<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2026-11-1-0-5</article-id><article-id pub-id-type="publisher-id">4099</article-id><article-categories><subj-group subj-group-type="heading"><subject>ARTIFICIAL INTELLIGENCE AND DECISION MAKING</subject></subj-group></article-categories><title-group><article-title>&lt;strong&gt;EXPERT SYSTEM FOR INFORMATION SECURITY EVENT ANALYSIS&lt;/strong&gt;</article-title><trans-title-group xml:lang="en"><trans-title>&lt;strong&gt;EXPERT SYSTEM FOR INFORMATION SECURITY EVENT ANALYSIS&lt;/strong&gt;</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Potienko</surname><given-names>Daniil Anatolyevich</given-names></name><name xml:lang="en"><surname>Potienko</surname><given-names>Daniil Anatolyevich</given-names></name></name-alternatives><email>potienkodaniil@gmail.com</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Gazizov</surname><given-names>Andrey Ravilevich</given-names></name><name xml:lang="en"><surname>Gazizov</surname><given-names>Andrey Ravilevich</given-names></name></name-alternatives><email>agazizov@donstu.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Legonko</surname><given-names>Olga Leonidovna</given-names></name><name xml:lang="en"><surname>Legonko</surname><given-names>Olga Leonidovna</given-names></name></name-alternatives><email>olga_cvetkova@mail.ru</email></contrib></contrib-group><pub-date pub-type="epub"><year>2026</year></pub-date><volume>11</volume><issue>1</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2026/1/НР.ИТ_11.1_5.pdf" /><abstract xml:lang="ru"><p>This article explores the development of a hybrid expert system for analyzing information security events, aimed at automating threat detection in network traffic. Given the growing volume of data and the complexity of attacks, traditional analysis methods are ineffective, necessitating the integration of machine learning and expert rules. The goal of the study is to create a modular system architecture comprising four components: data collection (Apache Kafka), preprocessing (Apache Flink), analysis and classification (Random Forest with rule-based postprocessing), and logging (Elastic Stack). A Python prototype was tested on the UNSW-NB15 dataset, demonstrating a binary classification accuracy of 0,890 and a multiclass classification accuracy of 0,781. The hybrid approach increases recall for selected attack classes (Analysis, Backdoor, DoS) by 19&amp;ndash;100% while reducing overall accuracy by 1,2%, ensuring the interpretability of solutions. The conclusion suggests future directions, including rule optimization through reinforcement learning, integration of LSTM artificial neural networks, and automatic knowledge base updating.</p></abstract><trans-abstract xml:lang="en"><p>This article explores the development of a hybrid expert system for analyzing information security events, aimed at automating threat detection in network traffic. Given the growing volume of data and the complexity of attacks, traditional analysis methods are ineffective, necessitating the integration of machine learning and expert rules. The goal of the study is to create a modular system architecture comprising four components: data collection (Apache Kafka), preprocessing (Apache Flink), analysis and classification (Random Forest with rule-based postprocessing), and logging (Elastic Stack). A Python prototype was tested on the UNSW-NB15 dataset, demonstrating a binary classification accuracy of 0,890 and a multiclass classification accuracy of 0,781. The hybrid approach increases recall for selected attack classes (Analysis, Backdoor, DoS) by 19&amp;ndash;100% while reducing overall accuracy by 1,2%, ensuring the interpretability of solutions. The conclusion suggests future directions, including rule optimization through reinforcement learning, integration of LSTM artificial neural networks, and automatic knowledge base updating.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>expert system</kwd><kwd>artificial intelligence technologies</kwd><kwd>information security</kwd><kwd>information protection</kwd><kwd>information security threat</kwd></kwd-group><kwd-group xml:lang="en"><kwd>expert system</kwd><kwd>artificial intelligence technologies</kwd><kwd>information security</kwd><kwd>information protection</kwd><kwd>information security threat</kwd></kwd-group></article-meta></front><back><ref-list><title>Список литературы</title><ref id="B1"><mixed-citation>Seraphim B.I., Palit Sh., Srivastava K., Poovammal E. A Survey on Machine Learning Techniques in Network Intrusion Detection System. &amp;ndash; 2018. &amp;ndash; pp. 1-5. DOI: 10.1109/CCAA.2018.8777596.</mixed-citation></ref><ref id="B2"><mixed-citation>Mua U.S., Chakraborty S., Abdullahi M.M., Maini T. A Review on Intrusion Detection System using Machine Learning Techniques, 2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), Greater Noida, India, 2021. &amp;ndash; pp. 541-549, DOI: 10.1109/ICCCIS51004.2021.9397121.</mixed-citation></ref><ref id="B3"><mixed-citation>Prajapati A., Gupta Sh. A Survey: Data Mining and Machine Learning Methods for Cyber Security. International Journal of Scientific Research in Computer Science, Engineering and Information Technology. &amp;ndash; 2021. &amp;ndash; pp. 24-34. DOI: 10.32628/CSEIT217212.</mixed-citation></ref><ref id="B4"><mixed-citation>Veeramreddy J., Prasad K. Anomaly-Based Intrusion Detection System. &amp;ndash; 2019. DOI: 10.5772/intechopen.82287.</mixed-citation></ref><ref id="B5"><mixed-citation>Dutta A. Random Forest Classifier Based Network Intrusion Detection System. Engineering, Technology and Applied Science Research. &amp;ndash; 2021. &amp;ndash; No 9. &amp;ndash; Pp. 4603-4608. DOI: 10.22214/ijraset.2021.35406.</mixed-citation></ref><ref id="B6"><mixed-citation>Abdelaziz M.T., Radwan A., Mamdouh H. et al. Enhancing Network Threat Detection with Random Forest-Based NIDS and Permutation Feature Importance. J Netw Syst Manage. &amp;ndash; 2025. &amp;ndash; 33, 2. https://doi.org/10.1007/s10922-024-09874-0</mixed-citation></ref><ref id="B7"><mixed-citation>Prajapati P.K., Singh I., Subhashini N. Network Intrusion Detection Using Machine Learning. In: Subhashini N., Ezra M.A.G., Liaw SK. (eds) Futuristic Communication and Network Technologies. Lecture Notes in Electrical Engineering, vol 966. Springer, Singapore. &amp;ndash; 2023. https://doi.org/10.1007/978-981-19-8338-2_4</mixed-citation></ref><ref id="B8"><mixed-citation>Sowmya T., Anita M. A novel stable feature selection algorithm for machine learning based intrusion detection system. Procedia Computer Science. &amp;ndash; 2025. &amp;ndash; P. 252. 738-747. DOI: 10.1016/j.procs.2025.01.034.</mixed-citation></ref><ref id="B9"><mixed-citation>Babicheva M.V., Tretyakov I.A. Application of machine learning methods for automated detection of network intrusions. Herald of Dagestan State Technical University. Technical Sciences. &amp;ndash; 2023. &amp;ndash; 50(1). &amp;ndash; pp. 53-61. (In Russ.) https://doi.org/10.21822/2073-6185-2023-50-1-53-61</mixed-citation></ref><ref id="B10"><mixed-citation>Gaiduk K.A., Iskhakov A.Yu. On the Implementation of Algorithms for Detecting Insider Threats Using Machine Learning. Vestnik SibGUTI. &amp;ndash; 2022. &amp;ndash; 16. &amp;ndash; No. 4. &amp;ndash; pp. 80-95. https://doi.org/10.55648/1998-6920-2022-16-4-80-95.</mixed-citation></ref><ref id="B11"><mixed-citation>Meshcheryakov R.V., Melnikov S.Yu., Peresypkin V.A., Khorev A.A. Promising Directions for the Application of Artificial Intelligence Technologies in Information Security. Cybersecurity Issues. &amp;ndash; 2024. &amp;ndash; No.&amp;nbsp;4(62). &amp;ndash; pp. 2-12. https://doi.org/10.21681/2311-3456-2024-4-02-12.</mixed-citation></ref><ref id="B12"><mixed-citation>Selemenev A.V., Astakhova I.F., Trofimenko E.V. Application of Artificial Immune Systems for Detecting Network Intrusions. Vestnik of Voronezh State University. Series: System Analysis and Information Technologies. &amp;ndash; 2019. &amp;ndash; No. 2. &amp;ndash; pp. 49&amp;ndash;56.</mixed-citation></ref><ref id="B13"><mixed-citation>Kotenko I.V., Kuleshov A.A., Ushakov I.A. System for Collecting, Storing and Processing Security Information and Events Based on Elastic Stack Tools. Proceedings of SPIIRAN. &amp;ndash; 2017. &amp;ndash; No. 5(54). &amp;ndash; pp. 5-34. https://doi.org/10.15622/sp.54.1.</mixed-citation></ref><ref id="B14"><mixed-citation>Carbone P., Katsifodimos A., Ewen S., Markl V., Haridi S., Tzoumas K. Apache Flink&amp;trade;: Stream and Batch Processing in a Single Engine. IEEE Data Engineering Bulletin. &amp;ndash; 2015. &amp;ndash; 38(4). &amp;ndash; pp. 28-38 p.</mixed-citation></ref><ref id="B15"><mixed-citation>Daksa R., Kemala A. A Comparative Study on Real Time Data Streaming for Fraud Detection Using Kafka with Apache Flink and Apache Spark. Procedia Computer Science. &amp;ndash; 2025. &amp;ndash; 269. &amp;ndash; pp. 192-199. DOI: 10.1016/j.procs.2025.08.272.</mixed-citation></ref><ref id="B16"><mixed-citation>Diana Julie M.D. Exploring the Paradigm Shift: Harnessing Data Analytics for Real &amp;ndash; World Applications&amp;nbsp; / D. Diana Julie M // International Journal of Science and Research. &amp;ndash; 2023. &amp;ndash; Vol. 12, No. 6. &amp;ndash; P.&amp;nbsp;1467-1480. &amp;ndash; DOI: 10.21275/sr23611121501. &amp;ndash; EDN IVRRST.</mixed-citation></ref><ref id="B17"><mixed-citation>Redchenkov D.S., Ilin D.I. Pandas Library for Data Analysis in Python. In Information and Computational Technologies and Their Applications: Collection of Articles of the XXIX International Scientific and Technical Conference, Penza, August 15&amp;ndash;16, 2025. &amp;ndash; pp. 178&amp;ndash;182. Penza: Penza State University of Architecture and Construction, 2025.</mixed-citation></ref><ref id="B18"><mixed-citation>Moustafa N., Jill S. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) 2015 Military Communications and Information Systems Conference (MilCIS). Canberra, ACT, &amp;ndash; 2015. pp. 1-6. DOI: 10.1109/MilCIS.2015.7348942</mixed-citation></ref><ref id="B19"><mixed-citation>Kumar V., Das A., Sinha D. Statistical Analysis of the UNSW-NB15 Dataset for Intrusion Detection. &amp;ndash; 2020. DOI: 10.1007/978-981-13-9042-5_24.</mixed-citation></ref><ref id="B20"><mixed-citation>Meliboyev A. Long Short Term Memory Algorithm in Intrusion Detection: A Deep Learning Approach to Time Series Data. SSRN Electronic Journal. &amp;ndash; 2025. DOI: 10.2139/ssrn.5527203.</mixed-citation></ref></ref-list></back></article>