REVIEW OF ANOMALY DETECTION IN NETWORK USING MACHINE LEARNING APPROACH
DOI:
https://doi.org/10.29121/shodhkosh.v4.i2.2023.5686Keywords:
Real Time Network, Ict, AnomalAbstract [English]
In current era Real time networks using Information and Communication Technology (ICT) has a dominating impact on society, its economy and also security. More generally, ICT reinforce computers, mobile communication devices and networks. Widespread use of ICT is challenged by a group of people with malicious intent, whom we called as network intruders, cyber criminals, etc. Owing to these detrimental cyber attackers and cyber-crimes are of the international priorities and subject to trending research area. Anomaly detection is an important data analysis task which is useful for identifying the network intrusions. This paper is an attempt for reviewing the methods of an anomaly detection. The paper also discusses research challenges with the datasets used for network intrusion detection.
References
Mohiuddin Ahmed, Abdun Naser Mahmood, Jiankun Hu “A Survey of Network Anomaly detection technique” Journal of Network and Computer Applications 60 (2016) pp19–31 DOI: https://doi.org/10.1016/j.jnca.2015.11.016
S. S. Panwar and Y. P. Raiwani, “Performance Analysis of NSL-KDD Dataset Using Classification Algorithms with Different Feature Selection Algorithms and Supervised Filter Discretization,” in Intelligent Communication, Control and Devices, Springer, 2020, pp. 497–511.
Gotam Singh Lalotra, Vinod Kumar, Abhishek Bhatt, Tianhua Chen, Mufti Mahmud, "iReTADS: An Intelligent Real-Time Anomaly Detection System for Cloud Communications Using Temporal Data Summarization and Neural Network", Security and Communication Networks, vol. 2022 DOI: https://doi.org/10.1155/2022/9149164
R. Abdulhammed, M. Faezipour, H. Musafer, and A. Abuzneid, “Efficient network intrusion detection using pca-based dimensionality reduction of features,” in 2019 International Symposium on Networks, Computers and Communications (ISNCC), 2019, pp. 1–6. DOI: https://doi.org/10.1109/ISNCC.2019.8909140
S. C. Smith, I. I. Hammell, and J. Robert, “The use of Snap Length in Lossy Network Traffic Compression for Network Intrusion Detection Applications,” J. Inf. Syst. Appl. Res., vol. 12, no. 1, p. 17, 2019.
D. A. Cieslak, N. V Chawla, and A. Striegel, “Combating imbalance in network intrusion datasets.,” in GrC, 2006, pp. 732–737. DOI: https://doi.org/10.1109/GRC.2006.1635905
R. Bala and R. Nagpal, “A REVIEW ON KDD CUP99 AND NSL-KDD DATASET,” Int. J. Adv. Res. Comput. Sci., vol. 10, no. 2, p. 64, 2019. DOI: https://doi.org/10.26483/ijarcs.v10i2.6395
V. Kumar, D. Sinha, A. K. Das, S. C. Pandey, and R. T. Goswami, “An integrated rule based intrusion detection system: Analysis on UNSW-NB15 data set and the real time online dataset,” Cluster Comput., pp. 1–22, 2019. DOI: https://doi.org/10.1007/s10586-019-03008-x
P. Negandhi, Y. Trivedi, and R. Mangrulkar, “Intrusion Detection System Using Random Forest on the NSLKDD Dataset,” in Emerging Research in Computing, Information, Communication and Applications, Springer, 2019, pp. 519–531.
T. Merino et al., “Expansion of cyber attack data from unbalanced datasets using generative adversarial networks,” in International Conference on Software Engineering Research, Management and Applications, 2019, pp. 131–145. DOI: https://doi.org/10.1007/978-3-030-24344-9_8
H. P. Vinutha and B. Poornima, “Analysis of NSL-KDD Dataset Using K-Means and Canopy Clustering Algorithms Based on Distance Metrics,” in Integrated Intelligent Computing, Communication and Security, Springer, 2019, pp. 193–200. DOI: https://doi.org/10.1007/978-981-10-8797-4_21
O. E. Elejla, M. Anbar, B. Belaton, and S. Hamouda, “Labeled flow-based dataset of ICMPv6-based DDoS attacks,” Neural Comput. Appl., vol. 31, no. 8, pp. 3629–3646, 2019 DOI: https://doi.org/10.1007/s00521-017-3319-7
Shangbin Han, Qianhong Wu and Yang Yang “Machine Learning for Internet of Things anomaly detection under low quality data” International Journal of Distributed Sensor NetworksVolume 18, Issue 10, October 2022 DOI: https://doi.org/10.1177/15501329221133765
N. Koroniotis, N. Moustafa, E. Sitnikova, and B. Turnbull, “Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset,” Futur. Gener. Comput. Syst., vol. 100, pp. 779–796, 2019. DOI: https://doi.org/10.1016/j.future.2019.05.041
S. S. Panwar and Y. P. Raiwani, “Performance Analysis of NSL-KDD Dataset Using Classification Algorithms with Different Feature Selection Algorithms and Supervised Filter Discretization,” in Intelligent Communication, Control and Devices, Springer, 2020, pp. 497–511. DOI: https://doi.org/10.1007/978-981-13-8618-3_52
T. Bhaskar, T. Hiwarkar, and K. Ramanjaneyulu, “Adaptive Jaya Optimization Technique for Feature Selection in NSL-KDD Data Set of Intrusion Detection System,” Available SSRN 3421665, 2019. DOI: https://doi.org/10.2139/ssrn.3421665
P. Negandhi, Y. Trivedi, and R. Mangrulkar, “Intrusion Detection System Using Random Forest on the NSLKDD Dataset,” in Emerging Research in Computing, Information, Communication and Applications, Springer, 2019, pp. 519–531. DOI: https://doi.org/10.1007/978-981-13-6001-5_43
S. Dwivedi, M. Vardhan, S. Tripathi, and A. K. Shukla, “Implementation of adaptive scheme in evolutionary technique for anomaly-based intrusion detection,” Evol. Intell., pp. 1–15, 2019. DOI: https://doi.org/10.1007/s12065-019-00293-8
P. S. Chaithanya, M. R. G. Raman, S. Nivethitha, K. S. Seshan, and V. S. Sriram, “An Efficient Intrusion Detection Approach Using Enhanced Random Forest and Moth-Flame Optimization Technique,” in Computational Intelligence in Pattern Recognition, Springer, 2020, pp. 877–884. DOI: https://doi.org/10.1007/978-981-13-9042-5_75
N. Sultana, N. Chilamkurti, W. Peng, and R. Alhadad, “Survey on SDN based network intrusion detection system using machine learning approaches,” Peer-to-Peer Netw. Appl., vol. 12, no. 2, pp. 493–501, 2019. DOI: https://doi.org/10.1007/s12083-017-0630-0
W. A. H. M. Ghanem and A. Jantan, “Training a Neural Network for Cyberattack Classification Applications Using Hybridization of an Artificial Bee Colony and Monarch Butterfly Optimization,” Neural Process. Lett., pp. 1– 42, 2019. DOI: https://doi.org/10.1007/s11063-019-10120-x
R. Panigrahi and S. Borah, “A detailed analysis of CICIDS2017 dataset for designing Intrusion Detection Systems,” Int. J. Eng. Technol., vol. 7, no. 3.24, pp. 479–482, 2018.
V. Gustavsson, “Machine Learning for a Network-based Intrusion Detection System: An application using Zeek and the CICIDS2017 dataset.” 2019.
N. Bakhareva, A. Shukhman, A. Matveev, P. Polezhaev, Y. Ushakov, and L. Legashev, “Attack Detection in Enterprise Networks by Machine Learning Methods,” in 2019 International Russian Automation Conference (RusAutoCon), 2019, pp. 1–6. DOI: https://doi.org/10.1109/RUSAUTOCON.2019.8867696
Z. Chiba, N. Abghour, K. Moussaid, A. El Omri, and M. Rida, “An Efficient Network IDS for Cloud Environments Based on a Combination of Deep Learning and an Optimized Self-adaptive Heuristic Search Algorithm,” in International Conference on Networked Systems, 2019, pp. 235–249. DOI: https://doi.org/10.1007/978-3-030-31277-0_15
S. Chen, G. I. Webb, L. Liu, and X. Ma, “A novel selective naïve Bayes algorithm,” Knowledge-Based Syst., p. 105361, 2019. DOI: https://doi.org/10.1016/j.knosys.2019.105361
K. J. Mathai, “Performance Comparison of Intrusion Detection System Between Deep Belief Network (DBN) Algorithm and State Preserving Extreme Learning Machine (SPELM) Algorithm,” in 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), 2019, pp. 1–7. DOI: https://doi.org/10.1109/ICECCT.2019.8869492
M. Aloqaily, S. Otoum, I. Al Ridhawi, and Y. Jararweh, “An intrusion detection system for connected vehicles in smart cities,” Ad Hoc Networks, vol. 90, p. 101842, 2019. DOI: https://doi.org/10.1016/j.adhoc.2019.02.001
Z. El Mrabet, H. El Ghazi, and N. Kaabouch, “A Performance Comparison of Data Mining Algorithms Based Intrusion Detection System for Smart Grid,” in 2019 IEEE International Conference on Electro Information Technology (EIT), 2019, pp. 298–303. DOI: https://doi.org/10.1109/EIT.2019.8834255
M. Mazini, B. Shirazi, and I. Mahdavi, “Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms,” J. King Saud Univ. Inf. Sci., vol. 31, no. 4, pp. 541–553, 2019. DOI: https://doi.org/10.1016/j.jksuci.2018.03.011
A. Shokoohsaljooghi and H. Mirvaziri, “Performance improvement of intrusion detection system using neural networks and particle swarm optimization algorithms,” Int. J. Inf. Technol., pp. 1–12, 2019. DOI: https://doi.org/10.1007/s41870-019-00315-9
W. Książek, M. Abdar, U. R. Acharya, and P. Pławiak, “A novel machine learning approach for early detection of hepatocellular carcinoma patients,” Cogn. Syst. Res., vol. 54, pp. 116–127, 2019 DOI: https://doi.org/10.1016/j.cogsys.2018.12.001
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Dr. Amit Bhusari, Dr. Prabhanjan Chaudhari, Dipali Bhusari, Amol Payghan

This work is licensed under a Creative Commons Attribution 4.0 International License.
With the licence CC-BY, authors retain the copyright, allowing anyone to download, reuse, re-print, modify, distribute, and/or copy their contribution. The work must be properly attributed to its author.
It is not necessary to ask for further permission from the author or journal board.
This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.