Skip to main content

Novel Approach for Network Anomaly Detection Using Autoencoder on CICIDS Dataset

  • Conference paper
  • First Online:
Decision Intelligence Solutions (InCITe 2023)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 1080))

Included in the following conference series:

Abstract

Through widespread internet protocols and network standards, networking services are accessible. Insecure communication and assaults on traffic networks must be taken into consideration moreover the special benefits of networking services. There are several methods for defending against network assaults. In order to combat network abnormalities, network anomaly detection systems are often employed. Systems for detecting network anomalies have drawn a lot of interest in terms of applying machine learning techniques to monitor network traffic intelligently. In this study, an efficient autoencoder-based model for anomaly detection in network traffic is presented. The autoencoder picks up a fundamental depiction of data and how to rebuild it with the least amount of error employed as an anomaly metric. A novel framework is proposed for malicious data detection in network congestion. Workflow for this proposed framework is mentioned in this paper. Also gives a standard formula for setting the threshold and compare these values with anomaly score i.e., error. Anomaly and normal sample are categorized on the basis of threshold value. As a well-used dataset in the literature, utilize the CIDDS-2017 dataset.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Singh R, Singh A (2018) Challenges of various load balancing algorithms in distributed environment. IJITEE, 9–13

    Google Scholar 

  2. Singh R, Singh A, Bhattacharya P (2018) Challenges of load balancing techniques in grid environment. IJITEE, 1–5

    Google Scholar 

  3. Singh R, Singh A, Bhattacharya P (2022) A machine learning approach for anomaly detection to secure smart grid systems. In: Research anthology on smart grid and microgrid development. IGI Global, pp 911–923

    Google Scholar 

  4. Alam T (2020) Cloud computing and its role in the information technology. IAIC Trans Sustain Digital Innov (ITSDI) 1(2):108–115

    Article  Google Scholar 

  5. Shamim N, Asim M, Baker T, Ismail Awad A (2023) Efficient approach for anomaly detection in IoT using system calls. Sensors 23(2), 652 (2023)

    Google Scholar 

  6. Kilincer IF, Ertam F, Sengur A, Tan R-S, Rajendra Acharya U (2023) Automated detection of cybersecurity attacks in healthcare systems with recursive feature elimination and multilayer perceptron optimization 1:30–41

    Google Scholar 

  7. Lei X, Xia Ye, Wang Ao, Jian X, Zhong H, Sun L (2023) Mutual information based anomaly detection of monitoring data with attention mechanism and residual learning. Mech Syst Signal Process 182:109607

    Article  Google Scholar 

  8. Chaoyue D, Shiliang S, Jing Z (2023) MST-GAT: a multimodal spatial–temporal graph attention network for time series anomaly detection. Inf Fusion 89:527–536

    Google Scholar 

  9. Singh R (2022) Performance optimization of autoencoder neural network based model for anomaly detection in network traffic. In: 2nd international conference on advance computing and innovative technologies in engineering (ICACITE). IEEE, pp 598–602

    Google Scholar 

  10. Singh R, Srivastava N, Kumar A (2021) Machine learning techniques for anomaly detection in network traffic. In: 2021 sixth international conference on image information processing (ICIIP), vol 6. IEEE, pp 261–266

    Google Scholar 

  11. Singh R, Srivastav G (2021) Novel framework for anomaly detection using machine learning technique on CIC-IDS2017 dataset. In: 2021 international conference on technological advancements and innovations (ICTAI). IEEE, pp 632–636

    Google Scholar 

  12. Torabi H, Mirtaheri SL, Greco S (2023) Practical autoencoder based anomaly detection by using vector reconstruction error, no 1, pp 1–13

    Google Scholar 

  13. Tama BA, Rhee K-H (2017) Attack classification analysis of iot network via deep learning approach. Res Briefs Inf Commun Technol Evol (ReBICTE) 3:1–9

    Google Scholar 

  14. Althubiti SA, Jones EM, Roy K (2018) LSTM for anomaly-based network intrusion detection. In: 28th international telecommunication networks and applications conference

    Google Scholar 

  15. Rashid A, Siddique MJ, Ahmed SM (2020) Machine and deep learning based comparative analysis using hybrid approaches for intrusion detection system. In: 2020 3rd international conference on advancements in computational sciences (ICACS). IEEE, pp 1–9

    Google Scholar 

  16. Fenanir S, Semchedine F, Harous S, Baadache A (2020) A semi-supervised deep auto-encoder based intrusion detection for IoT. Ingénierie des Systèmes d’Information 25(5)

    Google Scholar 

  17. Javaheri D, Gorgin S, Lee J-A, Masdari M (2023) Fuzzy logic-based DDoS attacks and network traffic anomaly detection methods: classification, overview, and future perspectives. Inf Sci

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Richa Singh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Singh, R., Srivastava, N., Kumar, A. (2023). Novel Approach for Network Anomaly Detection Using Autoencoder on CICIDS Dataset. In: Hasteer, N., McLoone, S., Khari, M., Sharma, P. (eds) Decision Intelligence Solutions. InCITe 2023. Lecture Notes in Electrical Engineering, vol 1080. Springer, Singapore. https://doi.org/10.1007/978-981-99-5994-5_19

Download citation

Publish with us

Policies and ethics