2021
DOI: 10.1109/access.2021.3126834
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning in Network Anomaly Detection: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
39
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 58 publications
(40 citation statements)
references
References 98 publications
0
39
0
1
Order By: Relevance
“…The focus here is on novel ML-based IDS. The ML-based anomaly detection methods in IDS [19] can be classified into supervised learning, semi-supervised learning, unsupervised learning, reinforcement learning, and graph neural networks [20]. The limitations of traditional (shallow) ML-based IDS, such as the reliance on manual feature engineering to extract useful information from network traffic and dealing with unlabeled, high-dimensional data, have paved the way for Deep Learning (DL)-based IDS [21] that do not require manual feature engineering and can automatically learn complex features from raw data due to their deeper structure [22].…”
Section: A Anomaly Detectionmentioning
confidence: 99%
“…The focus here is on novel ML-based IDS. The ML-based anomaly detection methods in IDS [19] can be classified into supervised learning, semi-supervised learning, unsupervised learning, reinforcement learning, and graph neural networks [20]. The limitations of traditional (shallow) ML-based IDS, such as the reliance on manual feature engineering to extract useful information from network traffic and dealing with unlabeled, high-dimensional data, have paved the way for Deep Learning (DL)-based IDS [21] that do not require manual feature engineering and can automatically learn complex features from raw data due to their deeper structure [22].…”
Section: A Anomaly Detectionmentioning
confidence: 99%
“…Аналіз роботи цих засобів показує, що більшість із них виконують лише одну або кілька специфічних функцій, які не можуть забезпечити тією чи іншою мірою складності захисту інформації, необхідної для майбутніх інфокомунікаційних мереж. Також, згідно із [4][5][6][7], встановлено, що наявні DPI системи потрубують нових інтелектуальних алгоритмів виявлення аномалій та атак для забезпечення необхідного рівня якості обслуговування та безпеки в перспективних програмно-конфігурованих мережах. Для ефективнішого виявлення нових атак у роботі [8] запропоновано модель виявлення аномалії із використанням вектора показника Херста та мультифрактального спектра.…”
Section: вступunclassified
“…Different from conventional methods, the application of machine learning in network traffic forwarding policy making can reduce the technical risk caused by manual maintenance of the rule base, increase the hit rate of judging abnormal traffic, and reduce the investment cost of hardware equipment [20,21]. The existing machine learning methods for traffic forwarding policy making are mainly divided into unsupervised learning methods and supervised learning methods [21,22]. Although unsupervised learning does not need to label abnormal sample data, it requires a large number of samples for training, and the model effect is not as good as supervised learning methods [21,23].…”
Section: Introductionmentioning
confidence: 99%
“…The existing machine learning methods for traffic forwarding policy making are mainly divided into unsupervised learning methods and supervised learning methods [21,22]. Although unsupervised learning does not need to label abnormal sample data, it requires a large number of samples for training, and the model effect is not as good as supervised learning methods [21,23]. The supervised learning methods produce models with good adaptability by clustering abnormal sample data, but the common supervised learning methods also have the disadvantage of insufficient interpretability [21].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation