Abstract
Through widespread internet protocols and network standards, networking services are accessible. Insecure communication and assaults on traffic networks must be taken into consideration moreover the special benefits of networking services. There are several methods for defending against network assaults. In order to combat network abnormalities, network anomaly detection systems are often employed. Systems for detecting network anomalies have drawn a lot of interest in terms of applying machine learning techniques to monitor network traffic intelligently. In this study, an efficient autoencoder-based model for anomaly detection in network traffic is presented. The autoencoder picks up a fundamental depiction of data and how to rebuild it with the least amount of error employed as an anomaly metric. A novel framework is proposed for malicious data detection in network congestion. Workflow for this proposed framework is mentioned in this paper. Also gives a standard formula for setting the threshold and compare these values with anomaly score i.e., error. Anomaly and normal sample are categorized on the basis of threshold value. As a well-used dataset in the literature, utilize the CIDDS-2017 dataset.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Singh R, Singh A (2018) Challenges of various load balancing algorithms in distributed environment. IJITEE, 9–13
Singh R, Singh A, Bhattacharya P (2018) Challenges of load balancing techniques in grid environment. IJITEE, 1–5
Singh R, Singh A, Bhattacharya P (2022) A machine learning approach for anomaly detection to secure smart grid systems. In: Research anthology on smart grid and microgrid development. IGI Global, pp 911–923
Alam T (2020) Cloud computing and its role in the information technology. IAIC Trans Sustain Digital Innov (ITSDI) 1(2):108–115
Shamim N, Asim M, Baker T, Ismail Awad A (2023) Efficient approach for anomaly detection in IoT using system calls. Sensors 23(2), 652 (2023)
Kilincer IF, Ertam F, Sengur A, Tan R-S, Rajendra Acharya U (2023) Automated detection of cybersecurity attacks in healthcare systems with recursive feature elimination and multilayer perceptron optimization 1:30–41
Lei X, Xia Ye, Wang Ao, Jian X, Zhong H, Sun L (2023) Mutual information based anomaly detection of monitoring data with attention mechanism and residual learning. Mech Syst Signal Process 182:109607
Chaoyue D, Shiliang S, Jing Z (2023) MST-GAT: a multimodal spatial–temporal graph attention network for time series anomaly detection. Inf Fusion 89:527–536
Singh R (2022) Performance optimization of autoencoder neural network based model for anomaly detection in network traffic. In: 2nd international conference on advance computing and innovative technologies in engineering (ICACITE). IEEE, pp 598–602
Singh R, Srivastava N, Kumar A (2021) Machine learning techniques for anomaly detection in network traffic. In: 2021 sixth international conference on image information processing (ICIIP), vol 6. IEEE, pp 261–266
Singh R, Srivastav G (2021) Novel framework for anomaly detection using machine learning technique on CIC-IDS2017 dataset. In: 2021 international conference on technological advancements and innovations (ICTAI). IEEE, pp 632–636
Torabi H, Mirtaheri SL, Greco S (2023) Practical autoencoder based anomaly detection by using vector reconstruction error, no 1, pp 1–13
Tama BA, Rhee K-H (2017) Attack classification analysis of iot network via deep learning approach. Res Briefs Inf Commun Technol Evol (ReBICTE) 3:1–9
Althubiti SA, Jones EM, Roy K (2018) LSTM for anomaly-based network intrusion detection. In: 28th international telecommunication networks and applications conference
Rashid A, Siddique MJ, Ahmed SM (2020) Machine and deep learning based comparative analysis using hybrid approaches for intrusion detection system. In: 2020 3rd international conference on advancements in computational sciences (ICACS). IEEE, pp 1–9
Fenanir S, Semchedine F, Harous S, Baadache A (2020) A semi-supervised deep auto-encoder based intrusion detection for IoT. Ingénierie des Systèmes d’Information 25(5)
Javaheri D, Gorgin S, Lee J-A, Masdari M (2023) Fuzzy logic-based DDoS attacks and network traffic anomaly detection methods: classification, overview, and future perspectives. Inf Sci
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Singh, R., Srivastava, N., Kumar, A. (2023). Novel Approach for Network Anomaly Detection Using Autoencoder on CICIDS Dataset. In: Hasteer, N., McLoone, S., Khari, M., Sharma, P. (eds) Decision Intelligence Solutions. InCITe 2023. Lecture Notes in Electrical Engineering, vol 1080. Springer, Singapore. https://doi.org/10.1007/978-981-99-5994-5_19
Download citation
DOI: https://doi.org/10.1007/978-981-99-5994-5_19
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-5993-8
Online ISBN: 978-981-99-5994-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)