Abstract

Networked computer systems are deeply integrated in every aspect of our information-overloaded modern society.The mechanisms that keep our modern society flowing smoothly, with activities such as efficient execution of government and commercial transactions and services, or consistent facilitation of social transactions among billions of users, are all dependent on large networked computer systems.Today, every aspect of our lives is influenced by networked computer systems.The Internet, which provides transportation to all types of information in-including complex realtime multi-media data, is the universal network of millions of interconnected computer systems, organized as a network of thousands of distinct smaller networks.The recent growth of the Internet has been phenomenal and consequently, the computers and the networks that make the Internet hum have become the targets of enemies and criminals.Intrusions into a computer or network system are activities that destabilize them by compromising security in terms of confidentiality, availability or integrity, the three main characteristics of a secure and stable system.Machine learning is used to extract valid, novel, potentially useful and meaningful patterns from a dataset, usually large, in a domain of interest by using non-trivial mechanisms.A machine learning algorithm attempts to recognize complex patterns in datasets to help make intelligent decisions or predictions when it encounters new or previously unseen data instances.To deal with unseen examples, a machine learning algorithm must be cognizant of this necessity and thus, when it learns it must make conscious and diligent efforts to generalize from examples it has seen.Good generalization from data is a prime activity a learner program must perform.

Keywords:
Anomaly detection Anomaly (physics) Computer science Data mining Physics

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
2
Refs
0.04
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Anomaly Detection Techniques and Applications
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

JOURNAL ARTICLE

Network Traffic Anomaly Detection using Boosting Methodology

Inhye KimWang‐Su Jeon

Journal:   The Journal of Korean Institute of Information Technology Year: 2025 Vol: 23 (5)Pages: 21-28
JOURNAL ARTICLE

Anomaly Detection in Network Traffic Using ADTK

Khatri, Disha

Journal:   Zenodo (CERN European Organization for Nuclear Research) Year: 2025
JOURNAL ARTICLE

Anomaly Detection in Network Traffic Using ADTK

Khatri, Disha

Journal:   Zenodo (CERN European Organization for Nuclear Research) Year: 2025
JOURNAL ARTICLE

Navigational Anomaly Detection using a Traffic Network Model

Jaeyong OhHye-Jin Kim

Journal:   Journal of the Korean Society of Marine Environment and Safety Year: 2023 Vol: 29 (7)Pages: 828-835
© 2026 ScienceGate Book Chapters — All rights reserved.