Machine Learning Techniques for Network Anomaly Detection: A Survey

  • Sohaila Eltanbouly
  • , May Bashendy
  • , Noora Alnaimi
  • , Zina Chkirbene
  • , Aiman Erbad

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

60 Citations (Scopus)

Abstract

Nowadays, distributed data processing in cloud computing has gained increasing attention from many researchers. The intense transfer of data has made the network an attractive and vulnerable target for attackers to exploit and experiment with different types of attacks. Therefore, many intrusion detection techniques have been evolving to protect cloud distributed services by detecting the different attack types on the network. Machine learning techniques have been heavily applied in intrusion detection systems with different algorithms. This paper surveys recent research advances linked to machine learning techniques. We review some representative algorithms and discuss their proprieties in detail. We compare them in terms of intrusion accuracy and detection rate using different data sets.

Original languageEnglish
Title of host publication2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies, ICIoT 2020
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages156-162
Number of pages7
ISBN (Electronic)9781728148212
DOIs
Publication statusPublished - Feb 2020
Externally publishedYes
Event2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies, ICIoT 2020 - Doha, Qatar
Duration: 2 Feb 20205 Feb 2020

Publication series

Name2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies, ICIoT 2020

Conference

Conference2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies, ICIoT 2020
Country/TerritoryQatar
CityDoha
Period2/02/205/02/20

Keywords

  • Anomaly detection
  • intrusion detection systems
  • machine Learning
  • network security

Fingerprint

Dive into the research topics of 'Machine Learning Techniques for Network Anomaly Detection: A Survey'. Together they form a unique fingerprint.

Cite this