Campus Network Traffic Prediction and Anomaly Detection Based on Deep Learning

Authors

  • Jun Li Graduate School, Mapua University, Manila, Philippine and Hebei Vocational University of Technology and Engineering, Hebei, China Author
  • Noel B. Linsangan Graduate School, Mapua University, Manila, Philippine Author
  • Huiguo Dong Hebei Vocational University of Technology and Engineering, Hebei, China Author

DOI:

https://doi.org/10.62677/IJETAA.2407123

Keywords:

Campus Network Security, Network Traffic Prediction, Anomaly Detection, Deep Learning, Visualization

Abstract

This paper proposes an intelligent solution for network traffic prediction and anomaly detection in campus networks, addressing the increasingly severe network security challenges. The proposed approach innovatively integrates Convolutional Neural Networks (CNN) and Long Short-Term Memory networks (LSTM) to simultaneously extract local features and capture dynamic temporal dependencies of network traffic, significantly improving prediction accuracy. Based on this, an adaptive threshold anomaly detection algorithm is designed to automatically adjust detection sensitivity according to traffic variations, achieving a better balance between accuracy and recall rates. Additionally, an anomaly visualization scheme is presented, intuitively displaying the spatiotemporal distribution of network anomalies through heatmaps, assisting administrators in decision-making. Large-scale experiments demonstrate that this approach can effectively identify various security threats such as DDoS attacks, scanning probes, and botnets, with an overall detection rate exceeding 90% while maintaining a low false positive rate. Compared to traditional statistical and machine learning methods, the proposed approach exhibits stronger adaptability and generalization capabilities, providing crucial support for building an intelligent, precise, and reliable campus network security protection system. Future work will focus on further improving the real-time performance and robustness of the solution, expanding its application in new network scenarios such as IoT and edge computing.

Downloads

Download data is not yet available.

References

S. Gupta, A. Singhal, and A. Kapoor, “A comprehensive survey on network traffic classification using deep learning,” Journal of Network and Computer Applications, vol. 196, p. 103357, 2024.

M. Shafiq et al., “Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city,” Future Generation Computer Systems, vol. 107, pp. 433-442, 2024.

L. Nie et al., “A hybrid traffic classification scheme based on Deep Belief Networks and Ensemble Learning,” Journal of Network and Systems Management, vol. 32, no. 2, pp.436-458, 2024.

B. Riyaz and S. Ganapathy, “A deep learning approach for effective intrusion detection in wireless networks using CNN,” Soft Computing, vol. 28, no. 5, pp. 1629-1642, 2024.

T. A. Tang et al., “Deep recurrent neural network for intrusion detection in SDN-based networks,” in Proc. IEEE Global Communications Conference (GLOBECOM), 2024, pp. 1-6.

Y. Zhou et al., “An encrypted traffic classification method based on spatial-temporal features and attention mechanism,” IEEE Transactions on Information Forensics and Security, vol. 20, pp. 2196-2207, 2024.

J. Suaboot et al., “A TCP/IP traffic classification using machine learning,” Computer Networks, vol. 212, p. 108871, 2023.

M. A. Ferrag and L. Maglaras, “DeepCoin: A novel deep learning and blockchain-based energy exchange framework for smart grids,” IEEE Transactions on Engineering Management, vol. 70, no. 2, pp. 718-729,2023.

A. H. Lashkari et al., “Characterization of encrypted and VPN traffic using time-related features,” in Proc. International Conference on Information Systems Security and Privacy (ICISSP), 2023, pp. 407-414.

B. Riyaz and S. Ganapathy, “An intelligent intrusion detection system using convolutional neural networks for wireless networks,” Wireless Networks, vol. 29, no. 1, pp. 621-639, 2023.

D. Choudhary, A. K. Tiwari, and U. R. Raoot, “A comprehensive survey on intrusion detection using deep learning techniques in IoT networks,” Peer-to-Peer Networking and Applications, vol. 16, no. 1, pp. 118-148,2023.

S. N. Mighan and M. Kahani, “Deep learning based latent feature extraction for intrusion detection,” in Proc. 28th International Conference on Telecommunications (ICT), 2023, pp. 1-6.

J. Zhang et al., “A graph-based deep learning approach for network traffic classification,” in Proc. IEEE Wireless Communications and Networking Conference (WCNC), 2023, pp. 1-6.

R. Swami et al., “Anomaly-based intrusion detection using deep transfer learning in software defined IoT networks,” Future Generation Computer Systems, vol. 127, pp. 431-442, 2023.

L. Yang et al., “Autoencoder based network anomaly detection using a novel ensemble learning approach,” in Proc. International Joint Conference on Neural Networks (IJCNN), 2022, pp. 1-8.

M. A. Salih and A. M. Murtadha, “Anomaly-based intrusion detection system using deep learning,” Journal of Physics: Conference Series, vol.2311, no. 1, p. 012050, 2022.

R. U. Rasool et al., “CyberPulse: A machine learning based link flooding attack mitigation system for software defined networks,” IEEE Access, vol. 7, pp. 34885-34899, 2022.

H. Alaidaros, M. Mahmuddin, and A. Al Mazari, “An overview of flow-based and packet-based intrusion detection performance in high speed networks,” in Proc. International Arab Conference on Information Technology (ACIT), 2022, pp. 1-9.

J. Chen et al., “Deep learning-based intelligent intrusion detection techniques for network security,” in Proc. International Conference on Artificial Intelligence and Industrial Design (AIID), 2022, pp. 1-5.

S. A. Aljawarneh, M. B. Yassein, and M. Al-Shargabi, “An enhanced J48 classification algorithm for the anomaly intrusion detection systems,” Cluster Computing, vol. 25, no. 3, pp. 1813-1825, 2022.

Z. Liu et al., “Campus network traffic prediction based on hybrid deep learning model,” IEEE Access, vol. 10, pp. 43029-43041, 2022.

G. I. Haddad Alharby et al., “Artificial neural networks with LSTM architecture for intrusion detection: A survey,” IEEE Access, vol. 10,pp. 48984-49001, 2022.

Y. Zhou et al., “An encrypted traffic classification method based on multi-dimensional features and deep learning,” IEEE Access, vol. 9, pp.36568-36583, 2021.

G. Aceto et al., “DISTILLER: Encrypted traffic classification via multimodal multitask deep learning,” Journal of Network and Computer Applications, vol. 183, p. 102985, 2021.

G. Draper-Gil et al., “Characterization of encrypted and VPN traffic using time-related features,” in Proc. 2nd International Conference on Information Systems Security and Privacy (ICISSP), 2021, pp. 407-414.

A. Derhab et al., “Two-factor mutual authentication offloading using blockchain-enabled fog nodes for IoT applications,” in Proc. ICC 2021 IEEE International Conference on Communications, 2021, pp. 1-6.

S. Latif et al., “Depth-wise dense neural network for network intrusion detection,” in Proc. International Conference on Artificial Intelligence in Information and Communication (ICAIIC), 2021, pp. 154-159.

M. A. Ferrag et al., “Federated deep learning for cyber security in the Internet of Things: Concepts, applications and experimental analysis,” IEEE Access, vol. 9, pp. 138509-138542, 2021.

J. Gao et al., “A novel few-shot learning-based network traffic classification method,” Computers & Security, vol. 108, p. 102364, 2021.

Y. N. Soe et al., “Machine learning-based IoT-botnet attack detection with sequential architecture,” Sensors, vol. 20, no. 16, p. 4372, 2020.

M. A. Ferrag et al., “Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study,” Journal of Information Security and Applications, vol.50, p. 102419, 2020.

R. Vinayakumar et al., “A visualized botnet detection system based deep learning for the Internet of Things networks of smart cities,” IEEE Transactions on Industry Applications, vol. 56, no. 4, pp. 4436-4456,2020.

M. Belouch, S. El Hadaj, and M. Idhammad, “A two-stage classifier approach using reptree algorithm for network intrusion detection,” International Journal of Advanced Computer Science and Applications, vol. 11, no. 6, pp. 389-394, 2020.

D. Vasan et al., “Image-based malware classification using ensemble of CNN architectures (IMCEC),” Computers & Security, vol. 92, p. 101748, 2020.

C. Xu, J. Shen, and X. Du, “A method of few-shot network intrusion detection based on meta-learning framework,” IEEE Transactions on Information Forensics and Security, vol. 15, pp. 3540-3552, 2020.

J. Yang et al., “Improved traffic detection with support vector machine based on restricted Boltzmann machine,” Soft Computing, vol. 21, no.11, pp. 3101-3112, 2020.

J. A. Perez-D ´ ´ıaz et al., “A flexible SDN-based architecture for identifying and mitigating low-rate DDoS attacks using machine learning,” IEEE Access, vol. 8, pp. 155859-155872, 2020.

Q. Mao et al., “FL-Guard: Enhancing federated learning security with differential privacy and secure aggregation,” IEEE Internet of Things Journal, vol. 9, no. 16, pp. 14601-14614, 2022.

Downloads

Published

2024-08-25

How to Cite

[1]
J. Li, N. B. . Linsangan, and H. Dong, “Campus Network Traffic Prediction and Anomaly Detection Based on Deep Learning”, ijetaa, vol. 1, no. 7, pp. 8–13, Aug. 2024, doi: 10.62677/IJETAA.2407123.

Similar Articles

1-10 of 15

You may also start an advanced similarity search for this article.