Versatile unsupervised anomaly detection method for RTE-based networks

GS Sestito, AC Turcato, AL Dias, P Ferrari… - Expert Systems with …, 2022 - Elsevier
Reliability and dependability are critical demands of the fourth industrial revolution that Real-
time Ethernet (RTE) networks have to meet. The use of anomaly detection and prevention …

A general optimization-based approach to the detection of real-time Ethernet traffic events

GS Sestito, AC Turcato, AL Dias, P Ferrari, DH Spatti… - Computers in …, 2021 - Elsevier
One of the most used technologies in industrial automation is industrial Ethernet. RTE
protocols can cope with the requirements of the Industry 4.0 frameworks. However, the …

Recursive feature elimination and clustering technique for network anomaly detection

RK Jeyauthmigha, RC Suganthe - … International Conference on …, 2018 - ieeexplore.ieee.org
Nowadays the number of people using the network has increased with the increase in
security threats. So, anomaly detection technique Recursive feature elimination and …

Network anomaly detection using two-dimensional hidden markov model based viterbi algorithm

S Alhaidari, M Zohdy - 2019 IEEE International Conference On …, 2019 - ieeexplore.ieee.org
Network anomaly detection has become very important area for both industrial application
and academic research in the recent years. It is involved widely in a broad spectrum of …

TransKS: An Anomaly Detection Method for Telecommunication Networks Based on Deep Learning

J Zheng, D Feng, Z Yang, Y Xiang, H Zhang… - IEEE Access, 2023 - ieeexplore.ieee.org
As the scale of telecommunication networks continues to grow, the structure of network
elements becomes increasingly complex. Consequently, the data service has experienced a …

Network anomaly detection based on late fusion of several machine learning algorithms

TH Hai, E nam Huh - International Journal of Computer …, 2020 - khu.elsevierpure.com
Today's Internet and enterprise networks are so popular as they can easily provide
multimedia and e-commerce services to millions of users over the Internet in our daily lives …

[PDF][PDF] Online and Scalable Unsupervised Network Anomaly Detection Method

D Juliette, R Gilles, O Philippe - IEEE Transactions on Network and …, 2016 - hal.laas.fr
Nowadays, network intrusion detectors mainly rely on knowledge databases to detect
suspicious traffic. These databases have to be continuously updated which requires …

A deep one-class model for network anomaly detection

S Dai, J Yan, X Wang, L Zhang - IOP Conference Series …, 2019 - iopscience.iop.org
For traditional network anomaly detection system, the detection performance is related to the
selected features and training dataset. But traditional methods adopt handcraft feature …

Study and evaluation of unsupervised algorithms used in network anomaly detection

J Dromard, P Owezarski - … of the Future Technologies Conference (FTC) …, 2020 - Springer
Network anomalies are unusual traffic mainly induced by network attacks or network failures.
Therefore it is important for network operators as end users to detect and diagnose them to …

Network anomaly detection and identification based on deep learning methods

M Zhu, K Ye, CZ Xu - Cloud Computing–CLOUD 2018: 11th International …, 2018 - Springer
Network anomaly detection is the process of determining when network behavior has
deviated from the normal behavior. The detection of abnormal events in large dynamic …