The increasing popularity of networking devices at workplaces leads to an exponential increase in the frequency of network attacks. This leads to having protected networks being more and more important. Because of the increase in network activity workplaces have started to leave anomaly detection in the hands of artificial intelligence. However, the current methods of detecting anomalies can not accurately detect all of them. In this thesis, I propose a training method for autoencoders that shows how k-Means Clustering can be combined with an autoencoder for feature extraction with the use of differential evolution. The features extracted from this autoencoder is then used to classify the network activity of the KDD-99 dataset in order to b...
Abstract — Data mining techniques make it possible to search large amounts of data for characteristi...
Anomalies could be the threats to the network that have ever/never happened. To protect networks aga...
The network is a highly vulnerable venture for any organization that needs to have a set of computer...
The increasing popularity of networking devices at workplaces leads to an exponential increase in th...
Communication networks are complex systems consisting of many components each producing a multitude ...
Network anomaly detection plays a crucial role as it provides an effective mechanism to block or sto...
Network anomaly detection plays a crucial role as it provides an effective mechanism to block or sto...
Intrusion Detection Systems (IDS) provide substantial measures to protect networks assets. IDSs are ...
Most existing network intrusion detection systems use signature-based methods which depend on labele...
Today, network security is crucial due to the rapid development of network and internet technologies...
Anomaly detection has become a crucial part of the protection of information and integrity. Due to t...
International audienceNetwork anomalies are unusual traffic mainly induced by network attacks or net...
Network security is critical these days as network technology advances quickly and internet technolo...
This paper presents a novel method to enhance the performance of Clustering-based Autoencoder models...
4Traffic monitoring and anomaly detection are essential activities for computer network management, ...
Abstract — Data mining techniques make it possible to search large amounts of data for characteristi...
Anomalies could be the threats to the network that have ever/never happened. To protect networks aga...
The network is a highly vulnerable venture for any organization that needs to have a set of computer...
The increasing popularity of networking devices at workplaces leads to an exponential increase in th...
Communication networks are complex systems consisting of many components each producing a multitude ...
Network anomaly detection plays a crucial role as it provides an effective mechanism to block or sto...
Network anomaly detection plays a crucial role as it provides an effective mechanism to block or sto...
Intrusion Detection Systems (IDS) provide substantial measures to protect networks assets. IDSs are ...
Most existing network intrusion detection systems use signature-based methods which depend on labele...
Today, network security is crucial due to the rapid development of network and internet technologies...
Anomaly detection has become a crucial part of the protection of information and integrity. Due to t...
International audienceNetwork anomalies are unusual traffic mainly induced by network attacks or net...
Network security is critical these days as network technology advances quickly and internet technolo...
This paper presents a novel method to enhance the performance of Clustering-based Autoencoder models...
4Traffic monitoring and anomaly detection are essential activities for computer network management, ...
Abstract — Data mining techniques make it possible to search large amounts of data for characteristi...
Anomalies could be the threats to the network that have ever/never happened. To protect networks aga...
The network is a highly vulnerable venture for any organization that needs to have a set of computer...