ARCHIVES
Network Anomaly Detection using machine learning and stream it
Published Online: September-December 2025
Pages: 28-33
Cite this article
↗ https://www.doi.org/10.59256/indjcst.20250403006Abstract
The exponential growth of digital networks has increased the risk of cyber-attacks, making network anomaly detection a critical component of modern cybersecurity infrastructure. Traditional Intrusion Detection Systems (IDS) rely heavily on rule-based or signature-based mechanisms, which are limited in their ability to identify novel or evolving threats and often generate high false-positive rates. This study, Network Anomaly Detection, proposes a machine learning–based framework to detect and classify abnormal traffic patterns with high accuracy and minimal false alarms. The NSL-KDD dataset, a widely used benchmark for intrusion detection, was employed for model training and evaluation. Data preprocessing techniques, including label encoding, normalization, and feature selection, were applied to improve model efficiency. Multiple supervised learning algorithms, such as Random Forest, Logistic Regression, and ensemble models, were implemented and compared. Performance was assessed using metrics such as accuracy, F1-score, confusion matrix, and ROC-AUC. A real-time web application was developed using Streamlit to provide end-users with an interactive interface for anomaly detection. The results demonstrate that the proposed framework offers a scalable, accurate, and user-friendly solution for identifying cyber threats, highlighting the role of machine learning in advancing beyond the limitations of traditional IDS approaches
Related Articles
2025
Transforming Cyber-Physical Systems: Machine Learning for Secure and Efficient Solutions
2025
Exploring AI Techniques for Quantum Threat Detection and Prevention
2025
Maturity Models for Business Intelligence: An Overview
2025
INSPIRO: An AI Driven Institution Auditor
2025
Adaptive AI Framework for Anomaly Detection and DDoS Mitigation in Distributed Systems
2025