{"title":"Machine learning methods for anomaly detection in computer networks","authors":"J. Gajda, J. Kwiecień, W. Chmiel","doi":"10.1109/MMAR55195.2022.9874341","DOIUrl":null,"url":null,"abstract":"With a large increase in the amount of data that are transferred via publicly available computer networks, the global demand for new protection and prevention methods could be observed in recent studies of many research groups. The paper deals with anomaly detection, focusing on cybersecurity applications, as there are only few papers that address this topic. Four methods, such as DBSCAN, One-class SVM, LSTM and Isolation forest were used to solve this problem. During the experimental part, the implementation and experiments were performed to examine the performance on common dataset to assess the ability and further possible applications.","PeriodicalId":169528,"journal":{"name":"2022 26th International Conference on Methods and Models in Automation and Robotics (MMAR)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 26th International Conference on Methods and Models in Automation and Robotics (MMAR)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MMAR55195.2022.9874341","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
With a large increase in the amount of data that are transferred via publicly available computer networks, the global demand for new protection and prevention methods could be observed in recent studies of many research groups. The paper deals with anomaly detection, focusing on cybersecurity applications, as there are only few papers that address this topic. Four methods, such as DBSCAN, One-class SVM, LSTM and Isolation forest were used to solve this problem. During the experimental part, the implementation and experiments were performed to examine the performance on common dataset to assess the ability and further possible applications.