An intelligent ensemble of long‐short‐term memory with genetic algorithm for network anomaly identification

IS Thaseen, AK Chitturi, F Al‐Turjman… - Transactions on …, 2022 - Wiley Online Library
Cyberattacks are increasing rapidly with rapid Internet advancement and, the cybersecurity
situation is not optimistic. Anomaly detection is one of the challenging sectors of network …

Network anomaly detection technology based on deep learning

AD Eunice, Q Gao, MY Zhu, Z Chen… - 2021 IEEE 3rd …, 2021 - ieeexplore.ieee.org
To improve the accuracy and real-time performance of anomaly detection models in
complex network environments, a network anomaly detection model based on random forest …

An efficient hybrid anomaly detection scheme using K-means clustering for wireless sensor networks

M Wazid, AK Das - Wireless Personal Communications, 2016 - Springer
Sensor nodes in a wireless sensor network (WSN) may be lost due to enervation or
malicious attacks by an adversary. WSNs deployed for several applications including …

Network anomaly detection: methods, systems and tools

MH Bhuyan, DK Bhattacharyya… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
Network anomaly detection is an important and dynamic research area. Many network
intrusion detection methods and systems (NIDS) have been proposed in the literature. In this …

Network anomaly detection and identification based on deep learning methods

M Zhu, K Ye, CZ Xu - Cloud Computing–CLOUD 2018: 11th International …, 2018 - Springer
Network anomaly detection is the process of determining when network behavior has
deviated from the normal behavior. The detection of abnormal events in large dynamic …

[PDF][PDF] Anomaly detection using artificial neural network

M Pradhan, SK Pradhan, SK Sahu - International Journal of Engineering …, 2012 - Citeseer
In this research, anomaly detection using neural network is introduced. This research aims
to experiment with user behaviour as parameters in anomaly intrusion detection using a …

Detecting attacks in high-speed networks: Issues and solutions

A Gupta, LS Sharma - Information Security Journal: A Global …, 2020 - Taylor & Francis
Intrusion detection systems are one of the necessities of networks to identify the problem of
network attacks. Organizations striving to protect their data from intruders are often …

Big data analytics for network anomaly detection from netflow data

DS Terzi, R Terzi, S Sagiroglu - 2017 International Conference …, 2017 - ieeexplore.ieee.org
Cyber-attacks was organized in a simple and random way in the past. However attacks are
carried out systematically and long term nowadays. In addition, the high calculation volume …

Towards a multi‐layers anomaly detection framework for analyzing network traffic

B Li, S Zhang, K Li - Concurrency and computation: practice …, 2017 - Wiley Online Library
Anomaly detection plays a crucial part in identifying unforeseen attacks for network and
information security. However, the accuracy of existing network anomaly detection …

Network anomaly detection using lightgbm: A gradient boosting classifier

MK Islam, P Hridi, MS Hossain… - 2020 30th international …, 2020 - ieeexplore.ieee.org
Anomaly detection systems are significant in recognizing intruders or suspicious activities by
detecting unseen and unknown attacks. In this paper, we have worked on a benchmark …