DissertationProp
DissertationProp
Title:
Machine Learning for Detecting
Anomalies in Network Traffic.
1
Research Project Proposal
Table of Contents
Background.............................................................................................................................3
Research Objectives..........................................................................................................3-4
Research and Development method...................................................................................4
Project Timeline.....................................................................................................................4
Resources...............................................................................................................................5
References..............................................................................................................................5
Background
The rising dependency on network systems and devices has made network
security more important in the digital age. As connectivity grows, so are
2
Research Project Proposal
dangers. Strong steps are needed to protect networks from hostile activities.
Cyber threats range from advanced attacks to minor network traffic
anomalies, emphasizing the need for effective anomaly detection. Current
studies on machine learning for network anomaly identification show a
growing focus on complex algorithms to improve cybersecurity. The research
emphasizes the need for immediate recognition, precise classification, and
flexibility in responding to new threats.
Traditional methods for detecting network irregularities struggle to keep up
with cyber attackers' ever-changing schemes. Traditional approaches struggle
to detect minute deviations that may suggest hazards due to the volume and
complexity of data. Advanced methods, including machine learning, are
needed to detect abnormalities and secure computer networks.
Research Objectives
The objectives of the current undergraduate project are:
Primary Objectives:
Research Questions
1. Can machine learning algorithms effectively identify and classify network
anomalies with high accuracy?
2. Which Algorithms fits best unsupervised ML for Anomaly Detection in
Network Traffic?
Significance of Study
Academic Significance:
This paper enhances academic research about machine learning in network
security. New methods are explored to improve the field and permit future
research.
3
Research Project Proposal
Practical Significance:
This study improves real-world cybersecurity research and experimentation.
Advanced anomaly detection can improve network security by detecting
threats quickly.
The practical component will focus on building and using machine learning
models to apply research findings. Models will be chosen based on their
capacity to detect abnormalities in network activity. The models' performance
will be measured using industry-standard methods.
After selecting the dataset based on network anomaly detection criteria, it will
be preprocessed for algorithmic analysis. The research will follow ethical
guidelines for data utilization, notably when managing network traffic data.
The research will follow ethical data utilization norms, especially in network
traffic data management. This method tries to demonstrate machine learning's
network anomaly detection capabilities. It does this by combining academic
theory with experimentation to provide a succinct yet comprehensive method.
Project Timeline
1. Conducting research and generating ideas while collecting relevant
material and resources. Deadline: January
2. Begin testing the ML Algorithms using Python with a deadline up to
middle February.
3. Start categorizing the Algorithms based on speed, efficiency and
capability with a deadline up to the start of March.
4
Research Project Proposal
4. Begin writing the dissertation more structured and refine the data that
has been collected with a deadline up to the end of March.
5. Final corrections, reference checking and formatting the dissertation up
to the final deadline in April.
Resources
Machine Learning sources, such as journals, the university’s library etc.
Data Collection from publicly accessible datasets.
Other academic books that help with Data Processing and Analysis in
Python environment.
References
Bishop, C. M., 2006. Pattern Recognition and. s.l.:Springer Science+Business Media, LLC.
Boutaba, R., 2018. A comprehensive survey on machine learning for networking. Journal of
Internet Services, 9(16).
Géron, A., 2019. Hands-on Machine Learning with Scikit-Learn, Keras & TensorFlow.
s.l.:O'Reilly Media, Inc..
Omar, S., 2013. Machine Learning Techniques for Anomaly Detection:. International Journal
of Computer Applications, 79(2).
Patel, S., 2018. Network Traffic Classification Analysis Using Machine Learning Algorithms.
Greater Noida, India, IEEE.
Rentao Gu, 2020. Machine learning for intelligent optical networks: A comprehensive survey.
Journal of Network and Computer Applications, Volume 157.
Tawsook, K. L. a. T., 2012. Network traffic anomaly detection using machine learning
approaches. Maui, HI, USA, IEEE.