Affiliation:
1. MIT Arts, Commerce and Science College, Alandi, Pune, Maharashtra, India
Abstract
With the increasing complexity and volume of network traffic, the detection of anomalies has become crucial for maintaining the security and efficiency of computer networks. Traditional rule-based methods often struggle to keep pace with the evolving nature of Cyber threats. In this paper, we propose utilizing unsupervised machine learning techniques for anomaly detection in network traffic. We explore various algorithms including k-means clustering, Isolation Forest, and auto encoders to identify abnormal patterns within network data without the need for labeled examples. Our experiments demonstrate the effectiveness of these approaches in detecting anomalies accurately and efficiently. Furthermore, we discuss the challenges and opportunities in deploying unsupervised machine learning for network anomaly detection in real-world scenarios. This research contributes to the advancement of Cyber security by providing novel methodologies for detecting suspicious activities within network traffic data, thereby enhancing the resilience of computer networks against emerging threats. Unsupervised methods, such as clustering algorithms like k-means or density-based techniques like DB-SCAN, can detect deviations from
normal patterns in network traffic, indicating potential intrusions or anomalies. These systems analyze various features of network traffic, such as packet headers, traffic volume, and protocol behavior, to identify suspicious activity. However, they may also generate false positives and require careful tuning to balance detection accuracy and performance
Reference31 articles.
1. Machine Learning Technique For Anomaly Detection:An Overview(International journal of computer application (0975-8887)) authors by salimomar,AsriNgadi,HamidH.jebur
2. Unsupervised Clustering approach For Network Anomaly Detection ,authorized by IwanSysrif,AdamPrugel-Bennett and Gary Wills.
3. Rawat,S.2005. Efficient Data Mining Algorithms for Intrusion Detection. in Proceedings of the 4th Conference on Engineering of Intelligent Systems (EIS’04).
4. Kohonen, 1995.” Self-Organizing Map”. Springer,Berlin,
5. Nasraoui, O., Leon, E. &Krishnapuram, R. 2005.Unsupervised Niche Clustering: Discovering an Unknown Number of Clusters in Noisy Data Sets. In:GHOSH, A. & JAIN, L. (eds.) Evolutionary Computation in Data Mining. Springer Berlin Heidelberg.