scholarly journals A DOUBLE-SHRINK AUTOENCODER FOR NETWORK ANOMALY DETECTION

2020 ◽  
Vol 36 (2) ◽  
pp. 159-172
Author(s):  
Cong Thanh Bui ◽  
Loi Cao Van ◽  
Minh Hoang ◽  
Quang Uy Nguyen

The rapid development of the Internet and the wide spread of its applications has affected many aspects of our life. However, this development also makes the cyberspace more vulnerable to various attacks. Thus, detecting and preventing these attacks are crucial for the next development of the Internet and its services. Recently, machine learning methods have been widely adopted in detecting network attacks. Among many machine learning methods, AutoEncoders (AEs) are known as the state-of-the-art techniques for network anomaly detection. Although, AEs have been successfully applied to detect many types of attacks, it is often unable to detect some difficult attacks that attempt to mimic the normal network traffic. In order to handle this issue, we propose a new model based on AutoEncoder called Double-Shrink AutoEncoder (DSAE). DSAE put more shrinkage on the normal data in the middle hidden layer. This helps to pull out some anomalies that are very similar to normal data. DSAE are evaluated on six well-known network attacks datasets. The experimental results show that our model performs competitively to the state-of-the-art model, and often out-performs this model on the attacks group that is difficult for the previous methods.

Author(s):  
Mohammad Asif ◽  
Prof. E. M. Chirchi

Machine learning is embraced in an extensive variety of areas where it demonstrates its predominance over customary lead based calculations. These strategies are being coordinated in digital recognition frameworks with the objective of supporting or notwithstanding supplanting the principal level of security experts although the total mechanization of identification and examination is a luring objective, the adequacy of machine learning in digital security must be assessed with the due steadiness. With the improvement of the Internet, digital assaults are changing quickly and the digital security circumstance isn't hopeful. Since information are so critical in ML/DL strategies, we portray a portion of the normally utilized system datasets utilized in ML/DL, examine the difficulties of utilizing ML/DL for digital security and give recommendations to look into bearings. Malware has developed over the previous decades including novel engendering vectors, strong versatility methods and different and progressively propelled assault procedures. The most recent manifestation of malware is the infamous bot malware that furnish the aggressor with the capacity to remotely control traded off machines therefore making them a piece of systems of bargained machines otherwise called botnets. Bot malware depend on the Internet for proliferation, speaking with the remote assailant and executing assorted noxious exercises. As system movement, action is one of the principle characteristics of malware and botnet task, activity investigation is frequently observed as one of the key methods for recognizing traded off machines inside the system. We present an examination, routed to security experts, of machine learning methods connected to the recognition of interruption, malware, and spam.


2020 ◽  
Vol 10 (4) ◽  
pp. 41-50
Author(s):  
A.A. Osin ◽  
A.K. Fomin ◽  
G.B. Sologub ◽  
V.I. Vinogradov

The work is aimed at researching the possibility of using machine learning methods to build models for forecasting demand for new products in the online store Ozon. ru. Approaches to the solution that were not previously used in a specific task are proposed for consideration. Data on sales history and storage of goods at Ozon.ru are used as a sample. There is a description and analysis of the approximate loss of the Ozon.ru website, the data used, the process of building a base model, and the results obtained. It describes the metrics used to evaluate the prediction results and makes a comparative analysis between the prediction results of the built model and the results of heuristically selected values.


Author(s):  
Minsik Oh ◽  
Sungjoon Park ◽  
Sun Kim ◽  
Heejoon Chae

Abstract Gene expressions are subtly regulated by quantifiable measures of genetic molecules such as interaction with other genes, methylation, mutations, transcription factor and histone modifications. Integrative analysis of multi-omics data can help scientists understand the condition or patient-specific gene regulation mechanisms. However, analysis of multi-omics data is challenging since it requires not only the analysis of multiple omics data sets but also mining complex relations among different genetic molecules by using state-of-the-art machine learning methods. In addition, analysis of multi-omics data needs quite large computing infrastructure. Moreover, interpretation of the analysis results requires collaboration among many scientists, often requiring reperforming analysis from different perspectives. Many of the aforementioned technical issues can be nicely handled when machine learning tools are deployed on the cloud. In this survey article, we first survey machine learning methods that can be used for gene regulation study, and we categorize them according to five different goals: gene regulatory subnetwork discovery, disease subtype analysis, survival analysis, clinical prediction and visualization. We also summarize the methods in terms of multi-omics input types. Then, we explain why the cloud is potentially a good solution for the analysis of multi-omics data, followed by a survey of two state-of-the-art cloud systems, Galaxy and BioVLAB. Finally, we discuss important issues when the cloud is used for the analysis of multi-omics data for the gene regulation study.


Sign in / Sign up

Export Citation Format

Share Document