-
1
Anomaly Detection Method of SDN Network Edge Switch
Published 2023-01-01“…Software-defined network gives programmability to the network,reduces the complexity of network management,and promotes the development of new network technology.As a device for data forwarding and policy enforcement,the permissions of SDN switches should not be stolen by unauthorized entities.However,the SDN switch does not always execute the commands issued by the controller.Malicious attackers attack the network covertly and fatally by eroding the SDN switch,which seriously affects the end-to-end communication quality of users.Communicationsequential process(CSP),as a modeling language designed for concurrent systems,can accurately describe the interaction between SDN switch-switch and switch-host.In this paper,CSP is used to model SDN switch and terminal host,and two abnormal switch location methods are analyzed theoretically.We verify the effectiveness of the two detection methods in the instantiated model system when the edge switch is maliciously forwarded as an egress switch,and the authentication results show that the abnormal behavior cannot be detected.In order to solve this problem,an anomaly detection method for edge switch is proposed in this paper.In this method,the host records the statistical information and triggers the packet_in message to complete the information transmission with the controller by constructing a special packet.The controller collects the statistical information and detects the abnormal forwarding behavior of the edge switch by analyzing the statistical information consistency between the edge switch and the host.Finally,based on the ryu controller,experiments are carried out on the mininet platform,and experimental results show that the edge switch anomaly detection method can successfully detect abnormal behavior.…”
Get full text
Article -
2
Time Series Anomaly Detection Model with Dual Attention Mechanism
Published 2024-03-01Subjects: “…time series; anomaly detection; deep learning; attention; autoencoder…”
Get full text
Article -
3
Network Equipment Anomaly Detection Based on Time Delay Feature
Published 2023-03-01Subjects: “…anomaly detection|delay|network equipment|one-class support vector machine|peak position…”
Get full text
Article -
4
Semi-supervised Network Traffic Anomaly Detection Method Based on GRU
Published 2023-03-01“…Intrusion detection system(IDS) is a detection system that can issue an alarm when a network attack occurs.Detecting unknown attacks in the network is a challenge that IDS faces.Deep learning technology plays an important role in network traffic anomaly detection,but most of the existing methods have a high false positive rate and most of the models are trained using supervised learning methods.A gated recurrent unit network(GRU)-based semi-supervised network traffic anomaly detection me-thod(SEMI-GRU) is proposed,which combines a multi-layer bidirectional gated recurrent unit neural network(MLB-GRU) and an improved feedforward neural network(FNN).Data oversampling technology and semi-supervised learning training method are used to test the effect of network traffic anomaly detection using binary classification and multi-classification methods,and NSL-KDD,UNSW-NB15 and CIC-Bell-DNS-EXF-2021 datasets are used for verification.Compared with classic machine learning mo-dels and deep learning models such as DNN and ANN,the SEMI-GRU method outperforms the machines lear-ning and deep learning methods listed in this paper in terms of accuracy,precision,recall,false positives,and F1 scores.In the NSL-KDD binary and multi-class tasks,SEMI-GRU outperforms other methods on the F1 score metric,which is 93.08% and 82.15%,respectively.In the UNSW-NB15 binary and multi-class tasks,SEMI-GRU outperforms the other methods on the F1 score,which is 88.13% and 75.24%,respectively.In the CIC-Bell-DNS-EXF-2021 light file attack dataset binary classification task,all test data are classified correctly.…”
Get full text
Article -
5
Anomaly Detection Framework of System Call Trace Based on Sequence and Frequency Patterns
Published 2022-06-01“…The existing system call-based anomaly intrusion detection methods can’t accurately describe the behavior of the process by a single trace pattern.In this paper,the process behavior is modeled based on the sequence and frequency patterns of system call trace,and a data-driven anomaly detection framework is designed.The framework could detect both sequential and quantitative anomalies of the system call trace simultaneously.With the help of combinational window mechanism,the framework could realize offline fine-grained learning and online anomaly real-time detection by meeting different requirements of offline trai-ning and online detection for extracting trace information.Performance comparison experiments of unknown anomalies detection are conducted on the ADFA-LD intrusion detection standard dataset.The results show that,compared with the four traditional machine learning methods and four deep learning methods,the comprehensive detection performance of the framework improves by about 10%.…”
Get full text
Article -
6
Study on Air Traffic Flow Recognition and Anomaly Detection Based on Deep Clustering
Published 2023-03-01Subjects: “…trajectory clustering|anomaly detection|deep neural network|autoencoder|ads-b…”
Get full text
Article -
7
A steam turbine anomaly detection method based on O-DAE and SVDD
Published 2023-07-01Subjects: Get full text
Article -
8
Anomaly detection of power load data based on Transformer and generative adversarial networks
Published 2024-01-01Subjects: Get full text
Article -
9
Time Series Data Anomaly Detection Based on Total Variation Ratio Separation Distance
Published 2022-09-01Subjects: “…anomaly detection|probability density ratio|time delay|total variation|relative total variation…”
Get full text
Article -
10
Network Traffic Anomaly Detection Method Based on Multi-scale Memory Residual Network
Published 2022-08-01Subjects: “…network traffic anomaly detection|multi-scale memory residual network|multi-scale one-dimensional convolution|long short-term memory network|residual network|network intrusion detection…”
Get full text
Article -
11
Adaptive multi-layer structure with spatial-spectrum combination for hyperspectral image anomaly detection
Published 2021-06-01“…A new algorithm for hyperspectral image anomaly detection is proposed by designing an adaptive multi-layer structure with spatial-spectral combination information, which is different from the traditional anomaly detection algorithms only considering the spectral difference between the anomaly point and the background pixels, and ignoring the difference between the local spatial structure and spectrum. …”
Get full text
Article -
12
Study on Anomaly Detection and Real-time Reliability Evaluation of Complex Component System Based on Log of Cloud Platform
Published 2022-12-01Subjects: “…log parsing|anomaly detection|reliability evaluation|root cause analysis|ensemble learning|complex components…”
Get full text
Article -
13
Unsupervised abnormal track detection method based on GRU-VAE
Published 2023-10-01Subjects: “…data mining|track data|anomaly detection|unsupervised learning…”
Get full text
Article -
14
Application of Transformer in anomaly indicators forecasting of hydropower units
Published 2023-01-01Subjects: Get full text
Article -
15
Abnormal Detection Method of Tool Machining Monitoring Data Based on Self-Paced Learning
Published 2023-10-01Subjects: Get full text
Article -
16
Outlier detection method for geotechnical engineering based on MetaOD model selection
Published 2022-03-01Subjects: “…geotechnical engineering anomaly detection…”
Get full text
Article -
17
Research on optimization selection of anti-submarine aircraft course in aero-magnetic exploration
Published 2023-04-01Subjects: “…aviation anti-submarine|magnetic anomaly detection|aeromagentic detection|optimal heading…”
Get full text
Article -
18
Dataflow Feature Analysis for Industrial Networks Communication Security
Published 2020-02-01Subjects: Get full text
Article -
19
Detection method of wind speed anomaly fluctuation based on SSA−LSTM
Published 2024-03-01Subjects: Get full text
Article -
20
Characteristics of Soil Geochemistry and Its Prospecting Significance in Liemen Area, Jinchuan County, Sichuan
Published 2022-02-01Subjects: Get full text
Article