Machine learning for anomaly detection: A systematic review

AB Nassif, MA Talib, Q Nasir, FM Dakalbab - Ieee Access, 2021 - ieeexplore.ieee.org
Anomaly detection has been used for decades to identify and extract anomalous
components from data. Many techniques have been used to detect anomalies. One of the …

A comprehensive survey on machine learning for networking: evolution, applications and research opportunities

R Boutaba, MA Salahuddin, N Limam, S Ayoubi… - Journal of Internet …, 2018 - Springer
Abstract Machine Learning (ML) has been enjoying an unprecedented surge in applications
that solve problems and enable automation in diverse domains. Primarily, this is due to the …

A hybrid deep learning-based model for anomaly detection in cloud datacenter networks

S Garg, K Kaur, N Kumar, G Kaddoum… - … on Network and …, 2019 - ieeexplore.ieee.org
With the emergence of the Internet-of-Things (IoT) and seamless Internet connectivity, the
need to process streaming data on real-time basis has become essential. However, the …

Hybrid deep-learning-based anomaly detection scheme for suspicious flow detection in SDN: A social multimedia perspective

S Garg, K Kaur, N Kumar… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The continuous development and usage of multi-media-based applications and services
have contributed to the exponential growth of social multimedia traffic. In this context, secure …

Network anomaly detection: methods, systems and tools

MH Bhuyan, DK Bhattacharyya… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
Network anomaly detection is an important and dynamic research area. Many network
intrusion detection methods and systems (NIDS) have been proposed in the literature. In this …

Practical evasion of a learning-based classifier: A case study

N Šrndić, P Laskov - 2014 IEEE symposium on security and …, 2014 - ieeexplore.ieee.org
Learning-based classifiers are increasingly used for detection of various forms of malicious
data. However, if they are deployed online, an attacker may attempt to evade them by …

Toward supervised anomaly detection

N Görnitz, M Kloft, K Rieck, U Brefeld - Journal of Artificial Intelligence …, 2013 - jair.org
Anomaly detection is being regarded as an unsupervised learning task as anomalies stem
from adversarial or unlikely events with unknown distributions. However, the predictive …

Distributed abnormal behavior detection approach based on deep belief network and ensemble SVM using spark

N Marir, H Wang, G Feng, B Li, M Jia - IEEE Access, 2018 - ieeexplore.ieee.org
The emergence of Internet connectivity has led to a significant increase in the volume and
complexity of cyber attacks. Abnormal behavior detection systems are valuable tools for …

TR‐IDS: Anomaly‐based intrusion detection through text‐convolutional neural network and random forest

E Min, J Long, Q Liu, J Cui… - Security and …, 2018 - Wiley Online Library
As we head towards the IoT (Internet of Things) era, protecting network infrastructures and
information security has become increasingly crucial. In recent years, Anomaly‐Based …

[КНИГА][B] Network anomaly detection: A machine learning perspective

DK Bhattacharyya, JK Kalita - 2013 - books.google.com
With the rapid rise in the ubiquity and sophistication of Internet technology and the
accompanying growth in the number of network attacks, network intrusion detection has …