Contact Us

For Marketing, Sales and Subscriptions Inquiries
Rockefeller Center, 45 Rockefeller Plaza
20th Flr Unit #5, New York, NY 10111
United States

Conference List

Review of Computer Engineering Research

March 2019, Volume 6, 1, pp 12-23

Classification Ensemble Based Anomaly Detection in Network Traffic

Ramiz M. Alıguliyev


Makrufa Sh. Hajirahimova

Ramiz M. Alıguliyev 1 Makrufa Sh. Hajirahimova 1 

  1. Institute of Information Technology of Azerbaijan National Academy of Sciences, B.Vahabzade Str. 9A, Baku, AZ1141, Azerbaijan 1

Pages: 12-23

DOI: 10.18488/journal.76.2019.61.12.23

Share :

Article History:

Received: 05 November, 2018
Revised: 24 December, 2018
Accepted: 29 January, 2019
Published: 14 March, 2019


Recently, the expansion of information technologies and the exponential increase of the digital data have deepened more the security and confidentiality issues in computer networks. In the Big Data era information security has become the main direction of scientific research and Big Data analytics is considered being the main tool in the solution of information security issue. Anomaly detection is one of the main issues in data analysis and used widely for detecting network threats. The potential sources of outliers can be noise and errors, events, and malicious attacks on the network. In this work, a short review of network anomaly detection methods is given, is looked at related works. In the article, a more exact and simple multi-classifier model is proposed for anomaly detection in network traffic based on Big Data. Experiments have been performed on the NSL-KDD data set by using the Weka. The offered model has shown decent results in terms of anomaly detection accuracy.
Contribution/ Originality
This study proposed multi-classifier model for increasing anomaly detection accuracy in network traffic. The model consists of the J48, LogitBoost, IBk, AdaBoost, RandomTree classifiers. This work performed a comparative analysis of used classifiers and their combination to see which one will give the best result In study classifiers and their combination have been implemented on NSL-KDD open source dataset using WEKA tool. The results show that the ensemble classifiers provide the better result than using these classifiers individually. The computer network traffic analysis with employment of our model can help network engineers and administrators to create a more reliable network, avoid possible discharges and take precautionary measures.


Anomaly detection, Big data analytics, Network security, An ensemble of classifiers, IDS, Denial of service.




Google Scholor ideas Microsoft Academic Search bing Google Scholor


This work was supported by the Science Development Foundation under the President of the Republic of Azerbaijan – Grant № EIF-KETPL-2-2015-1(25)-56/05/1.

Competing Interests:

The authors declare that they have no competing interests.


Related Article

( 1 ) Web Pages Categorization Based on Classification & Outlier Analysis through FSVM
( 2 ) Predict Survival of Patients with Lung Cancer Using an Ensemble Feature Selection Algorithm and Classification Methods in Data Mining
( 3 ) Classification and Identification of Risk Management Techniques for Mitigating Risks with Factor Analysis Technique in Software Risk Management
( 4 ) Classification Ensemble Based Anomaly Detection in Network Traffic
( 7 ) Forecasting Air Passengers of Changi Airport Based on Seasonal Decomposition and an LSSVM Model
( 9 ) RLS Fixed-Lag Smoother Using Covariance Information Based on Innovation Approach in Linear Continuous Stochastic Systems
( 10 ) Solving Nonlinear Single-Unit Commitment Problem by Genetic Algorithm Based Clustering Technique
( 11 ) OFDM Channel Estimation Based on Novel Local Search Particle Swarm Optimization Algorithm
( 12 ) FPGA Implementation of MC-CDMA Wireless Communication System Based on SDR-A Review
( 13 ) PAPR Reduction Using Eight Factors Rotating Phase Shift Technique Based on Local Search Algorithm in OFDM
( 14 ) Smart Campus: An Implementation of a Cloud-Based Mobile Learning Application
( 15 ) Survey of Image Processing Based Applications in AMR
( 16 ) Creation of Algoritms for Recommendation System Based on Users Data on Internet Advertisement Marketing
( 17 ) Development and Performance Analysis of Bisection Method-Based Optimal Path Length Algorithm for Terrestrial Microwave Link
( 19 ) An Examination of the Methods of Increasing Software Efficiency Based on Soft Computing Technology
( 20 ) A Case Study in Teaching: The Factors Determining of Assessmenting the Competence of Technology-Based
( 22 ) Exploring Internet of Thing on PCA Algorithm for Optimization of Facial Detection and Tracking
( 23 ) Detection and Prevention of Phishing Attack Using Linkguard Algorithm
( 25 ) Smart Feature Fusion and Model for Human Detection
( 26 ) Detection of Crossed Walls Security Alarm System against Invasion
( 27 ) Two-Stage Model with Rough Cluster and Salp Optimization Technique for Epistasis Detection
( 28 ) An Unified Approach by Implementing the Secured Authentication Protocol Scheme in Wireless Sensor Networks
( 29 ) Information about Simulation Software for Testing of Wireless Network