Abstract
Recently, Internet has become an indispensable part of people’s daily lives, and a large number of service hosts provide services to users on the Internet. As a result, the security of these hosts that provide services on the public network is greatly threatened. If the attack suffered during the operation of the server host is not serious, it will affect the daily life of the user. However, once the server is severely attacked, the server will completely lose its ability to provide services. Therefore, network security has always been a hot issue of the Internet. The rise of machine learning and deep learning technology has given us a new solution. This technology not only has great advantages in dealing with large data sets, but also hopes to learn independently to deal with unknown attacks. Our paper will introduce some research for researchers’ reference in this area.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Chen, C.M., Huang, Y., Wang, E.K., et al.: Improvement of a mutual authentication protocol with anonymity for roaming service in wireless communications. Data Sci. Pattern Recogn. 2(1), 15–24 (2018)
Chen, C.M., Wang, K.H., Wu, T.Y., et al.: On the security of a three-party authenticated key agreement protocol based on chaotic maps. Data Sci. Pattern Recogn. 1(2), 1–10 (2017)
Chen, C.M., Xu, L., Wu, T.Y., et al.: On the security of a chaotic maps-based three-party authenticated key agreement protocol. J. Netw. Intell. 1(2), 61–65 (2016)
Criscuolo, P.J.: Distributed denial of service, tribe flood network 2000, and stacheldraht CIAC-2319. Department of Energy Computer Incident Advisory Capability (CIAC)[J]. UCRLID-136939, Rev, 1 (2000)
Chen, Z., Li, C., Sun, W.: Bitcoin price prediction using machine learning: an approach to sample dimension engineering. J. Comput. Appl. Math. 112395 (2019)
Arruda, H., Ohashi, O., Ferreira, J., et al.: Exploiting machine learning for the identification of locomotives’ position in large freight trains. Appl. Artif. Intell. 33(10), 902–912 (2019)
Domingos, P.: The master algorithm: How the quest for the ultimate learning machine will remake our world. Basic Books (2015)
Mirkovic, J., Reiher, P.: A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Comput. Commun. Rev. 34(2), 39–53 (2004)
Ranjan, S., Swaminathan, R., Uysal, M., et al.: DDoS-Resilient Scheduling to Counter Application Layer Attacks Under Imperfect Detection. INFOCOM (2006)
Lee, K., Kim, J., Kwon, K.H., et al.: DDoS attack detection method using cluster analysis. Expert Syst. Appl. 34(3), 1659–1665 (2008)
Feinstein, L., Schnackenberg, D., Balupari, R., et al.: Statistical approaches to DDoS attack detection and response. In: Proceedings DARPA Information Survivability Conference and Exposition, IEEE, vol. 1, pp. 303–314 (2003)
Gu, G., Perdisci, R., Zhang, J., et al.: Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection (2008)
Konar, A., Jain, L.: Supervised learning by a fuzzy petri net. In: Cognitive Engineering: A Distributed Approach to Machine Intelligence, pp. 233–255 (2005)
Byun, H., Lee, S.W.: A survey on pattern recognition applications of support vector machines. Int. J. Pattern Recognit Artif Intell. 17(03), 459–486 (2003)
Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20(3), 273–297 (1995)
Shon, T., Seo, J., Moon, J.: SVM approach with a genetic algorithm for network intrusion detection. In: International Symposium on Computer and Information Sciences, pp. 224–233. Springer, Berlin, Heidelberg (2005)
Shon, T., Moon, J.: A hybrid machine learning approach to network anomaly detection. Inf. Sci. 177(18), 3799–3821 (2007)
Sultana, N., Chilamkurti, N., Peng, W., et al.: Survey on SDN based network intrusion detection system using machine learning approaches. Peer-to-Peer Netw. Appl. 12(2), 493–501 (2019)
Garg, S., Kaur, K., Kumar, N., et al.: Hybrid deep-learning-based anomaly detection scheme for suspicious flow detection in SDN: a social multimedia perspective. IEEE Trans. Multimedia 21(3), 566–578 (2019)
Yuan, Q., Wei, S.: Aligning network traffic for serial consistency and anomalies with a customized LSTM model. In: 2018 IEEE International Conference on Progress in Informatics and Computing (PIC). IEEE, pp. 322–326 (2018)
Hwang, R.H., Peng, M.C., Nguyen, V.L., et al.: An LSTM-based deep learning approach for classifying malicious traffic at the packet level. Appl. Sci. 9(16), 3414 (2019)
Vanderwende, L., Daumé, III H., Kirchhoff, K.: Proceedings of the 2013 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. In: Proceedings of the 2013 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (2013)
Wu, T.Y., Chen, C.M., Wang, K.H., et al.: Security analysis of Rhee et al.’s public encryption with keyword search schemes: a review. J. Netw. Intell. 3(1), 16–25 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Gao, MH., Meng, K. (2022). A Survey of Anomaly Traffic Detection Based on Machine Learning. In: Pan, JS., Balas, V.E., Chen, CM. (eds) Advances in Intelligent Data Analysis and Applications. Smart Innovation, Systems and Technologies, vol 253. Springer, Singapore. https://doi.org/10.1007/978-981-16-5036-9_20
Download citation
DOI: https://doi.org/10.1007/978-981-16-5036-9_20
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-5035-2
Online ISBN: 978-981-16-5036-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)