CINXE.COM

Real-time Network Anomaly Detection Systems Based on Machine-Learning Algorithms

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Real-time Network Anomaly Detection Systems Based on Machine-Learning Algorithms</title> <meta name="description" content="Real-time Network Anomaly Detection Systems Based on Machine-Learning Algorithms"> <meta name="keywords" content="Cyber-security, Intrusion Detection Systems, Temporal Graph Network, Anomaly Detection."> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <meta name="citation_title" content="Real-time Network Anomaly Detection Systems Based on Machine-Learning Algorithms"> <meta name="citation_author" content="Zahra Ramezanpanah"> <meta name="citation_author" content="Joachim Carvallo"> <meta name="citation_author" content="Aurelien Rodriguez"> <meta name="citation_publication_date" content="2023/02/01"> <meta name="citation_journal_title" content="International Journal of Computer and Information Engineering"> <meta name="citation_volume" content="17"> <meta name="citation_issue" content="2"> <meta name="citation_firstpage" content="93"> <meta name="citation_lastpage" content="99"> <meta name="citation_pdf_url" content="https://publications.waset.org/10012933/pdf"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value=""> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 33093</div> </div> </div> </div> <div class="card publication-listing mt-3 mb-3"> <h5 class="card-header" style="font-size:.9rem">Real-time Network Anomaly Detection Systems Based on Machine-Learning Algorithms</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/search?q=Zahra%20Ramezanpanah">Zahra Ramezanpanah</a>, <a href="https://publications.waset.org/search?q=Joachim%20Carvallo"> Joachim Carvallo</a>, <a href="https://publications.waset.org/search?q=Aurelien%20Rodriguez"> Aurelien Rodriguez</a> </p> <p class="card-text"><strong>Abstract:</strong></p> <p>This paper aims to detect anomalies in streaming data using machine learning algorithms. In this regard, we designed two separate pipelines and evaluated the effectiveness of each separately. The first pipeline, based on supervised machine learning methods, consists of two phases. In the first phase, we trained several supervised models using the UNSW-NB15 data set. We measured the efficiency of each using different performance metrics and selected the best model for the second phase. At the beginning of the second phase, we first, using Argus Server, sniffed a local area network. Several types of attacks were simulated and then sent the sniffed data to a running algorithm at short intervals. This algorithm can display the results of each packet of received data in real-time using the trained model. The second pipeline presented in this paper is based on unsupervised algorithms, in which a Temporal Graph Network (TGN) is used to monitor a local network. The TGN is trained to predict the probability of future states of the network based on its past behavior. Our contribution in this section is introducing an indicator to identify anomalies from these predicted probabilities. </p> <iframe src="https://publications.waset.org/10012933.pdf" style="width:100%; height:400px;" frameborder="0"></iframe> <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/search?q=Cyber-security" title="Cyber-security">Cyber-security</a>, <a href="https://publications.waset.org/search?q=Intrusion%20Detection%20Systems" title=" Intrusion Detection Systems"> Intrusion Detection Systems</a>, <a href="https://publications.waset.org/search?q=Temporal%0D%0AGraph%20Network" title=" Temporal Graph Network"> Temporal Graph Network</a>, <a href="https://publications.waset.org/search?q=Anomaly%20Detection." title=" Anomaly Detection."> Anomaly Detection.</a> </p> <a href="https://publications.waset.org/10012933/real-time-network-anomaly-detection-systems-based-on-machine-learning-algorithms" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/10012933/apa" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">APA</a> <a href="https://publications.waset.org/10012933/bibtex" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">BibTeX</a> <a href="https://publications.waset.org/10012933/chicago" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Chicago</a> <a href="https://publications.waset.org/10012933/endnote" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">EndNote</a> <a href="https://publications.waset.org/10012933/harvard" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Harvard</a> <a href="https://publications.waset.org/10012933/json" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">JSON</a> <a href="https://publications.waset.org/10012933/mla" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">MLA</a> <a href="https://publications.waset.org/10012933/ris" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">RIS</a> <a href="https://publications.waset.org/10012933/xml" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">XML</a> <a href="https://publications.waset.org/10012933/iso690" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">ISO 690</a> <a href="https://publications.waset.org/10012933.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">505</span> </span> <p class="card-text"><strong>References:</strong></p> <br>[1] Godala, Sravanthi, and Rama Prasad V. Vaddella. ”A study on intrusion detection system in wireless sensor networks.” International Journal of Communication Networks and Information Security 12.1 (2020): 127-141. <br>[2] Lyon GF. Nmap network scanning: The official Nmap project guide to network discovery and security scanning. Insecure. Com LLC (US); 2008. <br>[3] Sarker, Iqbal H., et al. ”Cybersecurity data science: an overview from machine learning perspective.” Journal of Big data 7.1 (2020): 1-29. <br>[4] Moustafa N, Slay J. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In2015 military communications and information systems conference (MilCIS) 2015 Nov 10 (pp. 1-6). IEEE. <br>[5] Seufert, Stefan, and Darragh O’Brien. ”Machine learning for automatic defence against distributed denial of service attacks.” 2007 IEEE International Conference on Communications. IEEE, 2007. <br>[6] Alazab, Ammar, et al. ”Using feature selection for intrusion detection system.” 2012 international symposium on communications and information technologies (ISCIT). IEEE, 2012. <br>[7] Buczak, Anna L., and Erhan Guven. ”A survey of data mining and machine learning methods for cyber security intrusion detection.” IEEE Communications surveys & tutorials 18.2 (2015): 1153-1176. <br>[8] Sarker, Iqbal H., A. S. M. Kayes, and Paul Watters. ”Effectiveness analysis of machine learning classification models for predicting personalized context-aware smartphone usage.” Journal of Big Data 6.1 (2019): 1-28. <br>[9] Li, Yinhui, et al. ”An efficient intrusion detection system based on support vector machines and gradually feature removal method.” Expert systems with applications 39.1 (2012): 424-430. <br>[10] Brugger, T. ”KDD cup’99 dataset (network intrusion) considered harmful, 15 September 2007. Retrieved January 26, 2008.” (2007). <br>[11] Hosseinzadeh, Mehdi, et al. ”Improving security using SVM-based anomaly detection: issues and challenges.” Soft Computing 25.4 (2021): 3195-3223. <br>[12] Yang, Kun, Samory Kpotufe, and Nick Feamster. ”An Efficient One-Class SVM for Anomaly Detection in the Internet of Things.” arXiv preprint arXiv:2104.11146 (2021). <br>[13] Shapoorifard, Hossein, and Pirooz Shamsinejad. ”Intrusion detection using a novel hybrid method incorporating an improved KNN.” Int. J. Comput. Appl 173.1 (2017): 5-9. <br>[14] Serpen, Gursel, and Ehsan Aghaei. ”Host-based misuse intrusion detection using PCA feature extraction and kNN classification algorithms.” Intelligent Data Analysis 22.5 (2018): 1101-1114. <br>[15] Salama, Mostafa A., et al. ”Hybrid intelligent intrusion detection scheme.” Soft computing in industrial applications. Springer, Berlin, Heidelberg, 2011. 293-303. <br>[16] Al-Yaseen, Wathiq Laftah, Zulaiha Ali Othman, and Mohd Zakree Ahmad Nazri. ”Real-time intrusion detection system using multi-agent system.” IAENG International Journal of Computer Science 43.1 (2016): 80-90. <br>[17] Yan, Weizhong, and Lijie Yu. ”On accurate and reliable anomaly detection for gas turbine combustors: A deep learning approach.” arXiv preprint arXiv:1908.09238 (2019). <br>[18] Protogerou, Aikaterini, et al. ”A graph neural network method for distributed anomaly detection in IoT.” Evolving Systems 12.1 (2021): 19-36. <br>[19] Kolias, Constantinos, et al. ”DDoS in the IoT: Mirai and other botnets.” Computer 50.7 (2017): 80-84. <br>[20] Rossi, Emanuele, et al. ”Temporal graph networks for deep learning on dynamic graphs.” arXiv preprint arXiv:2006.10637 (2020). <br>[21] B´eres, Ferenc, et al. ”Node embeddings in dynamic graphs.” Applied Network Science 4.1 (2019): 1-25. <br>[22] Kazemi, Seyed Mehran, et al. ”Representation Learning for Dynamic Graphs: A Survey.” J. Mach. Learn. Res. 21.70 (2020): 1-73. <br>[23] Sokolova, Marina, and Guy Lapalme. ”A systematic analysis of performance measures for classification tasks.” Information processing & management 45.4 (2009): 427-437. <br>[24] DataReportal (2021), “Digital 2021 Global Digital Overview,” retrieved from https://datareportal.com/reports/digital-2021-global-digital-overview <br>[25] Liu, Hongyu, and Bo Lang. ”Machine learning and deep learning methods for intrusion detection systems: A survey.” applied sciences 9.20 (2019): 4396. </div> </div> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10