<?xml version="1.0" encoding="UTF-8"?>
<article article-type="research-article" dtd-version="1.3" xml:lang="ru" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamespaceSchemaLocation="https://metafora.rcsi.science/xsd_files/journal3.xsd">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">moitvivt</journal-id>
      <journal-title-group>
        <journal-title xml:lang="ru">Моделирование, оптимизация и информационные технологии</journal-title>
        <trans-title-group xml:lang="en">
          <trans-title>Modeling, Optimization and Information Technology</trans-title>
        </trans-title-group>
      </journal-title-group>
      <issn pub-type="epub">2310-6018</issn>
      <publisher>
        <publisher-name>Издательство</publisher-name>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.26102/2310-6018/2025.51.4.019</article-id>
      <article-id pub-id-type="custom" custom-type="elpub">2060</article-id>
      <title-group>
        <article-title xml:lang="ru">Машинное обучение в защите веб-приложений: современные тренды и перспективы</article-title>
        <trans-title-group xml:lang="en">
          <trans-title>Machine learning in web application security: current trends and prospects</trans-title>
        </trans-title-group>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <name-alternatives>
            <name name-style="eastern" xml:lang="ru">
              <surname>Ледовская</surname>
              <given-names>Екатерина Валерьевна</given-names>
            </name>
            <name name-style="western" xml:lang="en">
              <surname>Ledovskaya</surname>
              <given-names>Ekaterina Valerievna</given-names>
            </name>
          </name-alternatives>
          <email>ekvaled@mail.ru</email>
          <xref ref-type="aff">aff-1</xref>
        </contrib>
      </contrib-group>
      <aff-alternatives id="aff-1">
        <aff xml:lang="ru">МИРЭА - Российский технологический университет</aff>
        <aff xml:lang="en">MIREA - Russian Technological University</aff>
      </aff-alternatives>
      <pub-date pub-type="epub">
        <day>01</day>
        <month>01</month>
        <year>2026</year>
      </pub-date>
      <volume>1</volume>
      <issue>1</issue>
      <elocation-id>10.26102/2310-6018/2025.51.4.019</elocation-id>
      <permissions>
        <copyright-statement>Copyright © Авторы, 2026</copyright-statement>
        <copyright-year>2026</copyright-year>
        <license license-type="creative-commons-attribution" xlink:href="https://creativecommons.org/licenses/by/4.0/">
          <license-p>This work is licensed under a Creative Commons Attribution 4.0 International License</license-p>
        </license>
      </permissions>
      <self-uri xlink:href="https://moitvivt.ru/ru/journal/article?id=2060"/>
      <abstract xml:lang="ru">
        <p>Стремительная эволюция киберугроз и их возрастающая сложность обусловливают критическую необходимость интеграции методов машинного обучения в системы защиты веб-приложений. Настоящее исследование представляет комплексный анализ современных подходов к применению алгоритмов машинного обучения в архитектуре межсетевых экранов веб-приложений (WAF) с фокусом на повышение эффективности детектирования атак нулевого дня. Методологическая основа исследования включает сравнительный анализ производительности ансамблевых методов, глубокого обучения и трансформерных архитектур на стандартизированных наборах данных CSIC 2010 и CIC-IDS2017. Эмпирическая база исследования составила 2,847,372 HTTP-запроса, проанализированных с использованием 14 различных алгоритмов машинного обучения в период с июня по декабрь 2024 года. Результаты демонстрируют превосходство гибридных архитектур LSTM-трансформер с достигнутой точностью 98,73 % для детектирования SQL-инъекций и 97,84 % для XSS-атак, что превышает производительность традиционных сигнатурных методов на 23,7 %. Установлено, что применение техник конструирования признаков в сочетании с методами Random Forest и Extreme Gradient Boosting обеспечивает повышение метрики F1-score до 0,989 при сокращении времени обработки запросов в 18 раз относительно алгоритмов на основе правил. Практическая значимость исследования заключается в разработке адаптивной архитектуры WAF, способной к автоматической корректировке параметров детектирования в реальном времени с учетом развивающегося ландшафта угроз. Теоретический вклад работы состоит в формализации принципов интеграции механизмов самовнимания в задачи анализа HTTP-трафика и обосновании оптимальных конфигураций многоголового внимания для различных типов веб-атак.</p>
      </abstract>
      <trans-abstract xml:lang="en">
        <p>The rapid evolution of cyber threats and their increasing sophistication necessitate the critical integration of machine learning methods into web application protection systems. This study presents a comprehensive analysis of modern approaches to applying machine learning algorithms within Web Application Firewall (WAF) architectures, with a focus on enhancing zero-day attack detection efficacy. The methodological framework of the research involves a comparative performance analysis of ensemble methods, deep learning, and transformer architectures on standardized datasets CSIC 2010 and CIC-IDS2017. The empirical basis of the study comprised 2,847,372 HTTP requests analyzed using 14 different machine learning algorithms between June and December 2024. The results demonstrate the superiority of hybrid LSTM-Transformer architectures, achieving an accuracy of 98.73% for SQL injection detection and 97.84% for XSS attacks, which exceeds the performance of traditional signature-based methods by 23.7%. It was established that the application of feature engineering techniques combined with Random Forest and Extreme Gradient Boosting methods provides an increase in the F1-score metric to 0.989 while reducing request processing time by a factor of 18 compared to rule-based engines. The practical significance of the research lies in the development of an adaptive WAF architecture capable of automatic real-time adjustment of detection parameters in response to the evolving threat landscape. The theoretical contribution of the work consists of the formalization of principles for integrating self-attention mechanisms into HTTP traffic analysis tasks and the justification of optimal multi-head attention configurations for different types of web attacks.</p>
      </trans-abstract>
      <kwd-group xml:lang="ru">
        <kwd>машинное обучение</kwd>
        <kwd>межсетевой экран веб-приложений</kwd>
        <kwd>глубокое обучение</kwd>
        <kwd>трансформерные архитектуры</kwd>
        <kwd>детектирование аномалий</kwd>
        <kwd>кибербезопасность</kwd>
        <kwd>ансамблевые методы</kwd>
      </kwd-group>
      <kwd-group xml:lang="en">
        <kwd>machine learning</kwd>
        <kwd>web application firewall</kwd>
        <kwd>deep learning</kwd>
        <kwd>transformer architectures</kwd>
        <kwd>anomaly detection</kwd>
        <kwd>cybersecurity</kwd>
        <kwd>ensemble methods</kwd>
      </kwd-group>
      <funding-group>
        <funding-statement xml:lang="ru">Исследование выполнено без спонсорской поддержки.</funding-statement>
        <funding-statement xml:lang="en">The study was performed without external funding.</funding-statement>
      </funding-group>
    </article-meta>
  </front>
  <back>
    <ref-list>
      <title>References</title>
      <ref id="cit1">
        <label>1</label>
        <mixed-citation xml:lang="ru">Román-Gallego J.-A., Pérez-Delgado M.-L., Viñuela M.L., Vega-Hernández M.-C. Artificial Intelligence Web Application Firewall for Advanced Detection of Web Injection Attacks. Expert Systems. 2023;42(1). https://doi.org/10.1111/exsy.13505</mixed-citation>
      </ref>
      <ref id="cit2">
        <label>2</label>
        <mixed-citation xml:lang="ru">Shaheed A., Kurdy M.H.D.B. Web Application Firewall Using Machine Learning and Features Engineering. Security and Communication Networks. 2022;2022. https://doi.org/10.1155/2022/5280158</mixed-citation>
      </ref>
      <ref id="cit3">
        <label>3</label>
        <mixed-citation xml:lang="ru">Dawadi B.R., Adhikari B., Srivastava D.K. Deep Learning Technique-Enabled Web Application Firewall for the Detection of Web Attacks. Sensors. 2023;23(4). https://doi.org/10.3390/s23042073</mixed-citation>
      </ref>
      <ref id="cit4">
        <label>4</label>
        <mixed-citation xml:lang="ru">Vartouni A.M., Teshnehlab M., Kashi S.S. Leveraging Deep Neural Networks for Anomaly‐Based Web Application Firewall. IET Information Security. 2019;13(4). https://doi.org/10.1049/iet-ifs.2018.5404</mixed-citation>
      </ref>
      <ref id="cit5">
        <label>5</label>
        <mixed-citation xml:lang="ru">Hartono B., Silalahi F.D., Muthohir M. Transformers in Cybersecurity: Advancing Threat Detection and Response Through Machine Learning Architectures. Journal of Technology Informatics and Engineering. 2024;3(3):382–396. https://doi.org/10.51903/jtie.v3i3.211</mixed-citation>
      </ref>
      <ref id="cit6">
        <label>6</label>
        <mixed-citation xml:lang="ru">Avci C., Tekinerdogan B., Catal C. Design Tactics for Tailoring Transformer Architectures to Cybersecurity Challenges. Cluster Computing. 2024;27:9587–9613. https://doi.org/10.1007/s10586-024-04355-0</mixed-citation>
      </ref>
      <ref id="cit7">
        <label>7</label>
        <mixed-citation xml:lang="ru">Junior M.D., Ebecken N.F.F. A New WAF Architecture with Machine Learning for Resource-Efficient Use. Computers &amp; Security. 2021;106. https://doi.org/10.1016/j.cose.2021.102290</mixed-citation>
      </ref>
      <ref id="cit8">
        <label>8</label>
        <mixed-citation xml:lang="ru">Applebaum S., Gaber T., Ahmed A. Signature-Based and Machine-Learning-Based Web Application Firewalls: A Short Survey. Procedia Computer Science. 2021;189:359–367. https://doi.org/10.1016/j.procs.2021.05.105</mixed-citation>
      </ref>
      <ref id="cit9">
        <label>9</label>
        <mixed-citation xml:lang="ru">Belavagi M.C., Muniyal B. Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection. Procedia Computer Science. 2016;89:117–123. https://doi.org/10.1016/j.procs.2016.06.016</mixed-citation>
      </ref>
      <ref id="cit10">
        <label>10</label>
        <mixed-citation xml:lang="ru">Urda D., Martínez B., Basurto N., Kull M., Arroyo Á., Herrero Á. Enhancing Web Traffic Attacks Identification Through Ensemble Methods and Feature Selection. arXiv. URL: https://arxiv.org/abs/2412.16791 [Accessed 15th July 2025].</mixed-citation>
      </ref>
      <ref id="cit11">
        <label>11</label>
        <mixed-citation xml:lang="ru">Franklin J. The Elements of Statistical Learning: Data Mining, Inference, and Prediction. The Mathematical Intelligencer. 2005;27:83–85. https://doi.org/10.1007/BF02985802</mixed-citation>
      </ref>
      <ref id="cit12">
        <label>12</label>
        <mixed-citation xml:lang="ru">Sukumar J.V.A., Pranav I., Neetish M.M., Narayanan J. Network Intrusion Detection Using Improved Genetic k-Means Algorithm. In: 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 19–22 September 2018, Bangalore, India. IEEE; 2018. P. 2441–2446. https://doi.org/10.1109/ICACCI.208.8554710</mixed-citation>
      </ref>
      <ref id="cit13">
        <label>13</label>
        <mixed-citation xml:lang="ru">Vaswani A., Shazeer N., Parmar N., et al. Attention Is All You Need. arXiv. URL: https://arxiv.org/abs/1706.03762 [Accessed 15th July 2025].</mixed-citation>
      </ref>
      <ref id="cit14">
        <label>14</label>
        <mixed-citation xml:lang="ru">Tavallaee M., Bagheri E., Lu W., Ghorbani A.A. A Detailed Analysis of the KDD CUP 99 Data Set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 08–10 July 2009, Ottawa, ON, Canada. IEEE; 2009. P. 1–6. https://doi.org/10.1109/CISDA.2009.5356528</mixed-citation>
      </ref>
      <ref id="cit15">
        <label>15</label>
        <mixed-citation xml:lang="ru">Shiravi A., Shiravi H., Tavallaee M., Ghorbani A.A. Toward Developing a Systematic Approach to Generate Benchmark Datasets for Intrusion Detection. Computers &amp; Security. 2012;31(3):357–374. https://doi.org/10.1016/j.cose.2011.12.012</mixed-citation>
      </ref>
    </ref-list>
    <fn-group>
      <fn fn-type="conflict">
        <p>The authors declare that there are no conflicts of interest present.</p>
      </fn>
    </fn-group>
  </back>
</article>