Network anomaly detection with the restricted Boltzmann machine

U Fiore, F Palmieri, A Castiglione, A De Santis - Neurocomputing, 2013 - Elsevier
With the rapid growth and the increasing complexity of network infrastructures and the
evolution of attacks, identifying and preventing network abuses is getting more and more …

[HTML][HTML] An evaluation of the performance of Restricted Boltzmann Machines as a model for anomaly network intrusion detection

T Aldwairi, D Perera, MA Novotny - Computer Networks, 2018 - Elsevier
The continuous increase in the number of attacks on computer networks has raised serious
concerns regarding the importance of establishing a methodology that can learn and adapt …

A survey of deep learning-based network anomaly detection

D Kwon, H Kim, J Kim, SC Suh, I Kim, KJ Kim - Cluster Computing, 2019 - Springer
A great deal of attention has been given to deep learning over the past several years, and
new deep learning techniques are emerging with improved functionality. Many computer …

[HTML][HTML] Analysis of network traffic features for anomaly detection

F Iglesias, T Zseby - Machine Learning, 2015 - Springer
Anomaly detection in communication networks provides the basis for the uncovering of
novel attacks, misconfigurations and network failures. Resource constraints for data storage …

HELAD: A novel network anomaly detection model based on heterogeneous ensemble learning

Y Zhong, W Chen, Z Wang, Y Chen, K Wang, Y Li… - Computer Networks, 2020 - Elsevier
Network traffic anomaly detection is an important technique of ensuring network security.
However, there are usually three problems with existing machine learning based anomaly …

Anomaly detection approaches for communication networks

M Thottan, G Liu, C Ji - Algorithms for next generation networks, 2010 - Springer
In recent years, network anomaly detection has become an important area for both
commercial interests as well as academic research. Applications of anomaly detection …

[PDF][PDF] Machine learning approaches to network anomaly detection

T Ahmed, B Oreshkin, M Coates - … of the 2nd USENIX workshop on …, 2007 - usenix.org
Networks of various kinds often experience anoma-lous behaviour. Examples include
attacks or large data transfers in IP networks, presence of intruders in distributed video …

[HTML][HTML] Network traffic anomaly detection via deep learning

K Fotiadou, TH Velivassaki, A Voulkidis, D Skias… - Information, 2021 - mdpi.com
Network intrusion detection is a key pillar towards the sustainability and normal operation of
information systems. Complex threat patterns and malicious actors are able to cause severe …

Network anomaly detection and classification via opportunistic sampling

G Androulidakis, V Chatzigiannakis… - IEEE …, 2009 - ieeexplore.ieee.org
In this article the emphasis is placed on the evaluation of the impact of intelligent flow
sampling techniques on the detection and classification of network anomalies. Based on the …

[图书][B] Network anomaly detection: A machine learning perspective

DK Bhattacharyya, JK Kalita - 2013 - books.google.com
With the rapid rise in the ubiquity and sophistication of Internet technology and the
accompanying growth in the number of network attacks, network intrusion detection has …