Skip to main content

A Survey of Anomaly Traffic Detection Based on Machine Learning

  • Conference paper
  • First Online:
Advances in Intelligent Data Analysis and Applications

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 253))

  • 1258 Accesses

Abstract

Recently, Internet has become an indispensable part of people’s daily lives, and a large number of service hosts provide services to users on the Internet. As a result, the security of these hosts that provide services on the public network is greatly threatened. If the attack suffered during the operation of the server host is not serious, it will affect the daily life of the user. However, once the server is severely attacked, the server will completely lose its ability to provide services. Therefore, network security has always been a hot issue of the Internet. The rise of machine learning and deep learning technology has given us a new solution. This technology not only has great advantages in dealing with large data sets, but also hopes to learn independently to deal with unknown attacks. Our paper will introduce some research for researchers’ reference in this area.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Chen, C.M., Huang, Y., Wang, E.K., et al.: Improvement of a mutual authentication protocol with anonymity for roaming service in wireless communications. Data Sci. Pattern Recogn. 2(1), 15–24 (2018)

    Google Scholar 

  2. Chen, C.M., Wang, K.H., Wu, T.Y., et al.: On the security of a three-party authenticated key agreement protocol based on chaotic maps. Data Sci. Pattern Recogn. 1(2), 1–10 (2017)

    Google Scholar 

  3. Chen, C.M., Xu, L., Wu, T.Y., et al.: On the security of a chaotic maps-based three-party authenticated key agreement protocol. J. Netw. Intell. 1(2), 61–65 (2016)

    Google Scholar 

  4. Criscuolo, P.J.: Distributed denial of service, tribe flood network 2000, and stacheldraht CIAC-2319. Department of Energy Computer Incident Advisory Capability (CIAC)[J]. UCRLID-136939, Rev, 1 (2000)

    Google Scholar 

  5. Chen, Z., Li, C., Sun, W.: Bitcoin price prediction using machine learning: an approach to sample dimension engineering. J. Comput. Appl. Math. 112395 (2019)

    Google Scholar 

  6. Arruda, H., Ohashi, O., Ferreira, J., et al.: Exploiting machine learning for the identification of locomotives’ position in large freight trains. Appl. Artif. Intell. 33(10), 902–912 (2019)

    Article  Google Scholar 

  7. Domingos, P.: The master algorithm: How the quest for the ultimate learning machine will remake our world. Basic Books (2015)

    Google Scholar 

  8. Mirkovic, J., Reiher, P.: A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Comput. Commun. Rev. 34(2), 39–53 (2004)

    Article  Google Scholar 

  9. Ranjan, S., Swaminathan, R., Uysal, M., et al.: DDoS-Resilient Scheduling to Counter Application Layer Attacks Under Imperfect Detection. INFOCOM (2006)

    Google Scholar 

  10. Lee, K., Kim, J., Kwon, K.H., et al.: DDoS attack detection method using cluster analysis. Expert Syst. Appl. 34(3), 1659–1665 (2008)

    Article  Google Scholar 

  11. Feinstein, L., Schnackenberg, D., Balupari, R., et al.: Statistical approaches to DDoS attack detection and response. In: Proceedings DARPA Information Survivability Conference and Exposition, IEEE, vol. 1, pp. 303–314 (2003)

    Google Scholar 

  12. Gu, G., Perdisci, R., Zhang, J., et al.: Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection (2008)

    Google Scholar 

  13. Konar, A., Jain, L.: Supervised learning by a fuzzy petri net. In: Cognitive Engineering: A Distributed Approach to Machine Intelligence, pp. 233–255 (2005)

    Google Scholar 

  14. Byun, H., Lee, S.W.: A survey on pattern recognition applications of support vector machines. Int. J. Pattern Recognit Artif Intell. 17(03), 459–486 (2003)

    Article  Google Scholar 

  15. Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20(3), 273–297 (1995)

    MATH  Google Scholar 

  16. Shon, T., Seo, J., Moon, J.: SVM approach with a genetic algorithm for network intrusion detection. In: International Symposium on Computer and Information Sciences, pp. 224–233. Springer, Berlin, Heidelberg (2005)

    Google Scholar 

  17. Shon, T., Moon, J.: A hybrid machine learning approach to network anomaly detection. Inf. Sci. 177(18), 3799–3821 (2007)

    Article  Google Scholar 

  18. Sultana, N., Chilamkurti, N., Peng, W., et al.: Survey on SDN based network intrusion detection system using machine learning approaches. Peer-to-Peer Netw. Appl. 12(2), 493–501 (2019)

    Article  Google Scholar 

  19. Garg, S., Kaur, K., Kumar, N., et al.: Hybrid deep-learning-based anomaly detection scheme for suspicious flow detection in SDN: a social multimedia perspective. IEEE Trans. Multimedia 21(3), 566–578 (2019)

    Article  Google Scholar 

  20. Yuan, Q., Wei, S.: Aligning network traffic for serial consistency and anomalies with a customized LSTM model. In: 2018 IEEE International Conference on Progress in Informatics and Computing (PIC). IEEE, pp. 322–326 (2018)

    Google Scholar 

  21. Hwang, R.H., Peng, M.C., Nguyen, V.L., et al.: An LSTM-based deep learning approach for classifying malicious traffic at the packet level. Appl. Sci. 9(16), 3414 (2019)

    Article  Google Scholar 

  22. Vanderwende, L., Daumé, III H., Kirchhoff, K.: Proceedings of the 2013 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. In: Proceedings of the 2013 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (2013)

    Google Scholar 

  23. Wu, T.Y., Chen, C.M., Wang, K.H., et al.: Security analysis of Rhee et al.’s public encryption with keyword search schemes: a review. J. Netw. Intell. 3(1), 16–25 (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kun Meng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gao, MH., Meng, K. (2022). A Survey of Anomaly Traffic Detection Based on Machine Learning. In: Pan, JS., Balas, V.E., Chen, CM. (eds) Advances in Intelligent Data Analysis and Applications. Smart Innovation, Systems and Technologies, vol 253. Springer, Singapore. https://doi.org/10.1007/978-981-16-5036-9_20

Download citation

Publish with us

Policies and ethics