Network Traffic Monitoring : Advanced Autoencoder Models for Real-Time Anomaly Detection

Authors

  • Sandeep Belidhe  Independent Researcher, USA
  • Sandeep Kumar Dasa  Independent Researcher, USA
  • Phani Monogya Katikireddi  Independent Researcher, USA

Keywords:

Network Traffic Monitoring, Anomaly Detection, Autoencoder, Real-Time Detection, Cybersecurity, Reconstruction Error, Neural Network, Network Intrusion, Real-Time Monitoring, Machine Learning

Abstract

The viability of newer versions of autoencoder models for detecting anomalies in real-time in network traffic is discussed. With the increase in systems interconnection, it becomes critically important to understand how these networks evolve and detect aberrant behavior in time. An autoencoder is a neural network frequently used in anomaly detection: The network trains itself to map a set of predetermined standard patterns. At the same time, outliers are easily recognizable since they do not fit the usual pattern. This study involves training a network traffic autoencoder to build a model of normal activity, which allows for identifying anomalies through reconstruction error. Two approaches are used to evaluate the proposed model: the batch processing approach and the streaming scenario based on real networks. The same is achieved by comparing precision, recall, and F1 scores, which explains the possibility of using autoencoders for real-time network traffic monitoring. Further presented are the problem areas concerning the threshold optimization, the system's processing power, and the possible solutions for future improvements.

References

  1. Borghesi, A., Bartolini, A., Lombardi, M., Milano, M., & Benini, L. (2019). A semisupervised autoencoder-based approach for anomaly detection in high-performance computing systems. Engineering Applications of Artificial Intelligence, 85, 634-644. https://cris.unibo.it/bitstream/11585/694862/4/anomalyDetection_AE_engApps_AI_REV1.pdf
  2. Vasa, Y. (2021). Robustness and adversarial attacks on generative models. International Journal for Research Publication and Seminar, 12(3), 462–471. https://doi.org/10.36676/jrps.v12.i3.1537 
  3. Kilaru, N. B., Cheemakurthi, S. K. M., & Gunnam, V. (n.d.). Advanced Anomaly Detection In Banking: Detecting Emerging Threats Using Siem. International Journal of Computer Science and Mechatronics, 7(4), 28–33.
  4. Naresh Babu Kilaru. (2021). AUTOMATE DATA SCIENCE WORKFLOWS USING DATA ENGINEERING TECHNIQUES. International Journal for Research Publication and Seminar, 12(3), 521–530. https://doi.org/10.36676/jrps.v12.i3.1543 
  5. Gunnam, V., & Kilaru, N. B. (2021). Securing Pci Data: Cloud Security Best Practices And Innovations. Nveo, 8(3), 418–424. https://doi.org/https://doi.org/10.53555/nveo.v8i3.5760 
  6. Katikireddi, P. M., Singirikonda, P., & Vasa, Y. (2021). Revolutionizing DEVOPS with Quantum Computing: Accelerating CI/CD pipelines through Advanced Computational Techniques. Innovative Research Thoughts, 7(2), 97–103. https://doi.org/10.36676/irt.v7.i2.1482 
  7. Vasa, Y. (2021). Quantum Information Technologies in cybersecurity: Developing unbreakable encryption for continuous integration environments. International Journal for Research Publication and Seminar, 12(2), 482–490. https://doi.org/10.36676/jrps.v12.i2.1539
  8. Jangampeta, S., Mallreddy, S. R., & Padamati, J. R. (2021). Data Security: Safeguarding the Digital Lifeline in an Era of Growing Threats. International Journal for Innovative Engineering and Management Research, 10(4), 630-632.
  9. Singirikonda, P., Jaini, S., & Vasa, Y. (2021). Develop Solutions To Detect And Mitigate Data Quality Issues In ML Models. NVEO - Natural Volatiles & Essential Oils, 8(4), 16968–16973. https://doi.org/https://doi.org/10.53555/nveo.v8i4.5771
  10. Vasa, Y. (2021). Develop Explainable AI (XAI) Solutions For Data Engineers. NVEO - Natural Volatiles & Essential Oils, 8(3), 425–432. https://doi.org/https://doi.org/10.53555/nveo.v8i3.5769 
  11. Singirikonda, P., Katikireddi, P. M., & Jaini, S. (2021). Cybersecurity In Devops: Integrating Data Privacy And Ai-Powered Threat Detection For Continuous Delivery. NVEO - Natural Volatiles & Essential Oils, 8(2), 215–216. https://doi.org/https://doi.org/10.53555/nveo.v8i2.5770
  12. Kilaru, N. B., & Cheemakurthi, S. K. M. (2021). Techniques For Feature Engineering To Improve Ml Model Accuracy. NVEO-NATURAL VOLATILES & ESSENTIAL OILS Journal| NVEO, 194-200.
  13. Vasa, Y., Jaini, S., & Singirikonda, P. (2021). Design Scalable Data Pipelines For Ai Applications. NVEO - Natural Volatiles & Essential Oils, 8(1), 215–221. https://doi.org/https://doi.org/10.53555/nveo.v8i1.5772
  14. Sukender Reddy Mallreddy(2020).Cloud Data Security: Identifying Challenges and Implementing Solutions.JournalforEducators,TeachersandTrainers,Vol.11(1).96 -102.

Downloads

Published

2021-10-14

Issue

Section

Research Articles

How to Cite

[1]
Sandeep Belidhe, Sandeep Kumar Dasa, Phani Monogya Katikireddi "Network Traffic Monitoring : Advanced Autoencoder Models for Real-Time Anomaly Detection" International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 8, Issue 5, pp.378-383, September-October-2021.