The current level of interconnection that can be established between different devices (for example, think of the Internet of Things (IoT)) has reached such a complexity that it seriously questions the effectiveness of traditional concepts such as perimeter security. As a matter of fact, cyberspace's attack surface grows exponentially, and it is therefore essential to resort to automated tools for the effective detection of network anomalies associated with unprecedented cybersecurity threats.
This chapter will cover the following topics:
- Network anomaly detection techniques
- How to classify network attacks
- Detecting botnet topology
- Different machine learning (ML) algorithms for botnet detection
In this chapter, we will focus on anomaly detection related to network security, postponing the discussion of the aspects of fraud detection...