Data-Driven Network Analysis for Anomaly Traffic Detection.

Sensors (Basel)

Electrical and Computer Engineering Department, Prairie View A&M University, Prairie View, TX 77446, USA.

Published: September 2023

Cybersecurity is a critical issue in today's internet world. Classical security systems, such as firewalls based on signature detection, cannot detect today's sophisticated zero-day attacks. Machine learning (ML) based solutions are more attractive for their capabilities of detecting anomaly traffic from benign traffic, but to develop an ML-based anomaly detection system, we need meaningful or realistic network datasets to train the detection engine. There are many public network datasets for ML applications. Still, they have limitations, such as the data creation process and the lack of diverse attack scenarios or background traffic. To create a good detection engine, we need a realistic dataset with various attack scenarios and various types of background traffic, such as HTTPs, streaming, and SMTP traffic. In this work, we have developed realistic network data or datasets considering various attack scenarios and diverse background/benign traffic. Furthermore, considering the importance of distributed denial of service (DDoS) attacks, we have compared the performance of detecting anomaly traffic of some classical supervised and our prior developed unsupervised ML algorithms based on the convolutional neural network (CNN) and pseudo auto-encoder (AE) architecture based on the created datasets. The results show that the performance of the CNN-Pseudo-AE is comparable to that of many classical supervised algorithms. Hence, the CNN-Pseudo-AE algorithm is promising in actual implementation.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC10574999PMC
http://dx.doi.org/10.3390/s23198174DOI Listing

Publication Analysis

Top Keywords

anomaly traffic
12
attack scenarios
12
traffic
8
detecting anomaly
8
realistic network
8
network datasets
8
detection engine
8
background traffic
8
classical supervised
8
detection
5

Similar Publications

Introduction: The prevalence of maxillofacial fractures is rising due to increased road traffic accidents, necessitating prompt and effective management, especially in cases of panfacial fractures. The primary objective in treating such fractures is to restore occlusion and stabilize midface buttresses and pillars.

Case Report: This article presents the case of a 56-year-old male who sustained panfacial fractures following a road accident, exhibiting symptoms including facial pain and nosebleeds.

View Article and Find Full Text PDF

In recent years, the growing number of vehicles on the road have exacerbated issues related to safety and traffic congestion. However, the advent of the Internet of Vehicles (IoV) holds the potential to transform mobility, enhance traffic management and safety, and create smarter, more interconnected road networks. This paper addresses key road safety concerns, focusing on driver condition detection, vehicle monitoring, and traffic and road management.

View Article and Find Full Text PDF

Combating trade in illegal wood and forest products with machine learning.

PLoS One

January 2025

Department of Computer Science, Virginia Tech, Arlington, VA, United States of America.

Trade in wood and forest products spans the global supply chain. Illegal logging and associated trade in forest products present a persistent threat to vulnerable ecosystems and communities. Illegal timber trade has been linked to violations of tax and conservation laws, as well as broader transnational crimes.

View Article and Find Full Text PDF

The superposition of heavy metals (HMs) from multiple anthropogenic sources in geochemical anomaly areas makes it difficult to discriminate prime sources in atmospheric HMs. This study utilized a combination of microscopic features, positive matrix factorisation, and Pb isotope fingerprints to trace the main sources of HMs bound to total suspended particulates (TSP) at a pollution site (Msoshui: MS) and control site (Lushan: LS) in northwestern Guizhou. The results reveal that the concentrations of Cd, Pb, Cr, As, Cu, Ni, and Zn in the TSP of LS are 3.

View Article and Find Full Text PDF

An optimized LSTM-based deep learning model for anomaly network intrusion detection.

Sci Rep

January 2025

Department of Electrical and Electronics Engineering, Manipal Institute of Technology Bengaluru, Manipal Academy of Higher Education, Manipal, India.

The increasing prevalence of network connections is driving a continuous surge in the requirement for network security and safeguarding against cyberattacks. This has triggered the need to develop and implement intrusion detection systems (IDS), one of the key components of network perimeter aimed at thwarting and alleviating the issues presented by network invaders. Over time, intrusion detection systems have been instrumental in identifying network breaches and deviations.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!