2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT) 2020
DOI: 10.1109/iciot48696.2020.9089465
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning Techniques for Network Anomaly Detection: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 50 publications
(17 citation statements)
references
References 22 publications
0
8
0
Order By: Relevance
“…There are different algorithms proposed in the literature for OCL that address distance, clustering, density, ensembles, and learning-based methods divided into Active Learning (Pimentel et al, 2018), graphs (Eltanbouly et al, 2020;Akoglu et al, 2015), and Deep Learning (Chalapathy & Chawla, 2019;Manevitz and Yousef 2007). However, there are still few studies that apply OCL for text classification (Alam et al, 2020;Khan & Madden, 2014;Perera et al, 2021;Wang et al, 2019).…”
Section: One-class Learningmentioning
confidence: 99%
“…There are different algorithms proposed in the literature for OCL that address distance, clustering, density, ensembles, and learning-based methods divided into Active Learning (Pimentel et al, 2018), graphs (Eltanbouly et al, 2020;Akoglu et al, 2015), and Deep Learning (Chalapathy & Chawla, 2019;Manevitz and Yousef 2007). However, there are still few studies that apply OCL for text classification (Alam et al, 2020;Khan & Madden, 2014;Perera et al, 2021;Wang et al, 2019).…”
Section: One-class Learningmentioning
confidence: 99%
“…In our approach, we used three machine learning algorithms, namely One-Class Support Vector Machines (OCSVMs), Local Outlier Factor (LOFs), and Autoencoders (AEs). These algorithms were selected as they represent a set of frequently used unsupervised machine learning algorithms for anomaly detection in the recent literature [39][40][41][42][43]. Since these algorithms are unsupervised machine learning algorithms, they do not require any labeled data to train these algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…Akoglu et al [24], Ranshous et al [45], and Jennifer and Kumar [46] put their concentration on graph anomaly detection and reviewed many conventional approaches in this area including statistical models and machine learning techniques. Other surveys (e.g., [3], [5], [17], and [47]- [51].) were dedicated to particular applications of graph anomaly detection, such as computer network intrusion detection and anomaly detection in online social networks.…”
Section: Existing Anomaly Detection Surveysmentioning
confidence: 99%