Predictive Modeling for Network Anomaly Detection using Machine Learning

被引:0
|
作者
Sivakumar, G. [1 ]
Amsaveni, K. [2 ]
Chandralekha, R. [1 ]
SrirengaNachiyar, V [3 ]
Vaitheki, S. [4 ]
Marichamy, P. [5 ]
机构
[1] Ramco Inst Technol, Dept ECE, Rajapalayam, India
[2] Natl Engn Coll, Dept CSE, Kovilpatti, India
[3] Ramco Inst Technol, Dept Elect & Commun Engn, Rajapalayam, Tamil Nadu, India
[4] PSRR Coll Engn, Dept ECE, Sivakasi, India
[5] PSR Engn Coll, Dept ECE, Sivakasi, India
来源
2ND INTERNATIONAL CONFERENCE ON SUSTAINABLE COMPUTING AND SMART SYSTEMS, ICSCSS 2024 | 2024年
关键词
Anomoly Detection; Network Security; Machine Learning; Random Forest; Support Vector Machine; KNN; INTRUSION DETECTION;
D O I
10.1109/ICSCSS60660.2024.10625631
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The protection of networks from unauthorized access is challenging, traditional cannot effectively prevent malicious intrusions. Now -a -days Anomaly detection relies heavily on machine learning to identify the complexity of Network Data Variability of Attack Patterns, Imbalanced Datasets. Automated anomaly detection can be accomplished without explicit programming by using supervised, unsupervised, or semi-supervised learning techniques to detect outliers in complex data sets. By harnessing the power of data-driven learning, machine learning algorithms exhibit the capacity to discern novel and previously uncharted attacks, dynamically adjust to shifting network conditions, and notably diminish instances of false positives and negatives. The incorporation of machine learning into intrusion detection proves indispensable as networks continue their evolution toward heightened complexity. This study presents four popular machine learning algorithms: Naive Bayes, K-Nearest Neighbors (KNN), Support Vector Machines (SVM), and Random Forest for anomaly detection in network. The CICIDS2017 dataset, known for its contemporaneity and extensive attack diversity, serves as the experimental foundation. Employing the Random Forest Regression algorithm, a meticulous process of feature selection was conducted. The ensuing application phase involved the utilization of distinct machine learning algorithms, resulting in remarkable performance outcomes. Specifically, the success rates achieved by various machine learning algorithms.
引用
收藏
页码:965 / 970
页数:6
相关论文
共 50 条
  • [1] Simulation and Modeling for Anomaly Detection in IoT Network Using Machine Learning
    Mukherjee, Indrajit
    Sahu, Nilesh Kumar
    Sahana, Sudip Kumar
    INTERNATIONAL JOURNAL OF WIRELESS INFORMATION NETWORKS, 2023, 30 (02) : 173 - 189
  • [2] A machine learning framework for network anomaly detection using SVM and GA
    Shon, T
    Kim, Y
    Lee, C
    Moon, A
    PROCEEDINGS FROM THE SIXTH ANNUAL IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2005, : 176 - 183
  • [3] Simulation and Modeling for Anomaly Detection in IoT Network Using Machine Learning
    Indrajit Mukherjee
    Nilesh Kumar Sahu
    Sudip Kumar Sahana
    International Journal of Wireless Information Networks, 2023, 30 : 173 - 189
  • [4] A hybrid machine learning approach to network anomaly detection
    Shon, Taeshik
    Moon, Jongsub
    INFORMATION SCIENCES, 2007, 177 (18) : 3799 - 3821
  • [5] Network Traffic Anomaly Detection using Machine Learning Approaches
    Limthong, Kriangkrai
    Tawsook, Thidarat
    2012 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (NOMS), 2012, : 542 - 545
  • [6] Machine Learning in Network Anomaly Detection: A Survey
    Wang, Song
    Balarezo, Juan Fernando
    Kandeepan, Sithamparanathan
    Al-Hourani, Akram
    Chavez, Karina Gomez
    Rubinstein, Benjamin
    IEEE ACCESS, 2021, 9 : 152379 - 152396
  • [7] Senspy: An Integrated Network Monitoring and Anomaly Detection System Using Machine Learning
    Jnyanadeep, Bandaru
    Mittal, Nikunj
    Srivishnu, P. N.
    Varshith, Y.
    Mohana
    Moharir, Minal
    Kumar, Ashok A. R.
    2024 IEEE SPACE, AEROSPACE AND DEFENCE CONFERENCE, SPACE 2024, 2024, : 61 - 65
  • [8] Anomaly Detection Based on Profile Signature in Network Using Machine Learning Technique
    Atefi, Kayvan
    Rezaei, Amirali
    Yahya, Saadiah
    Hashim, Siti Hazyanti Binti Mohd
    2016 IEEE REGION 10 SYMPOSIUM (TENSYMP), 2016, : 71 - 76
  • [9] Anomaly detection in blockchain using network representation and machine learning
    Martin, Kevin
    Rahouti, Mohamed
    Ayyash, Moussa
    Alsmadi, Izzat
    SECURITY AND PRIVACY, 2022, 5 (02)
  • [10] IoT Network Anomaly Detection in Smart Homes Using Machine Learning
    Sarwar, Nadeem
    Bajwa, Imran Sarwar
    Hussain, Muhammad Zunnurain
    Ibrahim, Muhammad
    Saleem, Khizra
    IEEE ACCESS, 2023, 11 : 119462 - 119480