Computer Engineering, Volume. 51, Issue 8, 227(2025)

Network Traffic Anomaly Detection for Data Centers in Imbalanced Datasets

WANG Guangming*, LI Dongqing, and JIANG Congfeng
Author Affiliations
  • Cloud Technology Research Center, Hangzhou Dianzi University, Hangzhou 310018, Zhejiang, China
  • show less
    References(32)

    [1] [1] HOLT T J, BOSSLER A M. The palgrave handbook of international cybercrime and cyberdeviance[M]. Berlin, Germany: Palgrave Macmillan, 2020: 135-154.

    [2] [2] ABDELRAHMAN A M, RODRIGUES J J, MAHMOUD M M, et al. Software - defined networking security for private data center networks and clouds: vulnerabilities, attacks, countermeasures, and solutions[J]. International Journal of Communication Systems, 2021, 34(4): e4706.

    [3] [3] JIAO J H, YE B J, ZHAO Y, et al. Detecting TCP-based DDoS attacks in Baidu cloud computing data centers[C]//Proceedings of the 36th Symposium on Reliable Distributed Systems (SRDS). Washington D.C., USA: IEEE Press, 2017: 256-258.

    [5] [5] GAO Y L, LI X Y, PENG H, et al. Hincti: a cyber threat intelligence modeling and identification system based on heterogeneous information network[J]. IEEE Transactions on Knowledge and Data Engineering, 2022, 34(2): 708-722.

    [6] [6] SUN N, ZHANG J, RIMBA P, et al. Data-driven cybersecurity incident prediction: a survey[J]. IEEE Communications Surveys & Tutorials, 2019, 21(2): 1744-1772.

    [8] [8] HOU X D, ZHANG T, JI L, et al. Combating highly imbalanced steganalysis with small training samples using feature selection[J]. Journal of Visual Communication and Image Representation, 2017, 49: 243-256.

    [9] [9] VIEGAS F, ROCHA L, GONCALVES M, et al. A genetic programming approach for feature selection in highly dimensional skewed data[J]. Neurocomputing, 2018, 273: 554-569.

    [10] [10] ZHOU F, YANG S, FUJITA H, et al. Deep learning fault diagnosis method based on global optimization GAN for unbalanced data[J]. Knowledge-Based Systems, 2020, 187: 104837-104855.

    [11] [11] LIN W C, TSAI C F, HU Y H, et al. Clustering-based undersampling in class-imbalanced data[J]. Information Sciences, 2017, 409: 17-26.

    [12] [12] CHAWLA N V, BOWYER K W, HALL L O, et al. SMOTE: synthetic minority over-sampling technique[J]. Journal of Artificial Intelligence Research, 2002, 16: 321-357.

    [13] [13] BATISTA G E, PRATI R C, MONARD M C. A study of the behavior of several methods for balancing machine learning training data[J]. ACM SIGKDD Explorations Newsletter, 2004, 6(1): 20-29.

    [14] [14] FUQUA D, RAZZAGHI T. A cost-sensitive convolution neural network learning for control chart pattern recognition[J]. Expert Systems with Applications, 2020, 150: 113275.

    [15] [15] YIN S, ZHU X P, JING C. Fault detection based on a robust one class support vector machine[J]. Neurocomputing, 2014, 145: 263-268.

    [16] [16] FENG W, HUANG W J, REN J C. Class imbalance ensemble learning based on the margin theory[J]. Applied Sciences, 2018, 8(5): 815.

    [18] [18] YANG C. Anomaly network traffic detection algorithm based on information entropy measurement under the cloud computing environment[J]. Cluster Computing, 2019, 22(1): 8309-8317.

    [19] [19] HOANG D H, NGUYEN H D. A PCA-based method for IoT network traffic anomaly detection[C]//Proceedings of the 20th International Conference on Advanced Communication Technology. Washington D.C., USA: IEEE Press, 2018: 381-386.

    [21] [21] PEREZ-BUENO F, GARCIA L, MACIA-FERNANDEZ G, et al. Leveraging a probabilistic PCA model to understand the multivariate statistical network monitoring framework for network security anomaly detection[J]. IEEE/ACM Transactions on Networking, 2022, 30(3): 1217-1229.

    [23] [23] LAVROVA D S, ALEKSEEV I V, SHTYRKINA A A. Security analysis based on controlling dependences of network traffic parameters by wavelet transformation[J]. Automatic Control and Computer Sciences, 2018, 52(8): 931-935.

    [24] [24] GOZDE K, ONDER D, KORAY S O. Increasing the performance of machine learning-based IDSs on an imbalanced and up-to-date dataset[J]. IEEE Access, 2020, 8: 32150-32162.

    [25] [25] GAO X W, SHAN C, HU C Z, et al. An adaptive ensemble machine learning model for intrusion detection[J]. IEEE Access, 2019, 7: 82512-82521.

    [26] [26] ZHANG H, LI Y D, L Z H, et al. A real-time and ubiquitous network attack detection based on deep belief network and support vector machine[J]. IEEE/CAA Journal of Automatica Sinica, 2020, 7(3): 790-799.

    [27] [27] WANG Z H, FOK K W, THING V L L. Machine learning for encrypted malicious traffic detection: approaches, datasets and comparative study[J]. Computers & Security, 2022, 113: 102542.

    [28] [28] ZHANG P, HE F, ZHANG H, et al. Real-time malicious traffic detection with online isolation forest over SD-WAN[J]. IEEE Transactions on Information Forensics and Security, 2023, 18: 2076-2090.

    [29] [29] FERRAG M A, MAGLARAS L. DeliveryCoin: an IDS and blockchain-based delivery framework for drone-delivered services[J]. Computers, 2019, 8(3): 58-73.

    [30] [30] LU X L, LIU P J, LIN J Y. Network traffic anomaly detection based on information gain and deep learning[C]//Proceedings of the 3rd International Conference on Information System and Data Mining. New York, USA: ACM Press, 2019: 11-15.

    [31] [31] ZHANG Y, CHEN X, JIN L, et al. Network intrusion detection: based on deep hierarchical network and original flow data[J]. IEEE Access, 2019, 7: 37004-37016.

    [32] [32] LIN P, YE K J, XU C Z. Dynamic network anomaly detection system by using deep learning techniques[C]//Proceedings of International Conference on Cloud Computing. Berlin, Germany: Springer, 2019: 161-176.

    [33] [33] AHMAD R, ALSMADI I, ALHAMDANI W, et al. A deep learning ensemble approach to detecting unknown network attacks[J]. Journal of Information Security and Applications, 2022, 67: 103196.

    [34] [34] LIU F R, LI X F, XIONG W, et al. An accuracy network anomaly detection method based on ensemble model[C]//Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Washington D.C., USA: IEEE Press, 2021: 125-131.

    [35] [35] HE H B, BAI Y, GARCIA E A, et al. ADASYN: adaptive synthetic sampling approach for imbalanced learning[C]//Proceedings of IEEE International Joint Conference on Neural Networks. Washington D.C., USA: IEEE Press, 2008: 1322-1328.

    [36] [36] ISHWARAN H, LU M. Standard errors and confidence intervals for variable importance in random forest regression, classification, and survival[J]. Statistics in Medicine, 2019, 38(4): 558-582.

    [37] [37] University of New Brunswick. CSE-CIC-IDS2018 on AWS[EB/OL]. [2023-12-19]. https://www.unb.ca/cic/datasets/ids-2018.html.

    Tools

    Get Citation

    Copy Citation Text

    WANG Guangming, LI Dongqing, JIANG Congfeng. Network Traffic Anomaly Detection for Data Centers in Imbalanced Datasets[J]. Computer Engineering, 2025, 51(8): 227

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category:

    Received: Jan. 22, 2024

    Accepted: Aug. 26, 2025

    Published Online: Aug. 26, 2025

    The Author Email: WANG Guangming (221050035@hdu.edu.cn)

    DOI:10.19678/j.issn.1000-3428.0069281

    Topics