Machine Learning Techniques for Network Anomaly Detection: A Survey
Author | Eltanbouly, Sohaila |
Author | Bashendy, May |
Author | Alnaimi, Noora |
Author | Chkirbene, Zina |
Author | Erbad, Aiman |
Available date | 2024-03-04T04:55:29Z |
Publication Date | 2020-02-01 |
Publication Name | 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies, ICIoT 2020 |
Identifier | http://dx.doi.org/10.1109/ICIoT48696.2020.9089465 |
Citation | S. Eltanbouly, M. Bashendy, N. AlNaimi, Z. Chkirbene and A. Erbad, "Machine Learning Techniques for Network Anomaly Detection: A Survey," 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), Doha, Qatar, 2020, pp. 156-162, doi: 10.1109/ICIoT48696.2020.9089465. |
ISBN | 9781728148212 |
Abstract | Nowadays, distributed data processing in cloud computing has gained increasing attention from many researchers. The intense transfer of data has made the network an attractive and vulnerable target for attackers to exploit and experiment with different types of attacks. Therefore, many intrusion detection techniques have been evolving to protect cloud distributed services by detecting the different attack types on the network. Machine learning techniques have been heavily applied in intrusion detection systems with different algorithms. This paper surveys recent research advances linked to machine learning techniques. We review some representative algorithms and discuss their proprieties in detail. We compare them in terms of intrusion accuracy and detection rate using different data sets. |
Language | en |
Publisher | IEEE |
Subject | Anomaly detection intrusion detection systems machine Learning network security |
Type | Conference Paper |
Pagination | 156-162 |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |
This item appears in the following Collection(s)
-
Computer Science & Engineering [2402 items ]