Computer Engineering, Volume. 51, Issue 8, 227(2025)
Network Traffic Anomaly Detection for Data Centers in Imbalanced Datasets
[1] [1] HOLT T J, BOSSLER A M. The palgrave handbook of international cybercrime and cyberdeviance[M]. Berlin, Germany: Palgrave Macmillan, 2020: 135-154.
[2] [2] ABDELRAHMAN A M, RODRIGUES J J, MAHMOUD M M, et al. Software - defined networking security for private data center networks and clouds: vulnerabilities, attacks, countermeasures, and solutions[J]. International Journal of Communication Systems, 2021, 34(4): e4706.
[3] [3] JIAO J H, YE B J, ZHAO Y, et al. Detecting TCP-based DDoS attacks in Baidu cloud computing data centers[C]//Proceedings of the 36th Symposium on Reliable Distributed Systems (SRDS). Washington D.C., USA: IEEE Press, 2017: 256-258.
[5] [5] GAO Y L, LI X Y, PENG H, et al. Hincti: a cyber threat intelligence modeling and identification system based on heterogeneous information network[J]. IEEE Transactions on Knowledge and Data Engineering, 2022, 34(2): 708-722.
[6] [6] SUN N, ZHANG J, RIMBA P, et al. Data-driven cybersecurity incident prediction: a survey[J]. IEEE Communications Surveys & Tutorials, 2019, 21(2): 1744-1772.
[8] [8] HOU X D, ZHANG T, JI L, et al. Combating highly imbalanced steganalysis with small training samples using feature selection[J]. Journal of Visual Communication and Image Representation, 2017, 49: 243-256.
[9] [9] VIEGAS F, ROCHA L, GONCALVES M, et al. A genetic programming approach for feature selection in highly dimensional skewed data[J]. Neurocomputing, 2018, 273: 554-569.
[10] [10] ZHOU F, YANG S, FUJITA H, et al. Deep learning fault diagnosis method based on global optimization GAN for unbalanced data[J]. Knowledge-Based Systems, 2020, 187: 104837-104855.
[11] [11] LIN W C, TSAI C F, HU Y H, et al. Clustering-based undersampling in class-imbalanced data[J]. Information Sciences, 2017, 409: 17-26.
[12] [12] CHAWLA N V, BOWYER K W, HALL L O, et al. SMOTE: synthetic minority over-sampling technique[J]. Journal of Artificial Intelligence Research, 2002, 16: 321-357.
[13] [13] BATISTA G E, PRATI R C, MONARD M C. A study of the behavior of several methods for balancing machine learning training data[J]. ACM SIGKDD Explorations Newsletter, 2004, 6(1): 20-29.
[14] [14] FUQUA D, RAZZAGHI T. A cost-sensitive convolution neural network learning for control chart pattern recognition[J]. Expert Systems with Applications, 2020, 150: 113275.
[15] [15] YIN S, ZHU X P, JING C. Fault detection based on a robust one class support vector machine[J]. Neurocomputing, 2014, 145: 263-268.
[16] [16] FENG W, HUANG W J, REN J C. Class imbalance ensemble learning based on the margin theory[J]. Applied Sciences, 2018, 8(5): 815.
[18] [18] YANG C. Anomaly network traffic detection algorithm based on information entropy measurement under the cloud computing environment[J]. Cluster Computing, 2019, 22(1): 8309-8317.
[19] [19] HOANG D H, NGUYEN H D. A PCA-based method for IoT network traffic anomaly detection[C]//Proceedings of the 20th International Conference on Advanced Communication Technology. Washington D.C., USA: IEEE Press, 2018: 381-386.
[21] [21] PEREZ-BUENO F, GARCIA L, MACIA-FERNANDEZ G, et al. Leveraging a probabilistic PCA model to understand the multivariate statistical network monitoring framework for network security anomaly detection[J]. IEEE/ACM Transactions on Networking, 2022, 30(3): 1217-1229.
[23] [23] LAVROVA D S, ALEKSEEV I V, SHTYRKINA A A. Security analysis based on controlling dependences of network traffic parameters by wavelet transformation[J]. Automatic Control and Computer Sciences, 2018, 52(8): 931-935.
[24] [24] GOZDE K, ONDER D, KORAY S O. Increasing the performance of machine learning-based IDSs on an imbalanced and up-to-date dataset[J]. IEEE Access, 2020, 8: 32150-32162.
[25] [25] GAO X W, SHAN C, HU C Z, et al. An adaptive ensemble machine learning model for intrusion detection[J]. IEEE Access, 2019, 7: 82512-82521.
[26] [26] ZHANG H, LI Y D, L Z H, et al. A real-time and ubiquitous network attack detection based on deep belief network and support vector machine[J]. IEEE/CAA Journal of Automatica Sinica, 2020, 7(3): 790-799.
[27] [27] WANG Z H, FOK K W, THING V L L. Machine learning for encrypted malicious traffic detection: approaches, datasets and comparative study[J]. Computers & Security, 2022, 113: 102542.
[28] [28] ZHANG P, HE F, ZHANG H, et al. Real-time malicious traffic detection with online isolation forest over SD-WAN[J]. IEEE Transactions on Information Forensics and Security, 2023, 18: 2076-2090.
[29] [29] FERRAG M A, MAGLARAS L. DeliveryCoin: an IDS and blockchain-based delivery framework for drone-delivered services[J]. Computers, 2019, 8(3): 58-73.
[30] [30] LU X L, LIU P J, LIN J Y. Network traffic anomaly detection based on information gain and deep learning[C]//Proceedings of the 3rd International Conference on Information System and Data Mining. New York, USA: ACM Press, 2019: 11-15.
[31] [31] ZHANG Y, CHEN X, JIN L, et al. Network intrusion detection: based on deep hierarchical network and original flow data[J]. IEEE Access, 2019, 7: 37004-37016.
[32] [32] LIN P, YE K J, XU C Z. Dynamic network anomaly detection system by using deep learning techniques[C]//Proceedings of International Conference on Cloud Computing. Berlin, Germany: Springer, 2019: 161-176.
[33] [33] AHMAD R, ALSMADI I, ALHAMDANI W, et al. A deep learning ensemble approach to detecting unknown network attacks[J]. Journal of Information Security and Applications, 2022, 67: 103196.
[34] [34] LIU F R, LI X F, XIONG W, et al. An accuracy network anomaly detection method based on ensemble model[C]//Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Washington D.C., USA: IEEE Press, 2021: 125-131.
[35] [35] HE H B, BAI Y, GARCIA E A, et al. ADASYN: adaptive synthetic sampling approach for imbalanced learning[C]//Proceedings of IEEE International Joint Conference on Neural Networks. Washington D.C., USA: IEEE Press, 2008: 1322-1328.
[36] [36] ISHWARAN H, LU M. Standard errors and confidence intervals for variable importance in random forest regression, classification, and survival[J]. Statistics in Medicine, 2019, 38(4): 558-582.
[37] [37] University of New Brunswick. CSE-CIC-IDS2018 on AWS[EB/OL]. [2023-12-19]. https://www.unb.ca/cic/datasets/ids-2018.html.
Get Citation
Copy Citation Text
WANG Guangming, LI Dongqing, JIANG Congfeng. Network Traffic Anomaly Detection for Data Centers in Imbalanced Datasets[J]. Computer Engineering, 2025, 51(8): 227
Category:
Received: Jan. 22, 2024
Accepted: Aug. 26, 2025
Published Online: Aug. 26, 2025
The Author Email: WANG Guangming (221050035@hdu.edu.cn)