期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
PUNet:A Semi-Supervised Anomaly Detection Model for Network Anomaly Detection Based on Positive Unlabeled Data
1
作者 Gang Long Zhaoxin Zhang 《Computers, Materials & Continua》 SCIE EI 2024年第10期327-343,共17页
Network anomaly detection plays a vital role in safeguarding network security.However,the existing network anomaly detection task is typically based on the one-class zero-positive scenario.This approach is susceptible... Network anomaly detection plays a vital role in safeguarding network security.However,the existing network anomaly detection task is typically based on the one-class zero-positive scenario.This approach is susceptible to overfitting during the training process due to discrepancies in data distribution between the training set and the test set.This phenomenon is known as prediction drift.Additionally,the rarity of anomaly data,often masked by normal data,further complicates network anomaly detection.To address these challenges,we propose the PUNet network,which ingeniously combines the strengths of traditional machine learning and deep learning techniques for anomaly detection.Specifically,PUNet employs a reconstruction-based autoencoder to pre-train normal data,enabling the network to capture potential features and correlations within the data.Subsequently,PUNet integrates a sampling algorithm to construct a pseudo-label candidate set among the outliers based on the reconstruction loss of the samples.This approach effectively mitigates the prediction drift problem by incorporating abnormal samples.Furthermore,PUNet utilizes the CatBoost classifier for anomaly detection to tackle potential data imbalance issues within the candidate set.Extensive experimental evaluations demonstrate that PUNet effectively resolves the prediction drift and data imbalance problems,significantly outperforming competing methods. 展开更多
关键词 network anomaly detection representation learning candidate set CatBoost
下载PDF
Machine Learning Models for Heterogenous Network Security Anomaly Detection
2
作者 Mercy Diligence Ogah Joe Essien +1 位作者 Martin Ogharandukun Monday Abdullahi 《Journal of Computer and Communications》 2024年第6期38-58,共21页
The increasing amount and intricacy of network traffic in the modern digital era have worsened the difficulty of identifying abnormal behaviours that may indicate potential security breaches or operational interruptio... The increasing amount and intricacy of network traffic in the modern digital era have worsened the difficulty of identifying abnormal behaviours that may indicate potential security breaches or operational interruptions. Conventional detection approaches face challenges in keeping up with the ever-changing strategies of cyber-attacks, resulting in heightened susceptibility and significant harm to network infrastructures. In order to tackle this urgent issue, this project focused on developing an effective anomaly detection system that utilizes Machine Learning technology. The suggested model utilizes contemporary machine learning algorithms and frameworks to autonomously detect deviations from typical network behaviour. It promptly identifies anomalous activities that may indicate security breaches or performance difficulties. The solution entails a multi-faceted approach encompassing data collection, preprocessing, feature engineering, model training, and evaluation. By utilizing machine learning methods, the model is trained on a wide range of datasets that include both regular and abnormal network traffic patterns. This training ensures that the model can adapt to numerous scenarios. The main priority is to ensure that the system is functional and efficient, with a particular emphasis on reducing false positives to avoid unwanted alerts. Additionally, efforts are directed on improving anomaly detection accuracy so that the model can consistently distinguish between potentially harmful and benign activity. This project aims to greatly strengthen network security by addressing emerging cyber threats and improving their resilience and reliability. 展开更多
关键词 Cyber-Security network Anomaly Detection Machine Learning Random Forest Decision Tree Gaussian Naive Bayes
下载PDF
A Method for Detecting Wide-scale Network Traffic Anomalies
3
作者 Wang Minghua(National Computer Network Emergency Response Technical Team/Coordination Center(CNCERT/CC),Beijing 100029,China) 《ZTE Communications》 2007年第4期19-23,共5页
Network traffic anomalies refer to the traffic changed abnormally and obviously.Local events such as temporary network congestion,Distributed Denial of Service(DDoS)attack and large-scale scan,or global events such as... Network traffic anomalies refer to the traffic changed abnormally and obviously.Local events such as temporary network congestion,Distributed Denial of Service(DDoS)attack and large-scale scan,or global events such as abnormal network routing,can cause network anomalies.Network anomaly detection and analysis are very important to Computer Security Incident Response Teams(CSIRT).But wide-scale traffic anomaly detection requires extracting anomalous modes from large amounts of high-dimensional noise-rich data,and interpreting the modes;so,it is very difficult.This paper proposes a general method based on Principle Component Analysis(PCA)to analyze network anomalies.This method divides the traffic matrix into normal and anomalous subspaces,maps traffic vectors into the normal subspace,gets the distance from detected vector to average normal vector,and detects anomalies based on that distance. 展开更多
关键词 A Method for Detecting Wide-scale network Traffic anomalies DDOS Security PCA
下载PDF
Clustering-based label estimation for network anomaly detection 被引量:2
4
作者 Sunhee Baek Donghwoon Kwon +3 位作者 Sang C.Suh Hyunjoo Kim Ikkyun Kim Jinoh Kim 《Digital Communications and Networks》 SCIE CSCD 2021年第1期37-44,共8页
A substantial body of work has been done to identify network anomalies using supervised and unsupervised learning techniques with their unique strengths and weaknesses.In this work,we propose a new approach that takes... A substantial body of work has been done to identify network anomalies using supervised and unsupervised learning techniques with their unique strengths and weaknesses.In this work,we propose a new approach that takes advantage of both worlds of unsupervised and supervised learnings.The main objective of the proposed approach is to enable supervised anomaly detection without the provision of the associated labels by users.To this end,we estimate the labels of each connection in the training phase using clustering.The“estimated”labels are then utilized to establish a supervised learning model for the subsequent classification of connections in the testing stage.We set up a new property that defines anomalies in the context of network anomaly detection to improve the quality of estimated labels.Through our extensive experiments with a public dataset(NSL-KDD),we will prove that the proposed method can achieve performance comparable to one with the “original”labels provided in the dataset.We also introduce two heuristic functions that minimize the impact of the randomness of clustering to improve the overall quality of the estimated labels. 展开更多
关键词 Label estimation network anomaly detection Clustering randomness
下载PDF
Anomaly Detection of Complex Networks Based on Intuitionistic Fuzzy Set Ensemble 被引量:1
5
作者 Jin-Fa Wang Xiao Liu +1 位作者 Hai Zhao Xing-Chi Chen 《Chinese Physics Letters》 SCIE CAS CSCD 2018年第5期156-160,共5页
Ensemble learning for anomaly detection of data structured into a complex network has been barely studied due to the inconsistent performance of complex network characteristics and the lack of inherent objective funct... Ensemble learning for anomaly detection of data structured into a complex network has been barely studied due to the inconsistent performance of complex network characteristics and the lack of inherent objective function. We propose the intuitionistic fuzzy set(IFS)-based anomaly detection, a new two-phase ensemble method for anomaly detection based on IFS, and apply it to the abnormal behavior detection problem in temporal complex networks.Firstly, it constructs the IFS of a single network characteristic, which quantifies the degree of membership,non-membership and hesitation of each network characteristic to the defined linguistic variables so that makes the unuseful or noise characteristics become part of the detection. To build an objective intuitionistic fuzzy relationship, we propose a Gaussian distribution-based membership function which gives a variable hesitation degree. Then, for the fuzzification of multiple network characteristics, the intuitionistic fuzzy weighted geometric operator is adopted to fuse multiple IFSs and to avoid the inconsistence of multiple characteristics. Finally, the score function and precision function are used to sort the fused IFS. Finally, we carry out extensive experiments on several complex network datasets for anomaly detection, and the results demonstrate the superiority of our method to state-of-the-art approaches, validating the effectiveness of our method. 展开更多
关键词 NET IFS Anomaly Detection of Complex networks Based on Intuitionistic Fuzzy Set Ensemble
下载PDF
Geological inferences about the upper crustal configuration of the Medellin-Aburra Valley(Colombia)using strong motion seismic records
6
作者 Jose David Henao Casas Gaspar Monsalve 《Geodesy and Geodynamics》 2018年第1期67-76,共10页
In regions of complex geology and tectonic assembly, strong motion seismic arrival time records can be used to test the plausibility of existing hypothesis about the origin of lithological and tectonic features and ho... In regions of complex geology and tectonic assembly, strong motion seismic arrival time records can be used to test the plausibility of existing hypothesis about the origin of lithological and tectonic features and how they are related in space and time. In this study we use differential travel time residuals at some strong motion accelerographic stations in the Medellin-Aburra Valley, in the northern Central Cordillera of the Colombian Andes, to discuss some aspects of the geological configuration. We based our work on the hypothesis that the differences between seismic travel time residuals among pairs of stations are a function of the differences in the surface geology and the near-surface upper crustal configuration. Our results are consistent with the volcanic rocks of the Quebradagrande Complex being less mafic, more weathered or more tectonically affected than previously thought, with the presence of a relatively thin dunite body on top of the metamorphic basement, and with a large lateral heterogeneity in the mainly mafic San Diego Stock. 展开更多
关键词 Aburrá Valley geology Strong motion networks Seismic wave arrivals Residuals Seismic anomalies
下载PDF
A survey of cloud network fault diagnostic systems and tool 被引量:2
7
作者 Yining QI Chongrong FANG +4 位作者 Haoyu LIU Daxiang KANG Biao LYU Peng CHENG Jiming CHEN 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2021年第8期1031-1045,共15页
Recently, cloud computing has become a vital part that supports people’s normal lives and production.However, accompanied by the increasing complexity of the cloud network, failures constantly keep coming up and caus... Recently, cloud computing has become a vital part that supports people’s normal lives and production.However, accompanied by the increasing complexity of the cloud network, failures constantly keep coming up and cause huge economic losses. Thus, to guarantee the cloud network performance and prevent execrable effects caused by failures, cloud network diagnostics has become of great interest for cloud service providers. Due to the characteristics of cloud network(e.g., virtualization and multi-tenancy), transplanting traditional network diagnostic tools to the cloud network face several difficulties. Additionally, many existing tools cannot solve problems in the cloud network. In this paper, we summarize and classify the state-of-the-art technologies of cloud diagnostics which can be used in the production cloud network according to their features. Moreover, we analyze the differences between cloud network diagnostics and traditional network diagnostics based on the characteristics of the cloud network. Considering the operation requirements of the cloud network, we propose the points that should be cared about when designing a cloud network diagnostic tool. Also, we discuss the challenges that cloud network diagnostics will face in future development. 展开更多
关键词 Cloud network network diagnostics network anomaly network monitoring
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部