“…As a direction for further research, it is proposed to develop other models and evaluate the results obtained on the basis of other methods of data mining [23][24][25][26][27][28]. In addition, the actual construction and practical use of intelligent decision support systems [29][30][31][32][33][34] to identify and prevent network attacks on computer systems.…”