87
References
[1]
M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, Network Traffic Anomaly Detection
and Prevention: concepts, techniques and tools. 2017. [Online]. Available:
http://www.springer.com/series/4198
[2]
S. Wang, J. F. Balarezo, S. Kandeepan, A. Al-Hourani, K. G. Chavez, and B. Rubinstein,
“Machine learning in network anomaly detection: A survey,” IEEE Access, vol. 9, pp.
152379–152396, 2021, doi: 10.1109/ACCESS.2021.3126834.
[3]
A. Drewek-Ossowicka, M. Pietrołaj, and J. Rumiński, “A survey of neural networks
usage for intrusion detection systems,” J Ambient Intell Humaniz Comput, vol. 12, no.
1, pp. 497–514, Jan. 2021, doi: 10.1007/s12652-020-02014-x.
[4]
R. Bala and R. Nagpal, “A review on KDDCUP99 and NSL-KDD dataset,” 2019, doi:
10.26483/ijarcs.v10i2.6395.
[5]
“What is Supervised Learning? | IBM.” https://www.ibm.com/cloud/learn/supervised-
learning
[6]
“Supervised Machine Learning: What is, Algorithms with Examples.”
https://www.guru99.com/supervised-machine-learning.html
[7]
A. Binbusayyis and T. Vaiyapuri, “Unsupervised deep learning approach for network
intrusion detection combining convolutional autoencoder and one-class SVM,” Applied
Intelligence, vol. 51, no. 10, pp. 7094–7108, Oct. 2021, doi: 10.1007/s10489-021-
02205-9.
[8]
T. Ergen and S. S. Kozat, “Unsupervised anomaly detection with LSTM neural
networks,” IEEE Trans Neural Netw Learn Syst, vol. 31, no. 8, pp. 3127–3141, Aug.
2020, doi: 10.1109/TNNLS.2019.2935975.
[9]
S. Rawat, A. Srinivasan, V. Ravi, and U. Ghosh, “Intrusion detection systems using
classical machine learning techniques vs integrated unsupervised feature learning and
deep neural network,” Internet Technology Letters, vol. 5, no. 1, Jan. 2022, doi:
10.1002/itl2.232.
[10] R. Abdulhammed, M. Faezipour, A. Abuzneid, and A. Abumallouh, “Deep and Machine
Learning Approaches for Anomaly-Based Intrusion Detection of Imbalanced Network
Traffic,” IEEE Sens Lett, vol. 3, no. 1, Jan. 2019, doi: 10.1109/LSENS.2018.2879990.
[11] J. J. Estévez-Pereira, D. Fernández, and F. J. Novoa, “Network Anomaly Detection Using
Machine Learning Techniques,” Aug. 2020, p. 8. doi:
10.3390/proceedings2020054008.
[12] S. Gurung, M. K. Ghose, and A. Subedi, “Deep Learning Approach on Network Intrusion
Detection System using NSL-KDD Dataset,” Computer Network and Information
Security, vol. 3, pp. 8–14, 2019, doi: 10.5815/ijcnis.2019.03.02.