Deep Learning Driven Approaches for Real-Time Anomaly Detection in High-Velocity Network Traffic
Keywords:
Network Anomaly Detection, Deep Learning, Real-Time Monitoring, Cybersecurity, High-Velocity Traffic, Edge Computing, Transformer ModelsSynopsis
The proliferation of high-speed digital communication and evolving cyber threats has propelled the need for intelligent, scalable, and real-time anomaly detection systems. Traditional machine learning models often fail to adapt to dynamic, high-velocity environments with large-scale data. This paper explores recent advances in deep learning models tailored for real-time anomaly detection in high-velocity network traffic. Key architectures such as CNN-LSTM, Transformer networks, and AutoEncoders are evaluated based on accuracy, scalability, and latency. The integration of these models with edge computing and federated learning offers further potential to enhance response times and privacy. Our analysis reflects the current landscape , revealing a strong shift toward hybrid, explainable, and low-latency models capable of autonomous learning.
References
• Cheng, Y., Liu, Y., & Guo, J. (2020). Hybrid CNN-LSTM Model for Anomaly Detection in IoT Networks. IEEE IoT Journal, 7(8), 7299–7306. https://doi.org/10.1109/JIOT.2020.2967706
• Gundaboina A. Data Loss Prevention in Healthcare: Advanced Strategies for Protecting PHI in Cloud Environments. Journal of Artificial Intelligence, Machine Learning and Data Science 2023 1(2), 3045-3051. DOI: doi.org/10.51219/JAIMLD/anjan-gundaboina/628
• Hussein, A., Karim, M., & Mahmood, A. (2020). GAN-based Synthetic Data Generation for Anomaly Detection. Information Sciences, 512, 420–437. https://doi.org/10.1016/j.ins.2019.09.051
• Gundaboina, A. (2024). HITRUST Certification Best Practices: Streamlining Compliance for Healthcare Cloud Solutions. International Journal of Computer Science and Information Technology Research, 5(1), 76–94. https://ijcsitr.org/index.php/home/article/view/IJCSITR_2024_05_01_008
• Javaid, A., Niyaz, Q., Sun, W., & Alam, M. (2016). A Deep Learning Approach for Network Intrusion Detection. Proceedings of the 9th EAI International Conference, 21–26. https://doi.org/10.4108/eai.3-12-2015.2262516
• Uppuluri, V. (2023). Design and Deployment of Predictive Models for Influenza Breakthrough Infections Using Pharmacy Test Data. Journal of Artificial Intelligence, Machine Learning & Data Science, 1(2), 3031–3037. https://doi.org/10.51219/JAIMLD/vijitha-uppuluri/626
• Kim, G., Lee, S., & Kim, S. (2019). Deep Learning-based Anomaly Detection using CNN Features in Network Traffic. Sensors, 19(15), 3453. https://doi.org/10.3390/s19153453
• Potla, R.B. (2023). Supplier Collaboration Portals for Component Manufacturers: Procure-to-Pay Automation and Working-Capital Outcomes. International Journal of Artificial Intelligence (ISCSITR-IJAI), 4(1), 16–40. https://doi.org/10.63397/ISCSITR-IJAI_04_01_002
• Mirsky, Y., Doitshman, T., Elovici, Y., & Shabtai, A. (2018). Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection. Network and Distributed System Security Symposium (NDSS). https://doi.org/10.14722/ndss.2018.23356
• Vallemoni, R.K. (2023). Merchant Onboarding and Risk Scoring: Data Governance, Master Data, and Golden-Record Strategies. ISCSITR - International Journal of Scientific Research in Information Technology (ISCSITR-IJSRIT), 4(1), 16–41. https://doi.org/10.63397/ISCSITR-IJSRIT_04_01_002
• Yin, C., Zhu, Y., Fei, J., & He, X. (2017). A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks. IEEE Access, 5, 21954–21961. https://doi.org/10.1109/ACCESS.2017.2762418
• Zhang, L., & Zulkernine, M. (2022). Deep Transformer-based Anomaly Detection in High-Speed Networks. IEEE Transactions on Network and Service Management, 19(2), 205–218. https://doi.org/10.1109/TNSM.2022.3145198
• Vallemoni, R.K. (2023). Data Lineage and Metadata in Payment Ecosystems: Auditability and Regulatory Readiness across the Life Cycle. Frontiers in Computer Science and Artificial Intelligence, 2(1), 46–58. https://doi.org/10.32996/fcsai.2023.2.1.5
• Zhao, X., Yu, H., & Wang, L. (2023). Federated Learning for Network Intrusion Detection. ACM Transactions on Privacy and Security, 26(3), 1–20. https://doi.org/10.1145/3599450
Published
Series
Categories
License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.