2018
DOI: 10.1177/1550147718814471
|View full text |Cite
|
Sign up to set email alerts
|

A parallel algorithm for network traffic anomaly detection based on Isolation Forest

Abstract: With the rapid development of large-scale complex networks and proliferation of various social network applications, the amount of network traffic data generated is increasing tremendously, and efficient anomaly detection on those massive network traffic data is crucial to many network applications, such as malware detection, load balancing, network intrusion detection. Although there are many methods around for network traffic anomaly detection, they are all designed for single machine, failing to deal with t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
13
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 45 publications
(16 citation statements)
references
References 29 publications
3
13
0
Order By: Relevance
“…The results outperformed the normal LOF and ISOF results when performed separately. Xiaoling et al [ 36 ] proposed SPIF (Isolation Forest and Spark), which works well with parallelization. Further broadening the aspect into an ensemble learning, Elghazel et al [ 37 ] proposed a novel technique called Random Cluster Ensemble (RCE), which aimed to identify the out-of-bag feature significance from an ensemble of partitions.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The results outperformed the normal LOF and ISOF results when performed separately. Xiaoling et al [ 36 ] proposed SPIF (Isolation Forest and Spark), which works well with parallelization. Further broadening the aspect into an ensemble learning, Elghazel et al [ 37 ] proposed a novel technique called Random Cluster Ensemble (RCE), which aimed to identify the out-of-bag feature significance from an ensemble of partitions.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Authors [48] find isolation forest useful in finding anomalous data patterns in sensory data generated by IoT environment. Tao et al [49] proposed a method of anomaly detection based on isolation forest and Spark. Instead of using a single machine for anomaly detection, the authors took advantage of the multithread environment of Spark and executed isolation forest in parallel.…”
Section: A Deep Learning Based Idsmentioning
confidence: 99%
“…detection have utilized different tree-based ensemble approaches. The work (Tao, Peng, Zhao, Zhao, & Wang, 2018) made use of Isolation Forests (IFs) to develop an A-NIDS using Spark. In (Dhaliwal, Nahid, & Abbas, 2018), XGBoost was used to develop an IDS for binary classification of normal and attack samples.…”
Section: Literature Reviewmentioning
confidence: 99%