2020
DOI: 10.18080/jtde.v8n4.307
|View full text |Cite
|
Sign up to set email alerts
|

Review of Current Machine Learning Approaches for Anomaly Detection in Network Traffic

Abstract: Due to the advance in network technologies, the number of network users is growing rapidly, which leads to the generation of large network traffic data. This large network traffic data is prone to attacks and intrusions. Therefore, the network needs to be secured and protected by detecting anomalies as well as to prevent intrusions into networks. Network security has gained attention from researchers and network laboratories. In this paper, a comprehensive survey was completed to give a broad perspective of wh… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
9
1

Relationship

3
7

Authors

Journals

citations
Cited by 26 publications
(16 citation statements)
references
References 63 publications
0
9
0
Order By: Relevance
“…We measured our cryptography scheme’s performance by selecting some basic parameters to assess the algorithm. Visual inspection is one of the main parameters for assessing the encrypted images [ 51 , 52 , 53 ]. The characteristic diffusion survey is another parameter [ 54 , 55 ] determined for judging the randomization algorithm.…”
Section: Proposed Algorithmmentioning
confidence: 99%
“…We measured our cryptography scheme’s performance by selecting some basic parameters to assess the algorithm. Visual inspection is one of the main parameters for assessing the encrypted images [ 51 , 52 , 53 ]. The characteristic diffusion survey is another parameter [ 54 , 55 ] determined for judging the randomization algorithm.…”
Section: Proposed Algorithmmentioning
confidence: 99%
“…Automated recognition of patterns in data by computers based on knowledge already obtained is called pattern recognition. It has applications in image analysis, information retrieval, signal processing, bioinformatics, data compression, statistical data analysis, computer graphics, and machine learning [27,31,33,[41][42][43][44].…”
Section: Local Directional Numbermentioning
confidence: 99%
“…e set of type two fuzzy sets, the rules of algebraic operations, and the properties of the affiliation function are discussed [10]. e representation of type-two fuzzy numbers is newly defined in reference [11], by which theorems for the intersection, merge, and complement operations of type-two fuzzy numbers are derived without using the extension principle [11]. e intersection, merge, and complement operations for interval type-two fuzzy sets are defined, while the footprint uncertainty is proposed, and it is pointed out that the footprint uncertainty is the plane region constituted by the set of principal affiliation degrees [12].…”
Section: Status Of Researchmentioning
confidence: 99%