Advances in network security and new anomaly detection techniques

سال انتشار: 1404
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 52

فایل این مقاله در 12 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_MJEE-19-2_003

تاریخ نمایه سازی: 18 مرداد 1404

چکیده مقاله:

Anomaly detection in diverse domains is confronted with the challenges posed by the increasing volume, velocity, and complexity of data. This paper presents a comprehensive review of recent advancements and research trends in anomaly detection across various domains, including high-dimensional big data, sensor systems, information and communication technology, IoT data, energy consumption, and real-time networks amidst cyber-attacks. Through a systematic analysis of recent literature, this review synthesizes key findings, methodologies, and challenges, providing insights into current strategies and future directions for anomaly detection technology. The reviewed papers highlight the importance of addressing domain-specific challenges, fostering interdisciplinary collaboration, and advancing methodological innovation to develop robust, scalable, and effective anomaly detection solutions capable of meeting the evolving demands of today’s data-driven world.

نویسندگان

Sajad Balali Dehkordi

Department of Electrical Engineering, Na.C., Islamic Azad University, Najafabad, Iran.

Saeed Nasri

Department of Electrical Engineering, Na.C., Islamic Azad University, Najafabad, Iran.

Sina Dami

Department of Computer Engineering, WT.C., Islamic Azad University, Tehran, Iran.

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • G. A. Marin, "Network security basics," *IEEE Secur. Privacy*, vol. ...
  • S. Aljawarneh, M. Aldwairi, and M. B. Yassein, "Anomaly-based intrusion ...
  • D. E. Denning, "An intrusion-detection model," *IEEE Trans. Softw. Eng.*, ...
  • S.-J. Horng et al., "A novel intrusion detection system based ...
  • E. De la Hoz, E. De La Hoz, A. Ortiz, ...
  • I. S. Thaseen and C. A. Kumar, "Intrusion detection model ...
  • M. V. Mahoney and P. K. Chan, "Learning rules for ...
  • C. Sinclair, L. Pierce, and S. Matzner, "An application of ...
  • Z. Chiba, N. Abghour, K. Moussaid, A. El Omri, and ...
  • A. F. M. Agarap, "A neural network architecture combining gated ...
  • M. M. Rathore et al., "Intrusion detection using decision tree ...
  • B. Cui, S. He, and H. Jin, "Multi-layer anomaly detection ...
  • P. A. A. Resende and A. C. Drummond, "A survey ...
  • H. Feng, M. Li, X. Hou, and Z. Xu, "Study ...
  • J. Yang, J. Deng, S. Li, and Y. Hao, "Improved ...
  • S. A. Aljawarneh and R. Vangipuram, "GARUDA: Gaussian dissimilarity measure ...
  • J.-Y. Jiang, R.-J. Liou, and S.-J. Lee, "A fuzzy self-constructing ...
  • D. J. Weller-Fahy, B. J. Borghetti, and A. A. Sodemann, ...
  • W.-C. Lin, S.-W. Ke, and C.-F. Tsai, "CANN: An intrusion ...
  • R. K. Gunupudi, M. Nimmala, N. Gugulothu, and S. R. ...
  • A. Nagaraja, B. Uma, and R. k. Gunupudi, "UTTAMA: An ...
  • F. Ullah, S. Ullah, G. Srivastava, and J. C.-W. Lin, ...
  • Z. Wu, H. Zhang, P. Wang, and Z. Sun, "RTIDS: ...
  • Y. Liu and L. Wu, "Intrusion detection model based on ...
  • Z. Xiang and X. Li, "RETRACTED ARTICLE: Fusion of transformer ...
  • V. Dutta, M. Pawlicki, R. Kozik, and M. Choraś, "Unsupervised ...
  • K. He, W. Zhang, X. Zong, and L. Lian, "Network ...
  • T. Jiang, X. Fu, and M. Wang, "BBO-CFAT: Network intrusion ...
  • Z. Long, H. Yan, G. Shen, X. Zhang, H. He, ...
  • H. Chen, G.-R. You, and Y.-R. Shiue, "Hybrid intrusion detection ...
  • F. S. Melícias et al., "GPT and interpolation-based data augmentation ...
  • A. Patcha and J.-M. Park, "An overview of anomaly detection ...
  • R. Ul Islam, M. S. Hossain, and K. Andersson, "A ...
  • H. Saeedi Emadi and S. M. Mazinani, "A novel anomaly ...
  • K. Agrawal, T. Alladi, A. Agrawal, V. Chamola, and A. ...
  • H. Sarmadi and A. Karamodin, "A novel anomaly detection method ...
  • H. Guo, Z. Zhou, D. Zhao, and W. Gaaloul, "EGNN: ...
  • S. Alangari, "An unsupervised machine learning algorithm for attack and ...
  • E. Altulaihan, M. A. Almaiah, and A. Aljughaiman, "Anomaly detection ...
  • M. M. Inuwa and R. Das, "A comparative analysis of ...
  • Alsalman, D. (۲۰۲۴). A Comparative Study of Anomaly Detection Techniques ...
  • A. K. Mishra, S. Paliwal, and G. Srivastava, "Anomaly detection ...
  • U. Tahir, M. K. Abid, M. Fuzail, and N. Aslam, ...
  • K. Nimmy, M. Dilraj, S. Sankaran, and K. Achuthan, "Leveraging ...
  • A. Protogerou, S. Papadopoulos, A. Drosou, D. Tzovaras, and I. ...
  • H. Wang, Q. Bao, Z. Shui, L. Li, and H. ...
  • V. Shanmuganathan and A. Suresh, "LSTM-Markov based efficient anomaly detection ...
  • M. A. Lawal, R. A. Shaikh, and S. R. Hassan, ...
  • W. Ma, "Analysis of anomaly detection method for Internet of ...
  • A. Yahyaoui, T. Abdellatif, S. Yangui, and R. Attia, "READ-IoT: ...
  • K. N. Durai, R. Subha, and A. Haldorai, "A novel ...
  • S. Gupta et al., "A novel approach toward the prevention ...
  • Q. He and H. He, "A novel method to enhance ...
  • K. N. Mishra and C. Chakraborty, "A novel approach toward ...
  • M. A. Almaiah et al., "A novel approach for improving ...
  • B. Wang, Y. Sun, and X. Xu, "A scalable and ...
  • S. P. Praveen et al., "A novel approach for enhance ...
  • L. Cui et al., "Security and privacy-enhanced federated learning for ...
  • I. Ullah and Q. H. Mahmoud, "Design and development of ...
  • S. Thudumu, P. Branch, J. Jin, and J. Singh, "A ...
  • G. Fernandes et al., "A comprehensive survey on network anomaly ...
  • L. Erhan et al., "Smart anomaly detection in sensor systems: ...
  • Y. Himeur, K. Ghanem, A. Alsalemi, F. Bensaali, and A. ...
  • R. A. Ariyaluran Habeeb, F. Nasaruddin, A. Gani, I. A. ...
  • H. Wang, M. J. Bah, and M. Hammad, "Progress in ...
  • G. Pang, C. Shen, L. Cao, and A. V. D. ...
  • A. A. Cook, G. Mısırlı, and Z. Fan, "Anomaly detection ...
  • نمایش کامل مراجع