no code implementations • 20 Jul 2023 • Tin Lai, Farnaz Farid, Abubakar Bello, Fariza Sabrina
However, heterogeneous types of network devices can often capture a more diverse set of signals than a single type of device readings, which is particularly useful for anomaly detection.
no code implementations • 27 Jun 2023 • Yuanyuan Wei, Julian Jang-Jaccard, Amardeep Singh, Fariza Sabrina, Seyit Camtepe
In this context, we proposed a framework that can not only classify legitimate traffic and malicious traffic of DDoS attacks but also use SHAP to explain the decision-making of the classifier model.
no code implementations • 21 Apr 2023 • Yuanyuan Wei, Julian Jang-Jaccard, Fariza Sabrina, Wen Xu, Seyit Camtepe, Aeryn Dunmore
In this research, we trained and evaluated our proposed LSTM-AE model on reflection-based DDoS attacks (DNS, LDAP, and SNMP).
no code implementations • 16 Feb 2023 • Aeryn Dunmore, Julian Jang-Jaccard, Fariza Sabrina, Jin Kwak
This paper surveys the current research and literature for the use of Generative Adversarial Networks in the malware problem space.
no code implementations • 20 Aug 2022 • Yuhua Yin, Julian Jang-Jaccard, Fariza Sabrina, Jin Kwak
In this study, we proposed a two-stage model that combines the Birch clustering algorithm and MLP classifier to improve the performance of network anomaly multi-classification.
no code implementations • 17 May 2022 • Shaleeza Sohail, Zongwen Fan, Xin Gu, Fariza Sabrina
Also, selection of right hyperparameters for ANN architecture plays a crucial role in the accurate detection of security attacks, especially when it come to identifying the subcategories of attacks.
1 code implementation • 14 Apr 2022 • Yuanyuan Wei, Julian Jang-Jaccard, Wen Xu, Fariza Sabrina, Seyit Camtepe, Mikael Boulic
Anomaly detection for indoor air quality (IAQ) data has become an important area of research as the quality of air is closely related to human health and well-being.
no code implementations • 30 Mar 2022 • Yuhua Yin, Julian Jang-Jaccard, Wen Xu, Amardeep Singh, Jinting Zhu, Fariza Sabrina, Jin Kwak
Then, we apply recursive feature elimination(RFE) as a wrapper feature selection method to further eliminate redundant features recursively on the reduced feature subsets.
no code implementations • 2 Feb 2022 • Wen Xu, Julian Jang-Jaccard, Tong Liu, Fariza Sabrina
The network intrusion detection task is challenging because of the imbalanced and unlabeled nature of the dataset it operates on.
no code implementations • 15 Oct 2019 • Yuanyuan Wei, Julian Jang-Jaccard, Fariza Sabrina, Timothy McIntosh
Outlier detection is a technique in data mining that aims to detect unusual or unexpected records in the dataset.