Anomaly Detection Using Supervised learning Techniques in Social Networks

Anomaly Detection Using Supervised learning Techniques in Social Networks

Authors

  • Prof .Dr. Che zalina Binti Zulkifli Faculty of Computing and Creative Industries / Universiti Pendidikan

DOI:

https://doi.org/10.31185/wjcm.58

Abstract

Intrusion detection corresponds to a suite of techniques that are used to identify attacks against computers and network infrastructures. As the cost of the information processing and Internet accessibility falls, more and more organizations are becoming vulnerable to a wide variety of cyber threats. Web mining based intrusion detection techniques generally fall into one of two categories; misuse detection and anomaly detection. In misuse detection, each instance in a data set is labelled as ‘normal’ or ‘intrusive’ and a learning algorithm is trained over the labelled data. These techniques are able to automatically retrain intrusion detection models on different input data that include new types of attacks, as long as they have been labelled appropriately. Evaluation results show that the proposed approach can reduce the number of alerts by 94.32%, effectively improving alert management process. Because of the use of ensemble approach and optimal algorithms in the proposed approach, it can inform network security specialist the state of the monitored network in an online manner.

References

Xu, Y., Yan, C., Shi, J., Lu, Z., Niu, X., Jiang, Y., & Zhu, F. (2021). An anomaly detec-tion and dynamic energy performance evaluation method for HVAC systems based on data mining. Sustainable Energy Technologies and Assessments, 44, 101092.

Rajesh, A., &Kiran, S. Anomaly Detection Using Data Mining Techniques in Social Networking. International Journal for Research in Applied Science and Engineering Technology, 6, 1268-1272.

Jose, S., Malathi, D., Reddy, B., &Jayaseeli, D. (2018, April). A survey on anomaly based host intrusion detection system. In Journal of Physics: Conference Series (Vol. 1000, No. 1, p. 012049). IOP Publishing.

Oh, M. H., &Iyengar, G. (2019, July). Sequential anomaly detection using inverse rein-forcement learning. In Proceedings of the 25th ACM SIGKDD International Confer-ence on Knowledge Discovery & data mining (pp. 1480-1490).

Gao, J., Song, X., Wen, Q., Wang, P., Sun, L., &Xu, H. (2020). Robusttad: Robust time series anomaly detection via decomposition and convolutional neural networks. arXiv preprint arXiv:2002.09545.

Fan, C., Xiao, F., Zhao, Y., & Wang, J. (2018). Analytical investigation of autoencoder-based methods for unsupervised anomaly detection in building energy data. Applied energy, 211, 1123-1135.

Hajisalem, V., &Babaie, S. (2018). A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection. Computer Networks, 136, 37-50.

Thudumu, S., Branch, P., Jin, J., & Singh, J. J. (2020). A comprehensive survey of anomaly detection techniques for high dimensional big data. Journal of Big Data, 7(1), 1-30.

Nolle, T., Seeliger, A., &Mühlhäuser, M. (2018, September). BINet: multivariate busi-ness process anomaly detection using deep learning. In International Conference on Business Process Management (pp. 271-287). Springer, Cham.

Feremans, L., Vercruyssen, V., Cule, B., Meert, W., & Goethals, B. (2019, September). Pattern-based anomaly detection in mixed-type time series. In Joint European confer-ence on machine learning and knowledge discovery in databases (pp. 240-256). Springer, Cham.

Rousseeuw, P. J., & Hubert, M. (2018). Anomaly detection by robust statistics. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 8(2), e1236.

Chaudhary, A., Mittal, H., & Arora, A. (2019, February). Anomaly detection using graph neural networks. In 2019 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COMITCon) (pp. 346-350). IEEE.

Basora, L., Olive, X., &Dubot, T. (2019). Recent advances in anomaly detection meth-ods applied to aviation. Aerospace, 6(11), 117.

Dogan, A., &Birant, D. (2021). Machine learning and data mining in manufactur-ing. Expert Systems with Applications, 166, 114060.

Pandit, R. K., & Infield, D. (2018). SCADA-based wind turbine anomaly detection us-ing Gaussian process models for wind turbine condition monitoring purposes. IET Re-newable Power Generation, 12(11), 1249-1255.

Erhan, L., Ndubuaku, M., Di Mauro, M., Song, W., Chen, M., Fortino, G., ...&Liotta, A. (2021). Smart anomaly detection in sensor systems: A multi-perspective re-view. Information Fusion, 67, 64-79.

Capozzoli, A., Piscitelli, M. S., Brandi, S., Grassi, D., &Chicco, G. (2018). Automated load pattern learning and anomaly detection for enhancing energy management in smart buildings. Energy, 157, 336-352.

Munir, M., Siddiqui, S. A., Dengel, A., & Ahmed, S. (2018). DeepAnT: A deep learning approach for unsupervised anomaly detection in time series. Ieee Access, 7, 1991-2005.

Idhammad, M., Afdel, K., &Belouch, M. (2018). Distributed intrusion detection system for cloud environments based on data mining techniques. Procedia Computer Sci-ence, 127, 35-41.

Stripling, E., Baesens, B., Chizi, B., &vandenBroucke, S. (2018). Isolation-based condi-tional anomaly detection on mixed-attribute data to uncover workers' compensation fraud. Decision Support Systems, 111, 13-26.

Riveiro, M., Pallotta, G., &Vespe, M. (2018). Maritime anomaly detection: A re-view. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 8(5), e1266.

Guezzaz, A., Asimi, Y., Azrour, M., &Asimi, A. (2021). Mathematical validation of proposed machine learning classifier for heterogeneous traffic and anomaly detec-tion. Big Data Mining and Analytics, 4(1), 18-24.

Al-Saedi, K.H.K., Implementation Patterns of AquaSim for Simulation of Underwater Acoustic Wireless Sensor Networks. Wasit Journal of Computer and Mathematics Science, 2021: p. 84-92.

Verma, H., Internet of Robotics Things (IoRT) Based Integration of Robotic Applications for Advanced Research. Wasit Journal of Computer and Mathematics Science, 2021: p. 9-16.

Kh-Madhloom, J., Dynamic Cryptography Integrated Secured Decentralized Applications with Blockchain Programming. Wasit Journal of Computer and Mathematics Sciences, 2022. 1(2): p. 21-33.

Al-ogaili, H. and A.M. Shadhar, the Finger Vein Recognition Using Deep Learning Technique. Wasit Journal of Computer and Mathematics Sciences, 2022. 1(2): p. 1-11.

Zubain, N.A. and A. Al-Hachami, Certain Types of Function Via Alpha-Open Sets. Wasit Journal of Pure sciences, 2022. 1(2): p. 96-101.

Taresh, M.R. and A. Al-Hachami, On normal space: OR, Og. Wasit Journal of Pure sciences, 2022. 1(2): p. 61-70.

Roa'a M. Al_airaji., et al., Face Patterns Analysis and Recognition System Based on Quantum Neural Network QNN. International Journal of Interactive Mobile Technologies, 2022. 16(8).

Salim Haider, H.T.Hazim., Secure Chaos of 5G Wireless Communication System Based on IOT Applications. International Journal of Online and Biomedical Engineering(iJOE), 2022. 18(12): p. 89-102.

Alaidi, A.H.M., et al., Dark Web Illegal Activities Crawling and Classifying Using Data Mining Techniques. International Journal of Interactive Mobile Technologies, 2022. 16(10).

Jasim, N.A.,and M.S. Farhan. Internet of Things (IoT) application in the assessment of learning process. in IOP Conference Series: Materials Science and Engineering. 2021. IOP Publishing.

Abass A. Z., et al., Smart Learning based on Moodle E-learning Platform and Digital Skills for University Students. Int. J. Recent Contributions Eng. Sci. IT, 2022. 10(1).

Wen, T., & Keyes, R. (2019). Time series anomaly detection using convolutional neural networks and transfer learning. arXiv preprint arXiv:1905.13628.

Downloads

Published

2022-10-01

How to Cite

Binti Zulkifli, C. zalina. (2022). Anomaly Detection Using Supervised learning Techniques in Social Networks. Wasit Journal of Computer and Mathematics Sciences, 1(3), 24–31. https://doi.org/10.31185/wjcm.58

Issue

Section

Computer
Loading...