Anomaly detection in Network Traffic Using Unsupervised Machine learning Approach. Aditya Vikram, None Mohana. Published online June 1, 2020. doi:https://doi.org/10.1109/icces48766.2020.9137987
Data
Anomalies
Classifiers
80/20 data split
PCA used for reducing dimensions
Anomaly score
In general SVM is supervised
In One-class SVM we only have 1 class so we use origin as a "fake" second class.
Parameters: kernel, ν
Combining Unsupervised Approaches for Near Real-Time Network Traffic Anomaly Detection. Carrera F, Dentamaro V, Stefano Galantucci, Iannacone A, Donato Impedovo, Pirlo G. Applied Sciences. 2022;12(3):1759-1759. doi:https://doi.org/10.3390/app12031759
Data
Anomalies
Classifiers
Isolation Forest but we add slope
The results obtained show that the MemAE-EIF algorithm achieves the best performance in terms of accuracy and F1-score for all the datasets examined. A high precision rate is equivalent to a low number of false positives, which are false alarms that experts in the field must handle.
SHAP values for EIF model of MemAE-EIF algorithm
(KDDCUP99 dataset)
Exploiting SNMP-MIB Data to Detect Network Anomalies using Machine Learning Techniques. Al-Naymat G, Al-kasassbeh M, Al-Hawari E. arXiv.org. Published 2018. Accessed October 21, 2024. https://arxiv.org/abs/1809.02611
Data
Al-Kasassbeh, M., Al-Naymat, G., & Al-Hawari, E. (2016). Towards Generating Realistic SNMP-MIB Dataset for Network Anomaly Detection. International Journal of Computer Science and Information Security, 14(9), 1162)
Anomalies
Classifiers
J48 (same as C4.5?)
AdaBoost
| Var | Name |
|---|---|
| 1 | ifInOctets |
| 2 | ifOutOctets |
| 3 | ifOutDiscards |
| 4 | ifInUcastPkts |
| 5 | ifInNUcastPkts |
| 6 | ifInDiscards |
| 7 | ifOutUcastPkts |
| 8 | ifOutNUcastPkts |
Detecting network anomalies using machine learning and SNMP-MIB dataset with IP group. Manna A, Alkasassbeh M. arXiv.org. Published 2019. Accessed October 22, 2024. https://arxiv.org/abs/1906.00863
Data:
Anomalies:
Classifiers
| Variable Name | Variable Description |
|---|---|
| ipInReceives | The total number of input datagrams that are received from the interfaces, including those received in error. |
| ipInDelivers | The total number of input datagrams that are delivered to the IP user protocols successfully (including ICMP). |
| ipOutRequests | The total number of IP datagrams supplied to IP in requests for transmission, not including ipForwDatagrams. |
| ipOutDiscards | The number of output datagrams that do not have errors preventing their transmission to their destination. |
| ipInDiscards | The number of input datagrams that do not have errors preventing their transmission to their destination. |
| ipForwDatagrams | The number of input datagrams for which this entity was not their final destination. |
| ipOutNoRoutes | The number of datagrams discarded because no route could be found to transmit them to their destination. |
| ipInAddrErrors | The number of input datagrams discarded because the IP address in their destination field was not valid. |
Similar results for 5 and 3 variables (ReliefFAttributeEval, InfoGainAttributeEval)
Evaluation of Machine Learning Algorithms for Anomaly Detection. Nebrase Elmrabit, Zhou F, Li F, Zhou H. Zenodo (CERN European Organization for Nuclear Research). Published online June 1, 2020. doi:https://doi.org/10.1109/cybersecurity49315.2020.9138871
Data:
Anomalies: