Please use this identifier to cite or link to this item: https://research.matf.bg.ac.rs/handle/123456789/1613
DC FieldValueLanguage
dc.contributor.authorTimčenko, Valentinaen_US
dc.contributor.authorGajin, Slavkoen_US
dc.date.accessioned2025-03-12T09:59:32Z-
dc.date.available2025-03-12T09:59:32Z-
dc.date.issued2021-
dc.identifier.urihttps://research.matf.bg.ac.rs/handle/123456789/1613-
dc.description.abstractThe advanced development of new technologies and heterogeneous environments relies on the proper processing of large data volumes, and accurate and fast response of real-time applications. Such circumstances provide a fertile ground for the appearance of diverse security concerns, thus challenging the scientific community for building more reliable and efficient Network Anomaly Detection Systems. This research proposes a comprehensive flow-based anomaly detection architecture, which encompasses techniques for entropy-based data processing and machine learning-based attack detection. It encompasses several attack categories and relies on the use of modelled and synthetically generated traffic patterns for Port Scan, Network Scan, DDoS amplification, flood, and dictionary attacks. The entropy-based analysis is used for easier detection of the hidden traffic patterns, as it can capture the behaviour of the biggest contributors, and of a large number of minor appearances in the feature distribution. The unusual traffic is then processed by the use of unsupervised machine learning algorithms. The approach is verified with datasets based on real network traffic, synthetically generated attack traffic instances and botnet traffic. The architecture is an original solution, planned for further real-network application, targeting the possible support for a range of different use cases.en_US
dc.language.isoenen_US
dc.publisherSuceava : Stefan cel Mare University (University of Suceava)en_US
dc.relation.ispartofAdvances in Electrical and Computer Engineeringen_US
dc.subjectclustering algorithmsen_US
dc.subjectdata flow computingen_US
dc.subjectEntropyen_US
dc.subjectintrusion detectionen_US
dc.subjectmachine learningen_US
dc.titleMachine Learning Enhanced Entropy-Based Network Anomaly Detectionen_US
dc.typeArticleen_US
dc.identifier.doi10.4316/aece.2021.04006-
dc.identifier.scopus2-s2.0-85122239638-
dc.identifier.isi000725107100006-
dc.identifier.urlhttps://aece.ro/abstractplus_citedby.php?year=2021&number=4&article=6-
dc.identifier.urlhttp://dx.doi.org/10.4316/aece.2021.04006-
dc.relation.issn1582-7445en_US
dc.description.rankM23en_US
dc.relation.firstpage51en_US
dc.relation.lastpage60en_US
dc.relation.volume21en_US
dc.relation.issue4en_US
item.openairetypeArticle-
item.fulltextNo Fulltext-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.grantfulltextnone-
item.languageiso639-1en-
item.cerifentitytypePublications-
crisitem.author.orcid0000-0002-8939-3589-
Appears in Collections:Research outputs
Show simple item record

SCOPUSTM   
Citations

8
checked on Jun 13, 2025

Google ScholarTM

Check

Altmetric

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.