State-of-the-art in artificial neural network applications: A survey

OI Abiodun, A Jantan, AE Omolara, KV Dada… - Heliyon, 2018 - cell.com
This is a survey of neural network applications in the real-world scenario. It provides a
taxonomy of artificial neural networks (ANNs) and furnish the reader with knowledge of …

A survey on data-driven network intrusion detection

D Chou, M Jiang - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Data-driven network intrusion detection (NID) has a tendency towards minority attack
classes compared to normal traffic. Many datasets are collected in simulated environments …

Incremental learning algorithms and applications

A Gepperth, B Hammer - European symposium on artificial neural …, 2016 - hal.science
Incremental learning refers to learning from streaming data, which arrive over time, with
limited memory resources and, ideally, without sacrificing model accuracy. This setting fits …

Malicious message analysis system

A Singh - US Patent 10,050,998, 2018 - Google Patents
A computerized technique is provided to analyze a message for malware by determining
context information from attributes of the message. The attributes are determined by …

An online offline framework for anomaly scoring and detecting new traffic in network streams

M Odiathevar, WKG Seah, M Frean… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Network data constantly evolves with new network applications and protocols. There is a
need for robust techniques to detect anomalous behaviour. Offline models trained with static …

Data-driven network intrusion detection: A taxonomy of challenges and methods

D Chou, M Jiang - arXiv preprint arXiv:2009.07352, 2020 - arxiv.org
Data-driven methods have been widely used in network intrusion detection (NID) systems.
However, there are currently a number of challenges derived from how the datasets are …

A basisevolution framework for network traffic anomaly detection

H Xia, B Fang, M Roughan, K Cho, P Tune - Computer Networks, 2018 - Elsevier
Traffic anomalies arise from network problems, and so detection and diagnosis are useful
tools for network managers. A great deal of progress has been made on this problem so far …

Malicious message analysis system

A Singh - US Patent 10,581,898, 2020 - Google Patents
(57) ABSTRACT A computerized technique is provided to analyze a message for malware
by determining context information from attri butes of the message. The attributes are …

A hybrid online offline system for network anomaly detection

M Odiathevar, WKG Seah… - 2019 28th International …, 2019 - ieeexplore.ieee.org
With the advancement in technology, normal network traffic is becoming more
heterogeneous. In this scenario, the problem of detecting anomalies is intensified. In the …

A real-time network security visualization system based on incremental learning (ChinaVis 2018)

X Fan, C Li, X Dong - Journal of Visualization, 2019 - Springer
The real-time analysis of network data is of great significance to network security.
Visualization technology and machine learning can assist in network data analysis from …