Skip to main content

Cyber-Attacks and Anomaly Detection in Networking Based on Deep Learning—A Survey

  • Conference paper
  • First Online:
Computational Intelligence in Machine Learning (ICCIML 2022)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 1106))

  • 86 Accesses

Abstract

The rapid development in Internet has brought great convenience in our daily life, as well as cyber criminals focus shifted from real to virtual life as well. These security problems threaten user’s privacy and also increasing prominently because hackers launch attacks by injecting malicious software in to the network and disturbs normal flow of network activities. Traditional Artificial Intelligence specifically Machine Learning Algorithms is no longer effective in detecting new attack patterns and unknown abnormal behavior in the network traffic. The anomaly detection process helps in providing the report of malicious activities and gives better results. To detect abnormal traffic in network, we need a strong robust deep learning abnormal traffic detection framework. In this paper, different machine learning algorithms were studied in detecting the anomalies and cyber-attacks in network and to identify the problem in existing solutions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 379.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Liu Z, Thapa N, Shaver A, Roy K, Yuan X, Khorsandroo S (2020) Anomaly detection on IoT network intrusion using machine learning. In: 2020 International conference on artificial intelligence, big data, computing and data communication systems (icABCD), pp 1–5. IEEE

    Google Scholar 

  2. Zhou X, Liang W, Shimizu S, Ma J, Jin Q (2020) Siamese neural network based few-shot learning for anomaly detection in industrial cyber-physical systems. IEEE Trans Industr Inf 17(8):5790–5798

    Article  Google Scholar 

  3. Demertzis K, Iliadis L, Bougoudis I (2020) Gryphon: a semi-supervised anomaly detection system based on one-class evolving spiking neural network. Neural Comput Appl 32:4303–4314

    Article  Google Scholar 

  4. Karimipour H, Leung H (2020) Relaxation-based anomaly detection in cyber-physical systems using ensemble Kalman filter. IET Cyber-Phys Syst Theory Appl 5(1):49–58

    Article  Google Scholar 

  5. Schneider P, Böttinger K (2018) High-performance unsupervised anomaly detection for cyber-physical system networks. In: Proceedings on cyber-physical systems security and privacy, pp 1–12

    Google Scholar 

  6. Siddiqi MA, Pak W (2021) An agile approach to identify single and hybrid normalization for enhancing machine learning-based network intrusion detection. IEEE Access 9:137494–137513

    Article  Google Scholar 

  7. Ullah I, Mahmoud QH (2020) A two-level flow-based anomalous activity detection system for IoT networks. Electronics 9(3):530

    Article  Google Scholar 

  8. Ullah I, Mahmoud QH (2020) A technique for generating a botnet dataset for anomalous activity detection in IoT networks. In: 2020 IEEE transactions on Systems, Man, and Cybernetics (SMC), pp 134–140. IEEE

    Google Scholar 

  9. Sarker IH (2021) Cyberlearning: effectiveness analysis of machine learning security modeling to detect cyber-anomalies and multi-attacks. Internet Things 14:100393

    Article  Google Scholar 

  10. Bertoli GDC et al (2021) An end-to-end framework for machine learning-based network intrusion detection system. IEEE Access. https://doi.org/10.1109/ACCESS.2021.3101188

    Article  Google Scholar 

  11. Kavousi-Fard A, Su W, Jin T (2020) A machine-learning-based cyber-attack detection model for wireless sensor networks in microgrids. IEEE Trans Industr Inf 17(1):650–658

    Article  Google Scholar 

  12. Siddiqi MA, Pak W (2021) An agile approach to identify single and hybrid normalization for enhancing machine learning-based network intrusion detection. IEEE Access 9(2021):137494–137513

    Article  Google Scholar 

  13. Shafiq M, Tian Z, Sun Y, Du X, Guizani M (2020) Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city. Futur Gener Comput Syst 107:433–442

    Article  Google Scholar 

  14. Singh VK, Govindarasu M (2021) A cyber-physical anomaly detection for wide-area protection using machine learning. IEEE Trans Smart Grid 12(4):3514–3526

    Article  Google Scholar 

  15. Dong S, Xia Y, Peng T (2021) Network abnormal traffic detection model based on semi-supervised deep reinforcement learning. IEEE Trans Netw Serv Manage 18(4):4197–4212

    Article  Google Scholar 

  16. Schneider P, Böttinger B (2018) High-performance unsupervised anomaly detection for cyber-physical system networks. In: Proceedings on cyber-physical systems security and privacy, pp 1–12

    Google Scholar 

  17. Poornima IGA, Paramasivan B (2020) Anomaly detection in wireless sensor network using machine learning algorithm. Comput Commun 151:331–337

    Article  Google Scholar 

  18. Ullah I, Mahmoud QH (2020) A technique for generating a botnet dataset for anomalous activity detection in IoT networks. In: 2020 IEEE transactions on Systems, Man, and Cybernetics (SMC). IEEE, pp 134–140

    Google Scholar 

  19. Panthi M (2020) Anomaly detection in smart grids using machine learning techniques. In: 2020 First International Conference on Power, Control and Computing Technologies (ICPC2T). IEEE

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Swathi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Swathi, K., Narsimha, G. (2024). Cyber-Attacks and Anomaly Detection in Networking Based on Deep Learning—A Survey. In: Gunjan, V.K., Kumar, A., Zurada, J.M., Singh, S.N. (eds) Computational Intelligence in Machine Learning. ICCIML 2022. Lecture Notes in Electrical Engineering, vol 1106. Springer, Singapore. https://doi.org/10.1007/978-981-99-7954-7_2

Download citation

Publish with us

Policies and ethics