Application of Deep Learning Methods in Cybersecurity Tasks. Part 2