Real Time Anomaly Detection in Network Traffic: A Comparative Analysis of Machine Learning Algorithms

Aswathy M C, Rajkumar T
{"title":"Real Time Anomaly Detection in Network Traffic: A Comparative Analysis of Machine Learning Algorithms","authors":"Aswathy M C, Rajkumar T","doi":"10.47392/irjaeh.2024.0269","DOIUrl":null,"url":null,"abstract":"In the constantly changing field of cybersecurity, real-time intrusion detection using machine learning algorithms has become crucial for protecting network infrastructures. This paper presents a comprehensive literature survey focusing on the comparative study of diverse machine learning algorithms employed for anomaly detection in network traffic. The objective is to critically evaluate the effectiveness of various algorithms in identifying and mitigating threats in real-time scenarios. The study delves into the nuances of prominent machine learning models, including Decision Trees, Random Forests, Support Vector Machines, Neural Networks, and ensemble methods, as they apply to the domain of anomaly detection. Each algorithm is scrutinized based on its ability to adapt to dynamic network behaviors, handle imbalanced datasets, and provide accurate real-time threat assessments. Throughout the survey, key research contributions are analyzed, encompassing methodologies, datasets, and performance metrics. Comparative insights are provided to emphasize the strengths and weaknesses of each algorithm, elucidating their appropriateness for real-time intrusion detection in network traffic. Notably, the examination extends beyond traditional approaches, exploring recent advancements such as deep learning and ensemble techniques. The findings from this comparative study aim to provide practitioners and researchers with valuable insights into selecting the most suitable machine learning algorithm for real-time anomaly detection in the context of network security. By understanding the comparative performance of these algorithms, organizations can make informed decisions to enhance their cybersecurity posture and fortify their defenses against emerging threats. ","PeriodicalId":517766,"journal":{"name":"International Research Journal on Advanced Engineering Hub (IRJAEH)","volume":"11 6","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Research Journal on Advanced Engineering Hub (IRJAEH)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47392/irjaeh.2024.0269","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In the constantly changing field of cybersecurity, real-time intrusion detection using machine learning algorithms has become crucial for protecting network infrastructures. This paper presents a comprehensive literature survey focusing on the comparative study of diverse machine learning algorithms employed for anomaly detection in network traffic. The objective is to critically evaluate the effectiveness of various algorithms in identifying and mitigating threats in real-time scenarios. The study delves into the nuances of prominent machine learning models, including Decision Trees, Random Forests, Support Vector Machines, Neural Networks, and ensemble methods, as they apply to the domain of anomaly detection. Each algorithm is scrutinized based on its ability to adapt to dynamic network behaviors, handle imbalanced datasets, and provide accurate real-time threat assessments. Throughout the survey, key research contributions are analyzed, encompassing methodologies, datasets, and performance metrics. Comparative insights are provided to emphasize the strengths and weaknesses of each algorithm, elucidating their appropriateness for real-time intrusion detection in network traffic. Notably, the examination extends beyond traditional approaches, exploring recent advancements such as deep learning and ensemble techniques. The findings from this comparative study aim to provide practitioners and researchers with valuable insights into selecting the most suitable machine learning algorithm for real-time anomaly detection in the context of network security. By understanding the comparative performance of these algorithms, organizations can make informed decisions to enhance their cybersecurity posture and fortify their defenses against emerging threats. 
网络流量中的实时异常检测:机器学习算法的比较分析
在不断变化的网络安全领域,使用机器学习算法进行实时入侵检测已成为保护网络基础设施的关键。本文介绍了一项全面的文献调查,重点是对用于网络流量异常检测的各种机器学习算法进行比较研究。目的是批判性地评估各种算法在实时场景中识别和缓解威胁的有效性。研究深入探讨了著名机器学习模型的细微差别,包括决策树、随机森林、支持向量机、神经网络和集合方法,因为它们适用于异常检测领域。每种算法都根据其适应动态网络行为、处理不平衡数据集和提供准确实时威胁评估的能力进行了仔细研究。整个调查分析了主要的研究成果,包括方法、数据集和性能指标。通过比较深入分析,强调了每种算法的优缺点,阐明了它们是否适合用于网络流量中的实时入侵检测。值得注意的是,这项研究超越了传统方法,探索了深度学习和集合技术等最新进展。这项比较研究的结果旨在为从业人员和研究人员提供宝贵的见解,帮助他们选择最适合网络安全实时异常检测的机器学习算法。通过了解这些算法的比较性能,企业可以做出明智的决策,以增强其网络安全态势并加强对新兴威胁的防御。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信