Anomaly Detection in Network Traffic Using Unsupervised Machine Learning

Author:

Dipali Paradhi 1,Mehjabeen Naghma Ansari 1,Sharmila More 1

Affiliation:

1. MIT Arts, Commerce and Science College, Alandi, Pune, Maharashtra, India

Abstract

With the increasing complexity and volume of network traffic, the detection of anomalies has become crucial for maintaining the security and efficiency of computer networks. Traditional rule-based methods often struggle to keep pace with the evolving nature of Cyber threats. In this paper, we propose utilizing unsupervised machine learning techniques for anomaly detection in network traffic. We explore various algorithms including k-means clustering, Isolation Forest, and auto encoders to identify abnormal patterns within network data without the need for labeled examples. Our experiments demonstrate the effectiveness of these approaches in detecting anomalies accurately and efficiently. Furthermore, we discuss the challenges and opportunities in deploying unsupervised machine learning for network anomaly detection in real-world scenarios. This research contributes to the advancement of Cyber security by providing novel methodologies for detecting suspicious activities within network traffic data, thereby enhancing the resilience of computer networks against emerging threats. Unsupervised methods, such as clustering algorithms like k-means or density-based techniques like DB-SCAN, can detect deviations from normal patterns in network traffic, indicating potential intrusions or anomalies. These systems analyze various features of network traffic, such as packet headers, traffic volume, and protocol behavior, to identify suspicious activity. However, they may also generate false positives and require careful tuning to balance detection accuracy and performance

Publisher

Naksh Solutions

Reference31 articles.

1. Machine Learning Technique For Anomaly Detection:An Overview(International journal of computer application (0975-8887)) authors by salimomar,AsriNgadi,HamidH.jebur

2. Unsupervised Clustering approach For Network Anomaly Detection ,authorized by IwanSysrif,AdamPrugel-Bennett and Gary Wills.

3. Rawat,S.2005. Efficient Data Mining Algorithms for Intrusion Detection. in Proceedings of the 4th Conference on Engineering of Intelligent Systems (EIS’04).

4. Kohonen, 1995.” Self-Organizing Map”. Springer,Berlin,

5. Nasraoui, O., Leon, E. &Krishnapuram, R. 2005.Unsupervised Niche Clustering: Discovering an Unknown Number of Clusters in Noisy Data Sets. In:GHOSH, A. & JAIN, L. (eds.) Evolutionary Computation in Data Mining. Springer Berlin Heidelberg.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3