2022
DOI: 10.1109/access.2022.3201869
|View full text |Cite
|
Sign up to set email alerts
|

MLTs-ADCNs: Machine Learning Techniques for Anomaly Detection in Communication Networks

Abstract: From a security perspective, the research of the jeopardized wireless communications and its expected ultra-densified ubiquitous wireless networks urge the development of a robust intrusion detection system (IDS) with powerful capabilities which could not be sufficiently provided by the existing conventional systems. IDSs are still insufficient against continuous renewable unknown attacks on the wireless communication networks, especially with the new highly vulnerable networks, leading to low accuracy and det… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
20
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(20 citation statements)
references
References 40 publications
0
20
0
Order By: Relevance
“…Furthermore, integrity monitoring is closely related to anomaly detection, as non-legitimate sources will stand out for example in their high-level parameters (data rate, time of connection, reception angle) or the content of information. With the dynamic adaption of attackers and the expected high density of IoT devices, state-of-theart solutions for Intrusion Detection Systems (IDS) are no longer sufficient (Oleiwi, et al, 2022). Recent works have applied new combinations of different AI approaches including data preparation and feature extraction with classic machine learning algorithms (Mittal, et al, 2021) and the final step of intrusion detection with deep learning (Gupta, et al, 2022).…”
Section: Link Integrity Monitoring and Anomaly Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, integrity monitoring is closely related to anomaly detection, as non-legitimate sources will stand out for example in their high-level parameters (data rate, time of connection, reception angle) or the content of information. With the dynamic adaption of attackers and the expected high density of IoT devices, state-of-theart solutions for Intrusion Detection Systems (IDS) are no longer sufficient (Oleiwi, et al, 2022). Recent works have applied new combinations of different AI approaches including data preparation and feature extraction with classic machine learning algorithms (Mittal, et al, 2021) and the final step of intrusion detection with deep learning (Gupta, et al, 2022).…”
Section: Link Integrity Monitoring and Anomaly Detectionmentioning
confidence: 99%
“…Especially promising is the combination of several models in an ensemble learning approach to detect anomalies (Jaw & Wang, 2021). Oleiwi et al (2022) proposed in 2022 an approach for intrusion detection with two modified classic algorithms: random forest and support vector machine, achieving an accuracy above 99 %.…”
Section: Link Integrity Monitoring and Anomaly Detectionmentioning
confidence: 99%
“…The process of extracting important and relevant features from large amounts of network traffic data is a critical step in developing highly effective intrusion detection systems [23]. The high False Positive Rate (FPR) and Detection Rate (DR) are the most common problems to be treated in IDS [10], which can be effectively improved by the ensemble methods compared to conventional single classification algorithms [12]. In the ensemble process, moderately accurate components of classifiers are combined to obtain highly accurate classifiers [12].…”
Section: Related Workmentioning
confidence: 99%
“…Predictions of every subset are combined to produce the outcome. Bagging [3][4][5][6][8][9][10][11][12], Boosting [3][4][5][6]8,[10][11][12][13][14][15][16][17][18][19] are the type of homogeneous ensembles, which uses different methods to determine final prediction. Specifically, majority voting [3][4][5][6][9][10][11]17,18], weighted voting [4,6,7,9,10], average voting are prevalent methods used in existing studies.…”
Section: Introductionmentioning
confidence: 99%
“…As to the problem of high-dimension, data mining technology can be used to extract valuable information [11]. The commonly used data mining method is representation reduction, which is a dimension-reducing or feature extraction method.…”
Section: Introductionmentioning
confidence: 99%