2020
DOI: 10.1109/access.2020.2973023
|View full text |Cite
|
Sign up to set email alerts
|

An Unsupervised Deep Learning Model for Early Network Traffic Anomaly Detection

Abstract: Various attacks have emerged as the major threats to the success of a connected world like the Internet of Things (IoT), in which billions of devices interact with each other to facilitate human life. By exploiting the vulnerabilities of cheap and insecure devices such as IP cameras, an attacker can create hundreds of thousands of zombie devices and then launch massive volume attacks to take down any target. For example, in 2016, a record large-scale DDoS attack launched by millions of Mirai-injected IP camera… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
54
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 166 publications
(69 citation statements)
references
References 27 publications
(34 reference statements)
0
54
0
1
Order By: Relevance
“…Distributed service attack can be launched from different computers controlled by one command center [11]. A group of computers called zombies can be used to launch a DDoS attack on the SDN network [11]. No doubt SDN is a great networking architecture, however, DDoS attacks can bring the whole network down if the network is not secured.…”
Section: Distributed Denial Of Service Attack (Ddos)mentioning
confidence: 99%
“…Distributed service attack can be launched from different computers controlled by one command center [11]. A group of computers called zombies can be used to launch a DDoS attack on the SDN network [11]. No doubt SDN is a great networking architecture, however, DDoS attacks can bring the whole network down if the network is not secured.…”
Section: Distributed Denial Of Service Attack (Ddos)mentioning
confidence: 99%
“…The exploitation of ML algorithms in the field of cybersecurity is drawing many researchers in this direction, as it is taking security countermeasures to a new level. Concepts such as anomalybased detection, recognition strategies, and network traffic pattern analysis have been intensively discussed in many studies [24]- [28] . Therefore, adopting artificial intelligence (AI) concepts, and ML algorithms in particular, contribute to the development of innovative and effective security solutions that differ from known traditional solutions such as anti-virus software, firewalls, and encryption.…”
Section: B Machine Learning For Es Cybersecuritymentioning
confidence: 99%
“…To discriminate between normal and abnormal traffic, and to auto-profile traffic patterns, D-PACK has been proposed [9]. is approach integrates an unsupervised CNN model to investigate just the first few bytes of the first few packets in each flow, therefore detecting abnormal traffic early using raw packet-level data.…”
Section: Related Work and Motivationmentioning
confidence: 99%
“…Two major gaps were seen during the literature review of anomaly detection problems. Firstly, there is a high falsealarm rate [8][9][10] for the methods used in anomaly detection. Secondly, training datasets were used in the training as well as the testing of models, employing cross-validation processes.…”
Section: Introductionmentioning
confidence: 99%