Anomaly Detection in Network Traffic Using Machine
Anomaly Detection in Network Traffic Using Machine
2022; 1:34
doi: 10.56294/dm202272
REVIEW
Anomaly Detection in Network Traffic using Machine Learning for Early Threat
Detection
Detección de anomalías en el tráfico de red mediante aprendizaje automático
para la detección temprana de amenazas
Mohammed Hussein Thwaini1
1
University of Fallujah, Applied Sciences College, Iraq. 1 University of Fallujah, Applied Sciences College, Iraq.
Cite as: Thwaini MH. Anomaly Detection in Network Traffic using Machine Learning for Early Threat Detection. Data and Metadata.
2022;1:34. https://doi.org/10.56294/dm202272
ABSTRACT
Due to advances in network technologies, the amount of people using networks is rising rapidly. This has
resulted in a large amount of transmission information being generated and moved across the network.
However, this data is vulnerable to attacks and intrusions. To prevent network intrusions, security measures
must be implemented, which can detect anomalies and identify potential threats. Network security researchers
and labs have done extensive research in network security. The purpose of this study was to perform a
noninvasive inspection to give a large general mechanism on recent advances in abnormality detection.
The study reviewed recent research published in the past five years, which examined new technologies and
potential future opportunities in anomaly detection. The literature review focused specifically on anomaly
detection systems used in network traffic. This included various applications such as Wireless Sensor Networks
(WSN), Internet of Things (IoT), High Performance Computing, Industrial Control Systems (ICS), and Software
Defined Networking (SDN) environments. The review concludes by highlighting several unresolved issues that
need to be addressed in order to improve anomaly detection systems.
RESUMEN
Debido a los avances en las tecnologías de red, el número de personas que las utilizan está aumentando
rápidamente. Esto ha dado lugar a que se genere una gran cantidad de información de transmisión que se
mueve a través de la red. Sin embargo, estos datos son vulnerables a ataques e intrusiones. Para evitar
las intrusiones en la red, es necesario aplicar medidas de seguridad que permitan detectar anomalías e
identificar posibles amenazas. Los investigadores y laboratorios de seguridad de redes han realizado
numerosas investigaciones en este ámbito. El objetivo de este estudio era realizar una inspección no invasiva
para ofrecer un amplio mecanismo general sobre los avances recientes en la detección de anomalías.
El estudio revisó la investigación reciente publicada en los últimos cinco años, que examinó las nuevas
tecnologías y las posibles oportunidades futuras en la detección de anomalías. La revisión bibliográfica se
centró específicamente en los sistemas de detección de anomalías utilizados en el tráfico de red. Esto incluía
diversas aplicaciones como redes de sensores inalámbricos (WSN), Internet de las cosas (IoT), informática de
alto rendimiento, sistemas de control industrial (ICS) y entornos de redes definidas por software (SDN). La
revisión concluye destacando varias cuestiones no resueltas que deben abordarse para mejorar los sistemas
de detección de anomalías.
© Este es un artículo en acceso abierto, distribuido bajo los términos de una licencia Creative Commons (https://creativecommons.org/
licenses/by/4.0) que permite el uso, distribución y reproducción en cualquier medio siempre que la obra original sea correctamente citada
Data & Metadata. 2022; 1:34 2
INTRODUCTION
With the ever-increasing reliance on computer networks for various operations, the importance of network
security has become paramount. Organizations across industries face the constant challenge of protecting
their networks from potential threats, such as malware infections, unauthorized access, and data breaches.
Traditional security measures like firewalls and intrusion detection systems can mainly handle known threats.
However, these traditional approaches often fail to identify novel and evolving threats.
To combat this issue, machine learning techniques have gained significant attention in recent years. Machine
learning algorithms can analyze large volumes of network traffic data and identify anomalous patterns that
may indicate potential security threats. By leveraging historical data and learning from past incidents, these
algorithms can identify deviations from normal network behavior, thus enabling early threat detection and
proactive action.(1)
The primary objective of using machine learning for network traffic anomaly detection is to develop models
that can accurately classify network traffic as either normal or malicious. It involves training models using
labeled datasets of network traffic and various features such as packet size, protocol type, source/destination
IP addresses, and port numbers. These models can then be deployed in real-time to continuously monitor
network traffic and generate alerts whenever anomalous behavior is detected.(2)
The benefits of using machine learning for network traffic anomaly detection are numerous. It allows
organizations to detect threats that traditional security measures might miss, providing an additional layer of
security. Moreover, machine learning can adapt and learn from new data, improving its accuracy over time to
handle evolving threats. It also helps minimize false positives by reducing the number of unnecessary alerts,
enabling security teams to focus on genuine threats more effectively.
machine learning techniques have emerged as a powerful tool for detecting network traffic anomalies and
enabling early threat detection. By analyzing large volumes of network traffic data and identifying abnormal
patterns, these algorithms can enhance network security and mitigate potential threats. Incorporating machine
learning into network security strategies can assist organizations in staying one step ahead of attackers and
safeguarding their valuable digital assets
Related works
Chandola et al. studied Network anomalies are abnormal occurrences within the network that deviate
from normal or known behavior and are believed to have security implications. Also known as atypical actions
intended to disrupt the regular operations of a network. Anomalies are identified by patterns in the data that
do not conform to a clearly defined concept of logical state.(3)
Zhao et al., It can be said that irrational and significant abnormalities in the transmission mechanism are
said to be anomalies.(4)
Ahmad et al., 2017 It is an instantaneous stage in which the actions of the system take place deviates
significantly from its previous normal behavior.(5)
Mohd Ali, 2018 Different authors have used various terms such as abnormalities, outliers, or exceptions to
refer to network anomalies, leading to confusion in the terminology. To grasp the concept of anomalies in a
network system, it is essential to understand what is considered normal. There are three main types of network
anomalies: point anomalies, contextual anomalies, and collective anomalies.(6)
METHODS
Ensemble methods, also known as multi-classifier systems, involve training multiple machine learning
models to create streamlined parachute ornaments and then a nesting occurs results to improve precision
(Aburomman et al., 2017). Several intrusion detection systems (IDSs) have been It was developed on the
principle of clustering mechanisms, as noted across the literature.
One such system, developed by Gu et al. (2019) is a good SVM data-driven IDS that includes feature
augmentation. They applied intensity ratios to the baseline curves, which improved the quality of the training
data. Experimental results showed that the SVM group achieved a competitive performance in terms of the
results of the accuracy of observations in monitoring, training trained quickly, clarity, and false news giving
data compared to other data. NSL-KDD dataset was used for evaluation.
Pham et al. (2018) Provide data within a specific structure and mechanism for taking advantage aimed at
improving IDS performance. They used clustering mechanisms with tree-based mechanisms as the main data.
Its operation showed that the fill through the J48 data improved the classification accuracy and reduced the
false alarm rate in the NSL-KDD datasets.
In another work by Bhatti et al. (2020), a classification-based algorithm was developed to observe the data
of the attack variant. The execution boundary consisted of four main points: data stacking, pre-processing,
training procedure, and decision-making.
Individual classifiers were trained separately and their decisions were combined using majority voting. The
https://doi.org/10.56294/dm202272
3 Thwaini MH
proposed framework achieved high detection accuracy for various attack classes on the KDDcup99 dataset.
Rai (2020) explored ensemble learning methods, such as boosting and bagging algorithms (XGBoost, GBM,
and DRF), for IDS. (DNN) was also implemented used the H2O Python library. Genetic algorithm-based feature
selection was applied to improve DNN performance. The proposed approach outperformed traditional ML
models, and the NSL-KDD dataset was used for evaluation.
Figure 1 provides a comparison of these Research according to the years, the learning mechanism according
to the necessary subordination mechanism, the observed abnormal life pattern, the mass of data used.
https://doi.org/10.56294/dm202272
Data & Metadata. 2022; 1:34 4
Figure 2. Types of anomalies: "a) point anomaly; b) contextual anomaly;and c) collective anomaly"
https://doi.org/10.56294/dm202272
5 Thwaini MH
Anomaly detection using machine learning finds applications in various domains such as cybersecurity, fraud
detection, predictive maintenance, and quality control. In cybersecurity, it can help identify unusual network
traffic or unauthorized access attempts. In fraud detection, it can flag fraudulent transactions or activities.
In predictive maintenance, it can predict equipment failures by detecting anomalies in sensor data. In quality
control, it can identify defective products or anomalies in production processes.(14)
However, it is important to note that anomaly detection using machine learning is a challenging task.
Handling high-dimensional data, imbalanced datasets, and evolving patterns can pose significant challenges.
Therefore, careful selection of appropriate algorithms, preprocessing techniques, and evaluation metrics is
essential to ensure accurate and effective anomaly detection. Continuous monitoring and adaptation of the
models are also required to keep up with changing trends and patterns in the data.(15)
Figure 3 illustrates some well-known examples of classification and clustering algorithms.
https://doi.org/10.56294/dm202272
Data & Metadata. 2022; 1:34 6
Refers to the use of algorithms in training models with labeled data in domain gridded datasets. These
techniques are essential for detecting anomalies and intrusions in network traffic. Several efficient and efficient
supervised algorithms are used for this purpose, including Support Vector Machine (SVM), Artificial Neural
Network (ANN), Nearest Neighbor Algorithm, Decision Trees, Nearest Neighbors, Cluster Classifiers and Naïve
Bayes Classifier. These algorithms are commonly used to detect anomalies using a supervised learning approach.
In this review, we provide a summary of recent research in the past five years that have used these supervised
learning algorithms to detect anomalies, while ensuring that references are kept in the same format.
https://doi.org/10.56294/dm202272
7 Thwaini MH
https://doi.org/10.56294/dm202272
Data & Metadata. 2022; 1:34 8
"Neural Networks" (NNs) can be leveraged for supervised or unsupervised learning. And our whole interest will
be within the framework of "supervised learning".(33)
Hodo et al. (2016) proposed (ANN) Threat analysis system for IoT networks. By training ANNs Working across
the effects of internet packages, the system can Monitor and stop DDoS attacks. This mechanism achieved good
numbers in its results, which included the correct and unrealistic correct rates, effectively identifying various
types of attacks.(34)
Veselý & Brechlerová (2009) support the idea that ANNs are suitable for Intensify the power and capacity of
the built system pattern in order to detect abnormal changes based on monitoring attacks, penetration attempts,
and abnormal activities. And they give a detailed explanation according to the work that shows the ability to
implement according to the NNs in establishing systems for monitoring abnormal changes (abnormalities) and
the ability to differentiate between the normal pattern and the abnormal pattern.(35)
a different approach, Haripriya et al. (2018) develop a proposal through an updated taxonomy subject
to ANN for intrusion detection using the backpropagation algorithm with the R tool. They employed feature
selection techniques on the KYOTO dataset to improve performance measures such as F-measure, accuracy, and
recall when compared to other models.(36)
Meanwhile, Wu et al. (2018) utilized a Convolutional Neural Network (CNN) for intrusion detection. This
novel model addressed the imbalanced dataset issue and enhanced accuracy while reducing false alarm rates.
Additionally, they introduced a model to convert raw traffic vectors into images, reducing computational costs.
The proposed model was evaluated using the NSL-KDD dataset.(37)
On the other hand, Vinayakumar et al. (2017) opted for a Recurrent Neural Network (RNN) for their intrusion
detection system. They surveyed large, many types of RNN and compared them to the patterns used by modular
machine learning and advanced training. RNNs excel at learning temporal behaviors in large-scale sequence
data. The authors applied their model to traffic data, particularly TCP/IP packets, from datasets such as DARPA,
KDD-Cup-99, and UNSW-NB15, Powerful and intelligent detection of high frequency attack attempts such as DoS
and Probe.(38)
Deep learning (DL) is a modern form of learning based on artificial neural networks. Work has been done
with DL techniques within a wide range, noting unapproved traffic records, and working according to DL
mechanisms in order to notice abnormal matters is far from our research, and it is planned to create deviant
trend mechanisms based on DL to work in future matters.
Unsupervised Learning
Moving on to unsupervised learning techniques, these are clustering algorithms or undirected classification
methods that do not require labelled data for training. Unsupervised methods aim to identify hidden patterns
in data without using a pre-trained model. And it uses mechanisms to notice the abnormal situation according
to the process of subjugation and control.
The K-means algorithm is a popular unsupervised clustering algorithm that divides observations into clusters
based on similarity properties. Thakare et al. (2015) described the K-means algorithm and reviewed different
approaches for outlier detection using this algorithm, emphasizing its applications in mining big data sets and
stream data.(39)
Münz et al. (2007) proposed an anomaly detection method based on the K-means cluster algorithm for
network data mining in the context of network security. This method divided unlabelled records into clusters
of regular traffic and anomalies, using the K-means algorithm. The cluster centroids were used to detect
anomalous traffic efficiently. The authors evaluated the method's effectiveness in detecting DoS attacks and
port scans.(40)
While K-means is a fundamental clustering algorithm, its integration with other algorithms can enhance
its effectiveness. Aung et al. (2018) presented a hybrid ML model that combined the K-means algorithm for
identifying similar attack groups with a Random Forest algorithm to classify data as normal or attack. The
proposed model achieved good results in detecting different types of intrusion attacks using the KDD-Cup-99
dataset.(41)
https://doi.org/10.56294/dm202272
9 Thwaini MH
volume of data and devising effective methods for its analysis in the context of security. Results indicated that
their proposed model performed successfully with a massive amount of event logs in the network.(42)
In the domain of Industrial Control Systems (ICS) security, Stefanidis et al. (2016) utilized HMM for intrusion
detection. Specifically, they applied HMM to SCADA systems using interconnected TCP/IP protocol. To evaluate
their system, they compared its detection accuracy with other existing systems that used the same datasets.
The proposed system exhibited a higher detection rate for most attack vectors, and the researchers concluded
that it was particularly suitable for real-time systems and high-speed environments.(43)
Addressing security concerns in 5G networks, Zegeye et al. (2019) developed a novel multi-layer approach
based on HMM to protect networks against intruders and identify multi-phase attacks. They employed the
CICIDS2017 dataset and applied techniques such as Singular Value Decomposition (SVD) and feature selection
to reduce the data. K-means clustering labels were then used in monitoring the multi-layer HMM model. The
proposed model demonstrated stable and well-trained performance, indicating that it did not require a large
amount of training data.(44)
Meanwhile, securing mobile networks presents unexpected challenges, prompting researchers to develop
models that can effectively overcome these challenges. According to Lian et al. (2018), the traditional HMM
algorithm used for predicting network security lacks precision. To address this issue, they introduced a weighted
HMM-based algorithm that specifically predicts mobile networking security. They employed multiscale entropy to
overcome the slow training speed of data in the mobile networking domain while optimizing the HMM transition
matrix. Additionally, they utilized the autocorrelation coefficient to establish the relationship between data
characteristics and predict future network security. The algorithm's effectiveness was verified by implementing
it on the DARPA2000 dataset, which contained various types of attacks, extensive data, redundancies, and false
alarm rates. The experimental results demonstrated the accuracy and validity of the proposed model.(45)
In conclusion, HMM has found wide-ranging applications in the field of security and intrusion detection.
Researchers continue to innovate and develop models that effectively utilize HMM to address the challenges
posed by different domains such as network security and mobile networking. These studies highlight the
effectiveness of HMM in detecting anomalies and protecting systems against various types of attacks.
https://doi.org/10.56294/dm202272
Data & Metadata. 2022; 1:34 10
https://doi.org/10.56294/dm202272
11 Thwaini MH
Previous studies presented in this survey indicate that supervised methods are commonly employed when
working with non-real-time training data, due to their simplicity and efficiency. However, more flexible methods
with a higher detection rate for known attacks are also utilized. Ensemble methods, which involve combining
multiple classifiers, have shown to perform well even if individual classifiers are weak. Nonetheless, supervised
methods have certain disadvantages, including resource consumption and time complexity when dealing with
big data. Additionally, achieving real-time performance can be challenging.(59)
Unsupervised learning, on the other hand, eliminates the need for training data and is primarily utilized for
feature detection. Unsupervised techniques aim to identify hidden patterns in data without the use of training
data, enabling them to detect unknown attacks. For example, hierarchical clustering using the Fuzzy C-Means
https://doi.org/10.56294/dm202272
Data & Metadata. 2022; 1:34 12
approach incorporates a membership function and fuzzy interval, allowing for the detection of unknown
attacks (Yuan et al., 2011). Similarly, robust Principal Component Analysis (PCA) models have been successful
in detecting anomalies/attacks that were not encountered or trained.(60,61)
The implementation of unsupervised learning techniques spans various areas and applications such as
IoT, WSN, 5G mobile networks, and Industrial Control Systems (ICS). These applications often involve real-
time data processing, and unsupervised techniques offer advantages such as fast response time and reduced
computational complexity when dealing with large datasets. Unsupervised techniques can also achieve good
accuracy results when combined with other classifiers in real-time networks. However, a significant limitation
of anomaly detection is the detection rate, which is dependent on proximity measures and directly affects
the false alarm rate. Time consumption is another challenge that future anomaly detection systems need to
address.(62)
Semi-Supervised Learning
Semi-supervised learning is a machine learning approach that falls between the realms of supervised and
unsupervised learning. It is employed when a dataset contains limited labeled examples and a large amount
of unlabeled data. The goal of semi-supervised learning is to utilize the available labeled data along with the
unlabeled data to improve the model's performance Aissa et al. (2016).(63)
The overall approach in semi-supervised learning involves leveraging the abundance of unlabeled data to
obtain additional information about the underlying structure of the dataset. This additional knowledge can
then be used to enhance the model's learning process and make better predictions.
There are several methods commonly used in semi-supervised learning. One approach is to initialize the
model using the labeled data and then propagate the information from labeled to unlabeled data points. This
propagation can be achieved through techniques like label propagation or graph-based methods.
Another approach is co-training, where multiple models are trained on different views of the data. Each
model then labels the unlabeled data based on its own perspective, and the agreement between the models is
used to provide labels for the unlabeled instances Ashfaq et al. (2017) (64)
The benefits of semi-supervised learning are numerous. It allows for the exploitation of large amounts
of unlabeled data, which is often easier and cheaper to acquire compared to labeled data. This enables the
model to learn from a more comprehensive representation of the dataset and potentially improve its accuracy
and performance Borghesi et al. (2019) The experimental results showed that the autoencoder-based method
significantly outperformed the supervised method, with a 12 % increase in accuracy.(65)
semi-supervised learning can be particularly useful in scenarios where obtaining labeled data is challenging
or expensive, such as in medical diagnosis or natural language processing tasks. By incorporating the limited
labeled data with the vast amount of unlabeled data, semi-supervised learning offers a powerful approach to
address these challenges Yuan et al. (2016) achieved high accuracy rates of 93,71 %, 99,88 %, and 98,23 %,
respectively.(66)
However, it is important to note that semi-supervised learning does not guarantee improved results in all
scenarios. The effectiveness of this approach greatly depends on the quality and distribution of the available
labeled and unlabeled data. Additionally, the choice of the specific semi-supervised learning algorithm or
method employed can also impact the performance outcomes.
In conclusion, semi-supervised learning is a valuable technique that bridges the gap between supervised
and unsupervised learning. It harnesses the potential of both labeled and unlabeled data to improve model
performance and address challenges associated with limited labeled data. By effectively leveraging unlabeled
data, semi-supervised learning can be a powerful tool in various domains and applications of machine learning.
CONCLUSION
The use of machine learning in anomaly detection for network traffic has proven to be an effective approach
for early threat detection. By employing various algorithms and techniques, it is possible to train models to
identify abnormal behavior and potential threats in real-time.
This technology offers several benefits, such as detecting previously unseen and sophisticated attacks,
reducing false positives, and enabling prompt response and mitigation measures. Additionally, machine learning
can continuously learn and adapt to evolving threats, making it a valuable tool in the ever-changing landscape
of cybersecurity.
However, it is important to note that machine learning models are not a silver bullet and should not be
solely relied upon for network security. They should be used as a complementary tool alongside other security
measures to provide a layered defense approach. As the field of machine learning continues to advance, further
research and development are needed to enhance the accuracy and efficiency of anomaly detection systems.
Additionally, collaboration between cybersecurity professionals, data scientists, and machine learning experts
is crucial to ensure the effective deployment and optimization of these models. Considering the ever-increasing
https://doi.org/10.56294/dm202272
13 Thwaini MH
sophistication of cyber threats, early threat detection is of paramount importance for organizations to safeguard
their network infrastructure. The use of machine learning in anomaly detection for network traffic provides a
promising solution to address this challenge and enhance overall cybersecurity defenses.
REFERENCES
1. Aburomman AA, Reaz MBI. A survey of intrusion detection systems based on ensemble and hybrid classifiers.
Computers & Security. 2017;65:135-152.
2. Agrawal S, Agrawal J. Survey on anomaly detection using data mining techniques. Procedia Computer
Science. 2015;60:708-713.
3. Ahmad S, Lavin A, Purdy S, Agha Z. Unsupervised real-time anomaly detection for streaming data.
Neurocomputing. 2017;262:134-147.
4. Aissa NB, Guerroumi M. Semi-supervised statistical approach for network anomaly detection. Procedia
Computer Science. 2016;83:1090-1095.
5. Akhi AB, Kanon EJ, Kabir A, Banu A. Network Intrusion Classification Employing Machine Learning: A Survey
[Doctoral dissertation]. Department of Computer Science and Engineering, United International University,
Bangladesh; 2019.
6. Alizadeh H, Khoshrou A, Zuquete A. Traffic classification and verification using unsupervised learning of
Gaussian Mixture Models. In: 2015 IEEE international workshop on measurements & networking (M&N). IEEE;
2015. p. 1-6.
7. Amangele P, Reed MJ, Al-Naday M, Thomos N, Nowak M. Hierarchical Machine Learning for IoT Anomaly
Detection in SDN. In: 2019 International Conference on Information Technologies (InfoTech). IEEE; 2019. p. 1-4.
8. Anderson JP. Computer security threat monitoring and surveillance. Technical Report, Fort Washington,
PA, James P. Anderson Co; 1980.
9. Ashfaq RAR, Wang XZ, Huang JZ, Abbas H, He YL. Fuzziness based semi-supervised learning approach for
intrusion detection system. Information Sciences. 2017;378:484-497.
10. Aung YY, Min MM. An analysis of K-means algorithm-based network intrusion detection system. Advances
in Science, Technology and Engineering Systems Journal. 2018;3(1):496-501.
11. Bauer FC, Muir DR, Indiveri G. Real-Time Ultra-Low Power ECG Anomaly Detection Using an Event-Driven
Neuromorphic Processor. IEEE Transactions on Biomedical Circuits and Systems. 2019;13:1575-1582.
12. Bhati BS, Rai CS, Balamurugan B, Al-Turjman F. An intrusion detection scheme based on the ensemble of
discriminant classifiers. Computers & Electrical Engineering. 2020;86:106742.
13. Bhattacharyya DK, Kalita JK. Network anomaly detection: A machine learning perspective. CRC Press;
2013.
14. Blanco R, Malagón P, Briongos S, Moya JM. Anomaly Detection Using Gaussian Mixture Probability Model
to Implement Intrusion Detection System. In: International Conference on Hybrid Artificial Intelligence Systems.
Springer; 2019. p. 648-659.
17. Chakir EM, Moughit M, Khamlichi YI. An effective intrusion detection model based on SVM with feature
selection and parameters optimization. Journal of Applied Information Technology. 2018;96(12):3873-3885.
https://doi.org/10.56294/dm202272
Data & Metadata. 2022; 1:34 14
18. Chandola V, Banerjee A, Kumar V. Anomaly detection: A survey. ACM Computing Surveys (CSUR).
2009;41(3):1-58.
19. Chauhan P, Shukla M. A review on outlier detection techniques on data stream by using different
approaches of K-Means algorithm. In: 2015 International Conference on Advances in Computer Engineering and
Applications. IEEE; 2015. p. 580-585.
20. Chen CM, Guan DJ, Huang YZ, Ou YH. Anomaly network intrusion detection using hidden Markov model.
International Journal of Innovative Computing, Information and Control. 2016;12:569-580.
21. Chew YJ, Ooi SY, Wong KS, Pang YH. Decision Tree with Sensitive Pruning in Network-based Intrusion
Detection System. In: Computational Science and Technology. Springer; 2020. p. 1-10.
22. Rincon Soto IB, Sanchez Leon NS. How artificial intelligence will shape the future of metaverse. A
qualitative perspective. Metaverse Basic and Applied Research. 2022. 27];1:12. https://doi.org/10.56294/
mr202212.
23. Ding M, Tian H. PCA-based network traffic anomaly detection. Tsinghua Science and Technology.
2016;21(5):500-509.
24. Dua S, Du X. Data mining and machine learning in cybersecurity. CRC Press; 2016.
25. Duong NH, Hai HD. A semi-supervised model for network traffic anomaly detection. In: 2015 17th
International Conference on Advanced Communication Technology (ICACT). IEEE; 2015. p. 70-75.
26. Fernandes G, Rodrigues JJ, Carvalho LF, Al-Muhtadi JF, Proença ML. A comprehensive survey on network
anomaly detection. Telecommunication Systems. 2019;70(3):447-489.
27. Gu J, Wang L, Wang H, Wang S. A novel approach to intrusion detection using SVM ensemble with feature
augmentation. Computers & Security. 2019;86:53-62.
28. Han X, Xu L, Ren M, Gu W. A Naive Bayesian network intrusion detection algorithm based on Principal
Component Analysis. In: 2015 7th International Conference on Information Technology in Medicine and Education
(ITME). IEEE; 2015. p. 325-328.
29. Haripriya LA, Jabbar M, Seetharamulu B. A Novel Intrusion Detection System Using Artificial Neural
Networks and Feature Subset Selection. International Journal of Engineering and Technology. 2018;7(4):181.
30. Hu J, Ma D, Liu C, Shi Z, Yan H, Hu C. Network Security Situation Prediction Based on MR-SVM. IEEE
Access. 2019;7:130937-130945.
31. Idhammad M, Afdel K, Belouch M. Semi-supervised machine learning approach for DDoS detection.
Applied Intelligence. 2018;48(10):3193-3208.
32. Karim S, Rousanuzzaman PAY, Khan PH, Asif M. Implementation of K-Means Clustering for Intrusion
Detection. International Journal of Scientific Research in Computer Science, Engineering and Information
Technology. 2019;5:1232-1241.
33. Kevric J, Jukic S, Subasi A. An effective combining classifier approach using tree algorithms for network
intrusion detection. Neural Computing and Applications. 2017;28(1):1051-1058.
34. Khraisat A, Gondal I, Vamplew P. An anomaly intrusion detection system using C5 decision tree classifier.
In: Pacific-Asia Conference on Knowledge Discovery and Data Mining. Springer; 2018. p. 149-155.
35. Kim E, Kim S. A novel hierarchical detection method for enhancing anomaly detection efficiency. In: 2015
International Conference on Computational Intelligence and Communication Networks (CICN). IEEE; 2015. p.
1018-1022.
36. Kotu V, Deshpande B. Data Science: Concepts and Practice. Morgan Kaufmann; 2018.
https://doi.org/10.56294/dm202272
15 Thwaini MH
37. Kumar DA, Venugopalan SR. A novel algorithm for network anomaly detection using adaptive machine
learning. In: Progress in Advanced Computing and Intelligent Engineering. Springer; 2018. p. 59-69.
38. Kusyk J, Uyar MU, Sahin CS. Survey on evolutionary computation methods for cybersecurity of mobile ad
hoc networks. Evolutionary Intelligence. 2018;10:95-117.
39. Lakhina A, Crovella M, Diot C. Diagnosing network-wide traffic anomalies. ACM SIGCOMM computer
communication review. 2004;34(4):219-230.
40. Lalitha KV, Josna VR. Traffic verification for network anomaly detection in sensor networks. Procedia
Technology. 2016;24:1400-1405.
41. Larriva-Novo XA, Vega-Barbas M, Villagra VA, Sanz Rodrigo M. Evaluation of Cybersecurity Data Set
Characteristics for Their Applicability to Neural Networks Algorithms Detecting Cybersecurity Anomalies. IEEE
Access. 2020;8:9005-9014.
42. Albarracín Vanoy RJ. STEM Education as a Teaching Method for the Development of XXI Century
Competencies. Metaverse Basic and Applied Research. 2022;1:21. https://doi.org/10.56294/mr202221.
43. Liu Y, Xu H, Yi H, Lin Z, Kang J, Xia W, Shi Q, Liao Y, Ying Y. Network anomaly detection based on
dynamic hierarchical clustering of cross domain data. In: 2017 IEEE International Conference on Software
Quality, Reliability and Security Companion (QRS-C). IEEE; 2017. p. 200-204.
44. Manasa KN, Padma MC. A Study on Sentiment Analysis on Social Media Data. In: Emerging Research in
Electronics, Computer Science and Technology. Springer; 2019. p. 661-667.
45. Mehmood A, Mukherjee M, Ahmed SH, Song H, Malik KM. NBC-MAIDS: Naïve Bayesian classification technique
in multi-agent system-enriched IDS for securing IoT against DDoS attacks. The Journal of Supercomputing.
2018;74(10):5156-5170.
46. Meng X, Mo H, Zhao S, Li J. Application of anomaly detection for detecting anomalous records of terrorist
attacks. In: 2017 IEEE 2nd International Conference on Cloud Computing and Big Data Analysis (ICCCBDA). IEEE;
2017. p. 70-75.
48. Tovar Claros BS. Importance of design and user experience (UX) in web development. Metaverse Basic
and Applied Research. 2022;1:20. https://doi.org/10.56294/mr202220.
49. Münz G, Li S, Carle G. Traffic anomaly detection using k-means clustering. In: GI/ITG Workshop MMBnet.
2007. p. 13-14.
50. Paffenroth R, Kay K, Servi L. Robust pca for anomaly detection in cyber networks. ArXiv preprint
arXiv:1801.01571. 2018.
51. Peng H, Sun Z, Zhao X, Tan S, Sun Z. A detection method for anomaly flow in software defined network.
IEEE Access. 2018;6:27809-27817.
52. Pham NT, Foo E, Suriadi S, Jeffrey H, Lahza HFM. Improving performance of intrusion detection system
using ensemble methods and feature selection. In: Proceedings of the Australasian Computer Science Week
Multiconference. 2018. p. 1-6.
53. Rai A. Optimizing a New Intrusion Detection System Using Ensemble Methods and Deep Neural Network.
In: 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI). IEEE; 2020. p. 527-532.
54. Rai K, Devi MS, Guleria A. Decision tree-based algorithm for intrusion detection. International Journal of
Advanced Networking and Applications. 2016;7(4):2828.
https://doi.org/10.56294/dm202272
Data & Metadata. 2022; 1:34 16
55. Reddy A, Ordway-West M, Lee M, Dugan M, Whitney J, Kahana R, Rao M. Using Gaussian mixture models
to detect outliers in seasonal univariate network traffic. In: 2017 IEEE Security and Privacy Workshops (SPW).
IEEE; 2017. p. 229-234.
56. Rettig L, Khayati M, Cudré-Mauroux P, Piórkowski M. Online anomaly detection over big data streams. In:
Applied Data Science. Springer; 2019. p. 289-312.
57. Shukur HA, Kurnaz S. Credit Card Fraud Detection using Machine Learning Methodology. International
Journal of Computer Science and Mobile Computing. 2019;8:257-260.
58. Stefanidis K, Voyiatzis AG. An HMM-based anomaly detection approach for SCADA systems. In: IFIP
International Conference on Information Security Theory and Practice. Springer; 2016. p. 85-99.
59. Swarnkar M, Hubballi N. OCPAD: One class Naive Bayes classifier for payload-based anomaly detection.
Expert Systems with Applications. 2016;64:330-339.
60. Tang C, Xiang Y, Wang Y, Qian J, Qiang B. Detection and classification of anomaly intrusion using hierarchy
clustering and SVM. Security and Communication Networks. 2016;9(16):3401-3411.
61. Chandran R. Human-Computer Interaction in Robotics: A bibliometric evaluation using Web of Science.
Metaverse Basic and Applied Research. 2022;1:22. https://doi.org/10.56294/mr202222
62. Thakare YS, Bagal SB. Performance evaluation of K-means clustering algorithm with various distance
metrics. International Journal of Computer Applications. 2015;110(11):12-16.
63. Vasan KK, Surendiran B. Dimensionality reduction using principal component analysis for network
intrusion detection. Perspectives in Science. 2016;8:510-512.
64. Veselý A, Brechlerova D. Neural networks in intrusion detection systems. Agricultural Economics
(Zemědělská ekonomika). 2009;55(12):156-165.
65. Vinayakumar R, Soman KP, Poornachandran P. Evaluation of recurrent neural network and its variants
for intrusion detection system (IDS). International Journal of Information System Modeling and Design (IJISMD).
2017;8(3):43-63.
66. Wang L, Li J, Bhatti UA, Liu Y. Anomaly Detection in Wireless Sensor Networks Based on KNN. In:
International Conference on Artificial Intelligence and Security. Springer; 2019. p. 632-643.
67. Weerasinghe S, Erfani SM, Alpcan T, Leckie C. Support vector machines resilient against training data
integrity attacks. Pattern Recognition. 2019;96:106985.
FUNDING
No financing.
CONFLICT OF INTEREST
None.
AUTHORSHIP CONTRIBUTION
Conceptualization: Mohammed Hussein Thwaini.
Research: Mohammed Hussein Thwaini.
Methodology: Mohammed Hussein Thwaini.
Writing - original draft: Mohammed Hussein Thwaini.
Writing - revision and editing: Mohammed Hussein Thwaini.
https://doi.org/10.56294/dm202272