Machine learning for anomaly detection: A systematic review

AB Nassif, MA Talib, Q Nasir, FM Dakalbab - Ieee Access, 2021 - ieeexplore.ieee.org
Anomaly detection has been used for decades to identify and extract anomalous
components from data. Many techniques have been used to detect anomalies. One of the …

Network anomaly detection: methods, systems and tools

MH Bhuyan, DK Bhattacharyya… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
Network anomaly detection is an important and dynamic research area. Many network
intrusion detection methods and systems (NIDS) have been proposed in the literature. In this …

Anomaly-based intrusion detection from network flow features using variational autoencoder

S Zavrak, M Iskefiyeli - IEEE Access, 2020 - ieeexplore.ieee.org
The rapid increase in network traffic has recently led to the importance of flow-based
intrusion detection systems processing a small amount of traffic data. Furthermore, anomaly …

A hybrid unsupervised clustering-based anomaly detection method

G Pu, L Wang, J Shen, F Dong - Tsinghua Science and …, 2020 - ieeexplore.ieee.org
In recent years, machine learning-based cyber intrusion detection methods have gained
increasing popularity. The number and complexity of new attacks continue to rise; therefore …

Machine-learning-assisted security and privacy provisioning for edge computing: A survey

S Singh, R Sulthana, T Shewale… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Edge computing (EC), is a technological game changer that has the ability to connect
millions of sensors and provide services at the device end. The broad vision of EC integrates …

A real-time and ubiquitous network attack detection based on deep belief network and support vector machine

H Zhang, Y Li, Z Lv, AK Sangaiah… - IEEE/CAA Journal of …, 2020 - ieeexplore.ieee.org
In recent years, network traffic data have become larger and more complex, leading to
higher possibilities of network intrusion. Traditional intrusion detection methods face …

A survey of network flow applications

B Li, J Springer, G Bebis, MH Gunes - Journal of Network and Computer …, 2013 - Elsevier
It has been over 16 years since Cisco's NetFlow was patented in 1996. Extensive research
has been conducted since then and many applications have been developed. In this survey …

Security data collection and data analytics in the internet: A survey

X Jing, Z Yan, W Pedrycz - IEEE Communications Surveys & …, 2018 - ieeexplore.ieee.org
Attacks over the Internet are becoming more and more complex and sophisticated. How to
detect security threats and measure the security of the Internet arises a significant research …

Real time intrusion detection system for ultra-high-speed big data environments

MM Rathore, A Ahmad, A Paul - The Journal of Supercomputing, 2016 - Springer
In recent years, the number of people using the Internet and network services is increasing
day by day. On a daily basis, a large amount of data is generated over the Internet from zeta …

Adriot: An edge-assisted anomaly detection framework against iot-based network attacks

R Li, Q Li, J Zhou, Y Jiang - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) has entered a stage of rapid development and increasing
deployment. Meanwhile, these low-power devices typically cannot support complex security …