Practical autoencoder based anomaly detection by using vector reconstruction error

نویسندگان

چکیده

Abstract Nowadays, cloud computing provides easy access to a set of variable and configurable resources based on user demand through the network. Cloud services are available common internet protocols network standards. In addition unique benefits computing, insecure communication attacks networks cannot be ignored. There several techniques for dealing with attacks. To this end, anomaly detection systems widely used as an effective countermeasure against anomalies. The anomaly-based approach generally learns normal traffic patterns in various ways identifies Network have gained much attention intelligently monitoring using machine learning methods. This paper presents efficient model autoencoders networks. autoencoder basic representation data its reconstruction minimum error. Therefore, error is or classification metric. addition, detecting from data, types has also been investigated. We proposed new by examining autoencoder’s method Unlike existing autoencoder-based that consider all input features single value, we assume vector. enables our use every feature further propose multi-class structure classify CIDDS-001 dataset commonly accepted literature. Our evaluations show performance improved considerably compared ones terms accuracy, recall, false-positive rate, F1-score metrics.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Variational Autoencoder based Anomaly Detection using Reconstruction Probability

We propose an anomaly detection method using the reconstruction probability from the variational autoencoder. The reconstruction probability is a probabilistic measure that takes into account the variability of the distribution of variables. The reconstruction probability has a theoretical background making it a more principled and objective anomaly score than the reconstruction error, which is...

متن کامل

Dynamic anomaly detection by using incremental approximate PCA in AODV-based MANETs

Mobile Ad-hoc Networks (MANETs) by contrast of other networks have more vulnerability because of having nature properties such as dynamic topology and no infrastructure. Therefore, a considerable challenge for these networks, is a method expansion that to be able to specify anomalies with high accuracy at network dynamic topology alternation. In this paper, two methods proposed for dynamic anom...

متن کامل

Robust Anomaly Detection Using Support Vector Machines

Using the 1998 DARPA BSM data set collected at MIT’s Lincoln Labs to study intrusion detection systems, the performance of robust support vector machines (RSVMs) was compared with that of conventional support vector machines and nearest neighbor classifiers in separating normal usage profiles from intrusive profiles of computer programs. The results indicate the superiority of RSVMs not only in...

متن کامل

Anomaly Detection using Support Vector Machine

Support vector machine are among the most well known supervised anomaly detection technique, which are very efficient in handling large and high dimensional dataset. SVM, a powerful machine method developed from statistical learning and has made significant achievement in some field. This Technique does not suffer the limitations of data dimensionality and limited samples. In this present study...

متن کامل

3D Gabor Based Hyperspectral Anomaly Detection

Hyperspectral anomaly detection is one of the main challenging topics in both military and civilian fields. The spectral information contained in a hyperspectral cube provides a high ability for anomaly detection. In addition, the costly spatial information of adjacent pixels such as texture can also improve the discrimination between anomalous targets and background. Most studies miss the wort...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Cybersecurity

سال: 2023

ISSN: ['2523-3246']

DOI: https://doi.org/10.1186/s42400-022-00134-9