Traffic Anomaly Detection for Data Communication Networks

  • Conference paper
  • First Online:
Artificial Intelligence and Security (ICAIS 2020)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12240))

Included in the following conference series:

Abstract

The detection efficiency of the traditional data communication network traffic anomaly detection algorithm is low. And it is impossible to guarantee the accuracy of traffic detection in actual applications. The detection algorithm involves too many dimensions, and it is difficult to explore the optimal solution even if it takes a lot of time. In view of the above problems, this paper proposes an improved network traffic anomaly detection algorithm. The algorithm inherits the algorithm idea of combining the weak classifiers in the classical GBDT (Gradient Boosting Decision Tree) into the final strong classifier. The algorithm equilibrium weights are assigned to the weak classifiers in the iteration to balance the contribution of the weak classifier to the final classification model. The algorithm combines Bayesian optimization algorithm to achieve the purpose of automatically exploring the optimal super-parameter combination. The simulation results show that the proposed algorithm has an effective improvement in detection efficiency compared with the traditional traffic detection algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (France)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 85.59
Price includes VAT (France)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 105.49
Price includes VAT (France)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Wan, M., Yao, J., **g, Y., **, X.: Event-based anomaly detection for non-public industrial communication protocols in SDN-based control systems. Comput. Mater. Continua 55(3), 447–463 (2018)

    Google Scholar 

  2. El Mamoun, M., Mahmoud, Z., Kaddour, S.: SVM model selection using PSO for learning handwritten Arabic characters. Comput. Mater. Continua 61(3), 995–1008 (2019)

    Article  Google Scholar 

  3. Li, D., Hong, W., Gao, J., Liu, Z., Li, L., Zheng, Z.: Uncertain knowledge reasoning based on the fuzzy multi entity Bayesian networks. Comput. Mater. Continua 61(1), 301–321 (2019)

    Article  Google Scholar 

  4. Yan-guang, Z., Yi-fan, Z.: Robust temporal constraint optimization based on Bayesian optimization algorithm. In: 2010 International Conference on Computational and Information Sciences, Chengdu, pp. 186–189 (2010). https://doi.org/10.1109/iccis.2010.50

Download references

Acknowledgement

This work is supported by Henan Electric Power Technology Project (SGHAXT00JSJS1900125, SGTYHT/17-JS-199).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to **aoxiao Tang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tang, X., Li, W., Shen, J., Qi, F., Guo, S. (2020). Traffic Anomaly Detection for Data Communication Networks. In: Sun, X., Wang, J., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2020. Lecture Notes in Computer Science(), vol 12240. Springer, Cham. https://doi.org/10.1007/978-3-030-57881-7_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-57881-7_39

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-57880-0

  • Online ISBN: 978-3-030-57881-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation