2021
DOI: 10.3390/e23050529
|View full text |Cite
|
Sign up to set email alerts
|

A Review on Machine Learning Approaches for Network Malicious Behavior Detection in Emerging Technologies

Abstract: Network anomaly detection systems (NADSs) play a significant role in every network defense system as they detect and prevent malicious activities. Therefore, this paper offers an exhaustive overview of different aspects of anomaly-based network intrusion detection systems (NIDSs). Additionally, contemporary malicious activities in network systems and the important properties of intrusion detection systems are discussed as well. The present survey explains important phases of NADSs, such as pre-processing, feat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 29 publications
(12 citation statements)
references
References 114 publications
(170 reference statements)
0
10
0
Order By: Relevance
“…The feature values are translated to an acceptable confidence interval in this process 8,47 . The key benefit of this measure is that it eliminates dataset bias without changing the predictive properties of the features.…”
Section: Proposed Methodologymentioning
confidence: 99%
See 3 more Smart Citations
“…The feature values are translated to an acceptable confidence interval in this process 8,47 . The key benefit of this measure is that it eliminates dataset bias without changing the predictive properties of the features.…”
Section: Proposed Methodologymentioning
confidence: 99%
“…Different methods, such as Argus, Netmate, and others, are used to gather network traffic features. 8 The data in the UNSW-NB15 are divided into six feature categories to define user behavior: basic, flow, content, time created, and additional features. Utilizing the transactional flow identifiers and the transaction times, these features are derived.…”
Section: Feature Creationmentioning
confidence: 99%
See 2 more Smart Citations
“…It reduces the impact of network security events by monitoring abnormal behaviour in the network and linking with other security systems [2]. In recent years, the relevant technologies of the system have been deeply integrated with deep learning (DL), and a variety of network anomaly detection methods based on deep learning have been derived [3,4].…”
Section: Introductionmentioning
confidence: 99%