A Machine Learning Approach for Idle State Network Anomaly Detection

被引:0
|
作者
Fowdur, T. P. [1 ]
Beeharry, Y. [1 ]
Aucklah, K. [1 ]
机构
[1] Univ Mauritius, Dept Elect & Elect Engn, Reduit, Mauritius
关键词
Anomaly detection; DDoS attack; Congestion; Statistical tests;
D O I
10.1007/978-3-030-18240-3_19
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper proposes a Java application for detecting network anomalies due to DDoS attacks and congestion on a host in the idle state. It is also very challenging to detect and identify such problems especially when there is congestion in a network. The application uses parameters such as upload speed, download speed, number of packets transmitted and received, to analyse network traffic. The Multi-variate Gaussian technique has been used to detect anomalies in network traffic caused by DDoS attacks and congestion. However, in order to ensure that the anomalies detected over a specific interval of time are significant, t-tests have been used to test for their statistical significance.
引用
收藏
页码:205 / 214
页数:10
相关论文
共 50 条
  • [1] A hybrid machine learning approach to network anomaly detection
    Shon, Taeshik
    Moon, Jongsub
    [J]. INFORMATION SCIENCES, 2007, 177 (18) : 3799 - 3821
  • [2] Machine Learning in Network Anomaly Detection: A Survey
    Wang, Song
    Balarezo, Juan Fernando
    Kandeepan, Sithamparanathan
    Al-Hourani, Akram
    Chavez, Karina Gomez
    Rubinstein, Benjamin
    [J]. IEEE ACCESS, 2021, 9 : 152379 - 152396
  • [3] Network Anomaly Detection by Means of Machine Learning
    Kwitt, Roland
    [J]. ERCIM NEWS, 2006, (67): : 63 - 64
  • [4] Two-tier network anomaly detection model: a machine learning approach
    Hamed Haddad Pajouh
    GholamHossein Dastghaibyfard
    Sattar Hashemi
    [J]. Journal of Intelligent Information Systems, 2017, 48 : 61 - 74
  • [5] Two-tier network anomaly detection model: a machine learning approach
    Pajouh, Hamed Haddad
    Dastghaibyfard, GholamHossein
    Hashemi, Sattar
    [J]. JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 2017, 48 (01) : 61 - 74
  • [6] IP Network Anomaly Detection using Machine Learning
    Nair, Roshan
    Kasula, Chaithanya Pramodh
    Vankayala, Sravanthi
    Chakraborty, Niloy
    [J]. 2019 IEEE 5TH INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2019,
  • [7] Anomaly-based Network Intrusion Detection using Ensemble Machine Learning Approach
    Das, Abhijit
    Pramod
    Sunitha, B. S.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (02) : 635 - 645
  • [8] PAREEKSHA - A Machine Learning Approach for Intrusion and Anomaly Detection
    Nagaraja, Arun
    Aljawarneh, Shadi
    Prabhakara, H. S.
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON DATA SCIENCE, E-LEARNING AND INFORMATION SYSTEMS 2018 (DATA'18), 2018,
  • [9] Network Intrusion Detection Using Machine Learning Anomaly Detection Algorithms
    Hanifi, Khadija
    Bank, Hasan
    Karsligil, M. Elif
    Yavuz, A. Gokhan
    Guvensan, M. Amac
    [J]. 2017 25TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2017,
  • [10] Anomaly detection in blockchain using network representation and machine learning
    Martin, Kevin
    Rahouti, Mohamed
    Ayyash, Moussa
    Alsmadi, Izzat
    [J]. SECURITY AND PRIVACY, 2022, 5 (02)