Data Mining for Anomaly Detection in Network Traffic
DOI:
https://doi.org/10.32628/IJSRST2269715Keywords:
Anomaly Detection, Network Traffic, Data Mining, Machine Learning, Intrusion Detection, Feature Selection, Clustering, Classification, Deep Learning, Hybrid Models, False Positives, Real-Time Systems.Abstract
The paper explores the application of data mining techniques for anomaly detection in network traffic, focusing on enhancing network security through early detection of unusual behavior. Traditional network monitoring methods often struggle with identifying complex, previously unseen attacks, making the adoption of data mining essential. The authors review existing anomaly detection methods, including statistical, machine learning, and hybrid approaches, identifying their limitations. A novel system based on advanced data mining algorithms is proposed, integrating feature selection and preprocessing techniques to improve detection accuracy. The proposed system is evaluated using real-world network traffic datasets, demonstrating significant improvements in detection rates and reduction in false positives. Results are compared to existing methods, showcasing the efficacy of the proposed approach. The paper concludes with an analysis of the system's strengths, its potential for real-time application, and future research directions to further refine anomaly detection systems for evolving network security challenges.
References
- Sommer, R., & Paxson, V. (2010). Outside the closed world: On using machine learning for network intrusion detection. Proceedings of the 2010 IEEE Symposium on Security and Privacy, 305-316.
- J. Jangid, "Efficient Training Data Caching for Deep Learning in Edge Computing Networks," International Journal of Scientific Research in Computer Science, Engineering and Information Technology, vol. 7, no. 5, pp. 337–362, 2020.
- Ahmed, M., Mahmood, A. N., & Hu, J. (2016). A survey of network anomaly detection techniques. Journal of Network and Computer Applications, 60, 19-31.
- Xia, Y., & Liu, X. (2019). A survey of machine learning-based anomaly detection in network traffic. Journal of Computational Science, 30, 1-13.
- Zhang, L., & Xie, H. (2019). Deep learning-based anomaly detection in network traffic: A review. Journal of Communications and Networks, 21(2), 170-182.
- Liu, J., & Li, Q. (2018). Anomaly detection for network traffic using deep learning. Proceedings of the 2018 International Conference on Computer Network and Communication Engineering.
- Sharma, A., & Singh, H. (2017). An overview of intrusion detection systems using data mining techniques. Journal of Computer Networks and Communications, 2017, 1-16.
- Nguyen, T., & Armitage, G. (2008). A survey of techniques for internet traffic classification using machine learning. IEEE Communications Surveys & Tutorials, 10(4), 56-76.
- Malhotra, S., Yashu, F., Saqib, M., & Divyani, F. (2020). A multi-cloud orchestration model using Kubernetes for microservices. Migration Letters, 17(6), 870–875. https://migrationletters.com/index.php/ml/article/view/11795
- Koh, Y., & Lee, S. (2015). A survey of machine learning methods for network anomaly detection. Proceedings of the 2015 IEEE International Conference on Communications.
- Al-Khresi, F., & Li, Y. (2020). Anomaly detection using machine learning algorithms for network traffic analysis. Journal of Applied Security Research, 15(1), 92-110.
- Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM Computing Surveys (CSUR), 41(3), 1-58.
- Dua, S., & Du, X. (2015). Data Mining and Machine Learning in Cybersecurity. CRC Press. ISBN: 9781498722349.
- Hodge, V. J., & Austin, J. (2004). A survey of outlier detection methodologies. Artificial Intelligence Review, 22(2), 85-126.
- Fnu, Y., Saqib, M., Malhotra, S., Mehta, D., Jangid, J., & Dixit, S. (2021). Thread mitigation in cloud native application Develop- Ment. Webology, 18(6), 10160–10161
- Gonzalez, A., & Zidan, H. (2020). Anomaly detection techniques for network intrusion detection systems: A survey. Journal of Network and Computer Applications, 173, 102859.
- Sachin Dixit, "The Impact of Quantum Supremacy on Cryptography : Implications for Secure Financial Transactions" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 6, Issue 4, pp.611-637, July-August-2020. Available at doi : https://doi.org/10.32628/CSEIT2064141
- Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153-1176.
- Gupte, A., & Shobha, S. (2018). Hybrid machine learning techniques for anomaly-based intrusion detection. Proceedings of the 2018 International Conference on Networking and Advanced Computing.
- Hassan, M., & Afzal, M. (2019). Deep learning models for intrusion detection in network traffic. Proceedings of the 2019 IEEE International Conference on Machine Learning and Applications (ICMLA), 260-267.
- Laskov, P., & Schölkopf, B. (2006). A survey of anomaly detection techniques. International Journal of Computer Science, 9(4), 324-340.
- Jouini, M., & Ben, A. (2015). A survey of machine learning techniques for intrusion detection systems. Proceedings of the 2015 International Conference on Advanced Machine Learning Technologies and Applications.
- Gorib, A., & Jothi, V. (2016). A survey of feature selection techniques for anomaly detection in network traffic. Proceedings of the 2016 International Conference on Cyber Security and Cloud Computing.
- Rani, P., & Jain, S. (2017). Anomaly detection techniques using machine learning for network traffic analysis. Proceedings of the 2017 International Conference on Information Technology and Management Engineering.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST

This work is licensed under a Creative Commons Attribution 4.0 International License.