Skip to main content

Design of Network Traffic Anomaly Monitoring System Based on Data Mining

  • Conference paper
  • First Online:
Advanced Hybrid Information Processing (ADHIP 2022)

Abstract

The security hidden dangers in the network will affect the normal operation of the network. Therefore, in order to better ensure the security of the network structure, it is necessary to monitor the abnormal network traffic. However, due to the low monitoring accuracy and long monitoring time of the traditional network traffic anomaly monitoring system, this paper designs a network traffic anomaly monitoring system based on data mining. Through the configuration of data acquisition equipment, analysis equipment, exception handling equipment and system management equipment, the hardware structure of the system is designed. On this basis, through the system software functions of acquisition module, data processing module, data analysis module, data application module and infrastructure management module, the abnormal monitoring of network traffic is realized through data mining. Finally, the experiment proves that the network traffic anomaly monitoring system based on data mining has higher monitoring accuracy and shorter monitoring time, which is practical in practical application and fully meets the research requirements.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ifzarne, S., Tabbaa, H., Hafidi, I., et al.: Anomaly detection using machine learning techniques in wireless sensor networks. J. Phys: Conf. Ser. 1743(1), 012021–012034 (2021)

    Google Scholar 

  2. Yang, J., Hou, X.: Research on data mining algorithm based on positive and negative association rules. Comput. Technol. Dev. 30(11), 64–68 (2020)

    Google Scholar 

  3. Choi, H., Kim, M., Lee, G., et al.: Unsupervised learning approach for network intrusion detection system using autoencoders. J. Supercomput. 75(9), 5597–5621 (2019)

    Article  Google Scholar 

  4. Lian, J., Fang, S., Zhou, Y.: Model predictive control of the fuel cell cathode system based on state quantity estimation. Comput. Simul. 37(07), 119–122 (2020)

    Google Scholar 

  5. Xu, Y., Sun, Z.: Research development of abnormal traffic detection in software defined networking. J. Softw. 31(01), 183–207 (2020)

    Google Scholar 

  6. Xiao, F., Chen, L., Zhu, H., et al.: Anomaly-tolerant network traffic estimation via noise-immune temporal matrix completion model. IEEE J. Sel. Areas Commun. 37, 1192–1204 (2019)

    Article  Google Scholar 

  7. Ma, W., Zhang, Y., Guo, J.: Abnormal traffic detection method based on LSTM and improved residual neural network optimization. J. Commun. 42(05), 23–40 (2021)

    Google Scholar 

  8. Meng, Y., Qin, T., Zhao, L., et al.: Network anomaly detection method based on residual analysis. J. Xi'an Jiaotong Univ. 54(01), 42–48+84 (2020)

    Google Scholar 

  9. Peng, Y., Chen, X., Chen, S., et al.: Cross-domain abnormal traffic detection based on transfer learning. J. Beijing Univ. Posts Telecommun. 44(02), 33–39 (2021)

    Google Scholar 

  10. Liu, Y., Li, J., Zhang, Y., et al.: Network abnormal flow detection method based on feature attribute information entropy. Netinfo Secur. 21(02), 78–86 (2021)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yanling Huang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Huang, Y., Huang, L. (2023). Design of Network Traffic Anomaly Monitoring System Based on Data Mining. In: Fu, W., Yun, L. (eds) Advanced Hybrid Information Processing. ADHIP 2022. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 468. Springer, Cham. https://doi.org/10.1007/978-3-031-28787-9_41

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-28787-9_41

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-28786-2

  • Online ISBN: 978-3-031-28787-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics