Real Time Anomaly Detection in Network Traffic: A Comparative Analysis of Machine Learning Algorithms

Aswathy M C, Rajkumar T
{"title":"Real Time Anomaly Detection in Network Traffic: A Comparative Analysis of Machine Learning Algorithms","authors":"Aswathy M C, Rajkumar T","doi":"10.47392/irjaeh.2024.0269","DOIUrl":null,"url":null,"abstract":"In the constantly changing field of cybersecurity, real-time intrusion detection using machine learning algorithms has become crucial for protecting network infrastructures. This paper presents a comprehensive literature survey focusing on the comparative study of diverse machine learning algorithms employed for anomaly detection in network traffic. The objective is to critically evaluate the effectiveness of various algorithms in identifying and mitigating threats in real-time scenarios. The study delves into the nuances of prominent machine learning models, including Decision Trees, Random Forests, Support Vector Machines, Neural Networks, and ensemble methods, as they apply to the domain of anomaly detection. Each algorithm is scrutinized based on its ability to adapt to dynamic network behaviors, handle imbalanced datasets, and provide accurate real-time threat assessments. Throughout the survey, key research contributions are analyzed, encompassing methodologies, datasets, and performance metrics. Comparative insights are provided to emphasize the strengths and weaknesses of each algorithm, elucidating their appropriateness for real-time intrusion detection in network traffic. Notably, the examination extends beyond traditional approaches, exploring recent advancements such as deep learning and ensemble techniques. The findings from this comparative study aim to provide practitioners and researchers with valuable insights into selecting the most suitable machine learning algorithm for real-time anomaly detection in the context of network security. By understanding the comparative performance of these algorithms, organizations can make informed decisions to enhance their cybersecurity posture and fortify their defenses against emerging threats. ","PeriodicalId":517766,"journal":{"name":"International Research Journal on Advanced Engineering Hub (IRJAEH)","volume":"11 6","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Research Journal on Advanced Engineering Hub (IRJAEH)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47392/irjaeh.2024.0269","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In the constantly changing field of cybersecurity, real-time intrusion detection using machine learning algorithms has become crucial for protecting network infrastructures. This paper presents a comprehensive literature survey focusing on the comparative study of diverse machine learning algorithms employed for anomaly detection in network traffic. The objective is to critically evaluate the effectiveness of various algorithms in identifying and mitigating threats in real-time scenarios. The study delves into the nuances of prominent machine learning models, including Decision Trees, Random Forests, Support Vector Machines, Neural Networks, and ensemble methods, as they apply to the domain of anomaly detection. Each algorithm is scrutinized based on its ability to adapt to dynamic network behaviors, handle imbalanced datasets, and provide accurate real-time threat assessments. Throughout the survey, key research contributions are analyzed, encompassing methodologies, datasets, and performance metrics. Comparative insights are provided to emphasize the strengths and weaknesses of each algorithm, elucidating their appropriateness for real-time intrusion detection in network traffic. Notably, the examination extends beyond traditional approaches, exploring recent advancements such as deep learning and ensemble techniques. The findings from this comparative study aim to provide practitioners and researchers with valuable insights into selecting the most suitable machine learning algorithm for real-time anomaly detection in the context of network security. By understanding the comparative performance of these algorithms, organizations can make informed decisions to enhance their cybersecurity posture and fortify their defenses against emerging threats. 
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
网络流量中的实时异常检测:机器学习算法的比较分析
在不断变化的网络安全领域,使用机器学习算法进行实时入侵检测已成为保护网络基础设施的关键。本文介绍了一项全面的文献调查,重点是对用于网络流量异常检测的各种机器学习算法进行比较研究。目的是批判性地评估各种算法在实时场景中识别和缓解威胁的有效性。研究深入探讨了著名机器学习模型的细微差别,包括决策树、随机森林、支持向量机、神经网络和集合方法,因为它们适用于异常检测领域。每种算法都根据其适应动态网络行为、处理不平衡数据集和提供准确实时威胁评估的能力进行了仔细研究。整个调查分析了主要的研究成果,包括方法、数据集和性能指标。通过比较深入分析,强调了每种算法的优缺点,阐明了它们是否适合用于网络流量中的实时入侵检测。值得注意的是,这项研究超越了传统方法,探索了深度学习和集合技术等最新进展。这项比较研究的结果旨在为从业人员和研究人员提供宝贵的见解,帮助他们选择最适合网络安全实时异常检测的机器学习算法。通过了解这些算法的比较性能,企业可以做出明智的决策,以增强其网络安全态势并加强对新兴威胁的防御。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Dynamic Load Balancing in Cloud Computing: Improving Efficiency and Performance in Real Life Applications Optimizing Renewable Energy Integration in Green Building Projects: Addressing Barriers and Enhancing Energy Performance Drone Technology in Construction Industry Addressing Workplace Harassment and Discrimination: Strategies for Creating Inclusive Environments in Construction Engineering Smart Plant Health Control System
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1