2012 IEEE Network Operations and Management Symposium 2012
DOI: 10.1109/noms.2012.6211951
|View full text |Cite
|
Sign up to set email alerts
|

Network traffic anomaly detection using machine learning approaches

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…A. Our approach ML-based anomaly detection techniques have shown promising results in the past [15], [16]. Malware detection in network traffic is necessary nonetheless an overhead in customer-facing services like IoT devices.…”
Section: Methodsmentioning
confidence: 99%
“…A. Our approach ML-based anomaly detection techniques have shown promising results in the past [15], [16]. Malware detection in network traffic is necessary nonetheless an overhead in customer-facing services like IoT devices.…”
Section: Methodsmentioning
confidence: 99%
“…It can be in various forms, like malware recognition, anomaly detection, or behavior classification. Detecting cyber attacks using ML has shown promising results in the past [22,23]. However, their deployment on IoT devices is unrealistic, as they involve computationally extensive feature engineering and require deep classifiers for precision.…”
Section: Feature Engineering-less MLmentioning
confidence: 99%
“…Signature-based NAD can detect attacks in specific patterns through rule matching [2]. Although it has the advan-tages of high accuracy and rapid speed, the manually set rules cannot adapt to continuously changing network environment and fails on zero-day attacks.…”
Section: Introductionmentioning
confidence: 99%