Corporate network anomaly detection methodology utilizing machine learning algorithms

被引:0
|
作者
Baisholan, Nazerke [1 ]
Baisholanova, Karlygash [1 ]
Kubayev, Kazila [1 ]
Alimzhanova, Zhanna [1 ]
Baimuldina, Nazira [1 ]
机构
[1] Al Farabi Kazakh Natl Univ, Dept Informat Syst, 71 Al Farabi Ave, Alma Ata 050040, Kazakhstan
关键词
Machine learning techniques; enterprise networks; machine learning; attack detection; traffic analysis; enterprise network security; DISCOVERY;
D O I
10.1080/23080477.2024.2375457
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
This study addresses the critical need for securing corporate networks against anomalies, a pressing concern in ensuring the comprehensive security of these networks. It aims to develop and validate a new machine learning-based methodology for anomaly detection that is adaptable across various corporate network environments, highlighting the method's potential practical applications. Employing a systematic approach, the research integrates system analysis of anomaly detection methodologies with an analytical review of machine learning techniques tailored for high-security measures and attack prevention in corporate networks. This dual approach ensures a robust framework for identifying and addressing network anomalies efficiently. The methodology demonstrated notable efficacy, with the proposed machine learning-based anomaly detection techniques achieving an efficiency rate upwards of 90% in identifying and categorizing network traffic types. This high level of precision allows for the effective tracking of network anomalies across diverse corporate networks and their respective devices and equipment. The findings underscore the substantial practical value of the developed methodology, offering a promising avenue for enhancing corporate network security. The implementation of this machine learning-based approach not only facilitates the timely detection of anomalies but also significantly contributes to the improvement of machine learning applications within the realm of network security. Future research could further refine these techniques, exploring scalability and real-time data analysis enhancements to bolster their effectiveness across various network configurations. [GRAPHICS]
引用
收藏
页数:13
相关论文
共 50 条
  • [21] Anomaly Detection with Machine Learning Algorithms and Big Data in Electricity Consumption
    Oprea, Simona-Vasilica
    Bara, Adela
    Puican, Florina Camelia
    Radu, Ioan Cosmin
    [J]. SUSTAINABILITY, 2021, 13 (19)
  • [22] Anomaly detection for atomic clocks using unsupervised machine learning algorithms
    Chen, Edwin
    Charbonneau, Andre
    Gertsvolf, Marina
    Wang, Yunli
    [J]. METROLOGIA, 2024, 61 (05)
  • [23] Comparison of Machine Learning Algorithms for Detection of Network Intrusions
    Li, Zhida
    Batta, Prerna
    Trajkovic, Ljiljana
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2018, : 4242 - 4247
  • [24] Anomaly detection in blockchain using network representation and machine learning
    Martin, Kevin
    Rahouti, Mohamed
    Ayyash, Moussa
    Alsmadi, Izzat
    [J]. SECURITY AND PRIVACY, 2022, 5 (02)
  • [25] Unsupervised Machine Learning for Anomaly Detection in Synchrophasor Network Traffic
    Donner, Phillip
    Leger, Aaron St.
    Blaine, Raymond
    [J]. 2019 51ST NORTH AMERICAN POWER SYMPOSIUM (NAPS), 2019,
  • [26] Anomaly detection in network traffic using extreme learning machine
    Imamverdiyev, Yadigar
    Sukhostat, Lyudmila
    [J]. 2016 IEEE 10TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT), 2016, : 418 - 421
  • [27] Network Traffic Anomaly Detection using Machine Learning Approaches
    Limthong, Kriangkrai
    Tawsook, Thidarat
    [J]. 2012 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (NOMS), 2012, : 542 - 545
  • [28] A Machine Learning Approach for Idle State Network Anomaly Detection
    Fowdur, T. P.
    Beeharry, Y.
    Aucklah, K.
    [J]. SMART AND SUSTAINABLE ENGINEERING FOR NEXT GENERATION APPLICATIONS, 2019, 561 : 205 - 214
  • [29] Greedy Algorithms for Network Anomaly Detection
    Andrysiak, Tomasz
    Saganowski, Lukasz
    Choras, Michal
    [J]. INTERNATIONAL JOINT CONFERENCE CISIS'12 - ICEUTE'12 - SOCO'12 SPECIAL SESSIONS, 2013, 189 : 235 - 244
  • [30] Application and evaluation of selected machine learning algorithms in anomaly detection module for SOC
    Warzynski, A.
    Bienias, P.
    Kolaczek, G.
    [J]. DEVELOPMENTS OF ARTIFICIAL INTELLIGENCE TECHNOLOGIES IN COMPUTATION AND ROBOTICS, 2020, 12 : 971 - 978