu-sofia.bg\/index.php\/wp-json\/wp\/v2\/publication\/393","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/greenbeat.tu-sofia.bg\/index.php\/wp-json\/wp\/v2\/publication"}],"about":[{"href":"https:\/\/greenbeat.tu-sofia.bg\/index.php\/wp-json\/wp\/v2\/types\/publication"}],"wp:attachment":[{"href":"https:\/\/greenbeat.tu-sofia.bg\/index.php\/wp-json\/wp\/v2\/media?parent=393"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}