2021
DOI: 10.3390/info12050215
|View full text |Cite
|
Sign up to set email alerts
|

Network Traffic Anomaly Detection via Deep Learning

Abstract: Network intrusion detection is a key pillar towards the sustainability and normal operation of information systems. Complex threat patterns and malicious actors are able to cause severe damages to cyber-systems. In this work, we propose novel Deep Learning formulations for detecting threats and alerts on network logs that were acquired by pfSense, an open-source software that acts as firewall on FreeBSD operating system. pfSense integrates several powerful security services such as firewall, URL filtering, and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 34 publications
(13 citation statements)
references
References 53 publications
0
13
0
Order By: Relevance
“…Figs. [5][6][7][8][9][10][11] illustrates the comparison of the performance metrics in storage overhead, response time, accuracy, attack detection rate, precision, recall, and f-measure. The proposed work achieved less storage overhead due to DAG-based network construction and Multi-zone-wise blockchain.…”
Section: Research Summarymentioning
confidence: 99%
See 1 more Smart Citation
“…Figs. [5][6][7][8][9][10][11] illustrates the comparison of the performance metrics in storage overhead, response time, accuracy, attack detection rate, precision, recall, and f-measure. The proposed work achieved less storage overhead due to DAG-based network construction and Multi-zone-wise blockchain.…”
Section: Research Summarymentioning
confidence: 99%
“…These approaches failed to apply to large volumes of intrusions and had low accuracy and precision [5]. Several existing methods implemented various deep learning techniques to detect the attacks efficiently [6,7]. Most of the attack patterns are similar to benign patterns, but it increases the risk of intrusions.…”
Section: Introductionmentioning
confidence: 99%
“…The most significant indicator that quantitatively evaluates the performance of the proposed architectures is the (Accuracy, Acc) metric, defined as follows [24]:…”
Section: Evaluation Metricsmentioning
confidence: 99%
“…Semisupervised anomaly detection methods extract training data from a sufficiently large amount of collected logs or network measurements to provide accurate estimates of the probability distribution of the normal and malicious classes. Unsupervised anomaly detection methodologies aim to automatically identify normal network behaviors from abnormal ones without exploiting labeled data [11]. Moreover, there are also three main anomaly detection methods based on Deep Learning, including Boltzmann Machine-(RBM-) based [12], Stacked Auto Encoders-(SAE-) based [13], and Convolutional Neural Network-(CNN-) based [14].…”
Section: Related Workmentioning
confidence: 99%