Skip navigation
  •  Home
  • UDC 
    • Getting started
    • RUC Policies
    • FAQ
    • FAQ on Copyright
    • More information at INFOguias UDC
  • Browse 
    • Communities
    • Browse by:
    • Issue Date
    • Author
    • Title
    • Subject
  • Help
    • español
    • Gallegan
    • English
  • Login
  •  English 
    • Español
    • Galego
    • English
  
View Item 
  •   DSpace Home
  • Facultade de Informática
  • Investigación (FIC)
  • View Item
  •   DSpace Home
  • Facultade de Informática
  • Investigación (FIC)
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

Network Anomaly Detection Using Machine Learning Techniques

Thumbnail
View/Open
J.J.Estevez_2020_Network_Anomaly_Detection_Using_Machine.pdf (170.2Kb)
Use this link to cite
http://hdl.handle.net/2183/26422
Atribución 4.0 Internacional
Except where otherwise noted, this item's license is described as Atribución 4.0 Internacional
Collections
  • Investigación (FIC) [1685]
Metadata
Show full item record
Title
Network Anomaly Detection Using Machine Learning Techniques
Author(s)
Estévez Pereira, Julio Jairo
Fernández, Diego
Nóvoa, Francisco
Date
2020-08-19
Citation
Estévez-Pereira, J.J.; Fernández, D.; Novoa, F.J. Network Anomaly Detection Using Machine Learning Techniques. Proceedings 2020, 54, 8. https://doi.org/10.3390/proceedings2020054008
Abstract
[Abstract] While traditional network security methods have been proven useful until now, the flexibility of machine learning techniques makes them a solid candidate in the current scene of our networks. In this paper, we assess how well the latter are capable of detecting security threats in a corporative network. To that end, we configure and compare several models to find the one which fits better with our needs. Furthermore, we distribute the computational load and storage so we can handle extensive volumes of data. The algorithms that we use to create our models, Random Forest, Naive Bayes, and Deep Neural Networks (DNN), are both divergent and tested in other papers in order to make our comparison richer. For the distribution phase, we operate with Apache Structured Streaming, PySpark, and MLlib. As for the results, it is relevant to mention that our dataset has been found to be effectively modelable with just a reduced number of features. Finally, given the outcomes obtained, we find this line of research encouraging and, therefore, this approach worth pursuing.
Keywords
Machine learning
IDS
Network security
Distributed computing
Network flow
 
Editor version
https://doi.org/10.3390/proceedings2020054008
Rights
Atribución 4.0 Internacional
ISSN
2504-3900

Browse

All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsResearch GroupAcademic DegreeThis CollectionBy Issue DateAuthorsTitlesSubjectsResearch GroupAcademic Degree

My Account

LoginRegister

Statistics

View Usage Statistics
Sherpa
OpenArchives
OAIster
Scholar Google
UNIVERSIDADE DA CORUÑA. Servizo de Biblioteca.    DSpace Software Copyright © 2002-2013 Duraspace - Send Feedback