KIBERXAVFSIZLIKDA ISOLATION FOREST YORDAMIDA ANOMALIYALARNI ANIQLASH

Authors

  • G‘ulomov Sherzod Rajaboyevich Muhammad al-Xorazmiy nomidagi Toshkent axborot texnologiyalari universiteti
  • Normirzayev Farrux Abdurahimovich Muhammad al-Xorazmiy nomidagi Toshkent axborot texnologiyalari universiteti

Keywords:

kiberxavfsizlik, anomaliya aniqlash, Isolation forest, chuqur o‘rganish, suqilib kirishni aniqlash, sun’iy intellekt

Abstract

Maqolada kiberxavfsizlik sohasida anomaliyalarni aniqlashning dolzarb muammolari va ularni hal qilishda sun’iy intellekt texnologiyalarining roli ko‘rib chiqiladi. Zamonaviy kiberhujumlarning murakkablashuvi va an’anaviy himoya usullarining cheklanganligi sababli, mashinaviy o‘rganishga asoslangan yondashuvlar, xususan, Isolation forest modellari muhim ahamiyat kasb etmoqda.
Jahon miqyosida kiberhujumlar natijasida yetkazilgan zarar 2024 yilda 9,5 trillion AQSH dollariga yetgan bo‘lib, 2025 yilda 10,5 trillion dollardan oshishi kutilmoqda. O‘zbekistonda esa 2023–2024 yillarda kiberjinoyatlar soni keskin oshib, yetkazilgan zarar milliardlab so‘mni tashkil etgan.
Maqolada Isolation forestning nazariy asoslari, arxitekturasi, rivojlanish tarixi, afzalliklari va kamchiliklari batafsil tahlil qilinadi. Ushbu modelning suqilib kirishlarni aniqlash tizimlari (IDS), zararli dasturlarni aniqlash, ichki tahdidlar va IoT xavfsizligidagi amaliy qo‘llanilishi misollar bilan ko‘rsatiladi. Kelajakda transformer va gibrid modellarning integratsiyasi orqali samaradorlikni oshirish imkoniyatlari muhokama qilinadi.

References

1. Liu, F. T., Ting, K. M., Zhou, Z. H. (2008). Isolation Forest. In: 2008 Eighth IEEE International Conference on Data Mining, pp. 413–422. DOI: 10.1109/ICDM.2008.17.

2. Hariri, S., Carrasco Kind, M., Brunner, R. J. (2019). Extended Isolation Forest. IEEE Transactions on Knowledge and Data Engineering, vol. 33, no. 4, pp. 1479–1489. DOI: 10.1109/TKDE.2019.2947676.

3. Xu, H., Pang, G., Wang, Y., Wang, Y. (2023). Deep Isolation Forest for Anomaly Detection. IEEE Transactions on Knowledge and Data Engineering, vol. 35, no. 10, pp. 10486–10496. DOI: 10.1109/TKDE.2022.3228181.

4. Liu, F. T., Ting, K. M., Zhou, Z. H. (2012). Isolation-based anomaly detection. ACM Transactions on Knowledge Discovery from Data, vol. 6, no. 1, pp. 3:1–3:39. DOI: 10.1145/2133360.2133363.

5. Ahmad, M., Imran, K., Attar, H., Solyman, A. (2025). Isolation Forest-based anomaly detection through generation offers enhanced network security. Computers & Security, vol. 142.

6. Key Cyber Security Statistics for 2025. SentinelOne; 2025. manzil: https://www.sentinelone.com/cybersecurity-101/cybersecurity/cyber-security-statistics

7. Cybersecurity Statistics 2025: Rising Threats and Industry Impact. Fortinet; 2025. manzil: https://www.fortinet.com/resources/cyberglossary/cybersecurity-statistics

Downloads

Published

2026-02-17

How to Cite

KIBERXAVFSIZLIKDA ISOLATION FOREST YORDAMIDA ANOMALIYALARNI ANIQLASH. (2026). DIGITAL TRANSFORMATION AND ARTIFICIAL INTELLIGENCE, 4(1), 68-75. https://dtai.tsue.uz/index.php/dtai/article/view/v4i19