A Review on machine learning models used for anomaly detection

Download Article
Eega varnika

Abstract: The number of network users is constantly increasing as network technologies improve, resulting in the production of enormous amounts of network traffic data. The huge amount of network traffic data makes it vulnerable to assaults and breaches. As a result, the network must be secured and safeguarded by identifying abnormalities and preventing network intrusions. Researchers and network labs are paying more attention to network security. A thorough survey was conducted for this article in order to provide a wide overview of what has recently been done in the field of anomaly detection. Newly published research over the past five years was looked at to see if there were any contemporary methods that might be used in the future. In this respect, the literature on anomaly detection is relevant. The role of systems in network traffic has been addressed, with examples including wireless sensor networks (WSNs), Internet of Things (IoT), high-performance computing (HPC), industrial control systems (ICS), and software-defined networking (SDN)

SDN (software-defined networking) environments Finally, we highlighted a number of problems that need to be addressed in order to enhance detection. Anomalysystems is a collection of anomalysystems. Anomaly Detection, Intrusion, Networks, Supervised, Unsupervised .

Anomaly Detection, Intrusion, Networks, Supervised, Unsupervised