A review of neural networks for anomaly detection

JE De Albuquerque Filho, LCP Brandao… - IEEE …, 2022 - ieeexplore.ieee.org
Anomaly detection is a critical issue across several academic fields and real-world
applications. Artificial neural networks have been proposed to detect anomalies from …

Distributed anomaly detection using concept drift detection based hybrid ensemble techniques in streamed network data

M Jain, G Kaur - Cluster Computing, 2021 - Springer
Ever since the internet became part of the everyday lives of humans providing network
security has been considered of utmost importance. Over the years lot of time and energy …

A computationally efficient dimensionality reduction and attack classification approach for network intrusion detection

ND Patel, BM Mehtre, R Wankar - International Journal of Information …, 2024 - Springer
An intrusion detection system (IDS) is a system that monitors network traffic for malicious
activity and generates alerts. In anomaly-based detection, machine learning (ML) algorithms …

Intrusion detection system using resampled dataset-a comparative study

ND Patel, BM Mehtre, R Wankar - International Journal of …, 2023 - inderscienceonline.com
Existing machine-learning research aims to improve the predictive capability of datasets
using various feature selection and classification models. In the intrusion detection, data …

A Novel Distributed Anomaly Intrusion Detection Model for Drone Swarm Network in Smart Nations

M Jain, A Arora - … On Smart Technologies For Smart Nation …, 2023 - ieeexplore.ieee.org
In the recent years, drones have been extensively used in variety of fields and given the
essential nature of drone swarm services, such as network traffic monitoring and search and …

Performance evaluation of machine learning algorithms for network anomaly detection: an approach through the AHP-TOPSIS-2N method

GB do Nascimento, M dos Santos - Procedia Computer Science, 2022 - Elsevier
The biggest challenge for cyber security lies in the detection of anomalies in networks.
Machine learning techniques participate in the automation of the detection process. In this …

An ECOSVS-based support vector machine for network anomaly detection

M Jain, V Saxena - International Journal of Data Analysis …, 2022 - inderscienceonline.com
In this paper, the support vector machine (SVM) classification technique to classify normal
and attack traffic in the Spark distributed environment has been introduced and evaluated. In …

Detecting and Mitigating Advanced Persistent Threats using Machine Learning Techniques

CL Kannankeril George - 2024 - esource.dbs.ie
Intrusion detection systems play a pivotal role in safeguarding networks by analyzing
network data to identify potential intrusions. The effectiveness of these systems relies on …

Data Security Detection and Location Technology Based on DLP Network

W Zhan, M Yu, B **, F Guo, G Deng, R Liao… - … conference on Smart …, 2021 - Springer
Faced with a complex network environment, network security issues are getting more and
more serious. Cyber attacks will not only leak user privacy, but also cause huge economic …