Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/184396
Title: Anomaly detection: comparing different machine learning approaches
Authors: Jia, Zhensu
Keywords: Engineering
Issue Date: 2025
Publisher: Nanyang Technological University
Source: Jia, Z. (2025). Anomaly detection: comparing different machine learning approaches. Master's thesis, Nanyang Technological University, Singapore. https://hdl.handle.net/10356/184396
Abstract: Anomaly detection, as one of the significant applications of machine learning (ML), plays a key role in cyber security, financial risk control, medical diagnosis and other fields. However, although machine learning has been widely used in anomaly detection, there are few systematic comparative studies on different machine learning methods, making the applicability of different methods in practical applications and the improvement directions still unclear. In addition, in the field of cyber security, especially in distributed denial of service (DDoS) attack detection, how to choose suitable machine learning method and improve its detection method is still worthy of in-depth discussion. To address these gaps, this study adopts a mixed comparative approach that integrates a practical case study with a thematic literature review, systematically comparing the performance of supervised and unsupervised methods of ML, ensemble methods, and deep learning (DL) techniques in DDoS anomaly detection. By analyzing experimental results alongside existing research findings, the study not only clarifies the applicability of different machine learning methods in practical DDoS detection scenarios but also reveals current technical challenges and suggests potential directions for model optimization and future development.
URI: https://hdl.handle.net/10356/184396
Schools: School of Electrical and Electronic Engineering 
Fulltext Permission: restricted
Fulltext Availability: With Fulltext
Appears in Collections:EEE Theses

Files in This Item:
File Description SizeFormat 
JIA_ZHENSU_Dissertation(3).pdf
  Restricted Access
1.47 MBAdobe PDFView/Open

Page view(s)

33
Updated on May 7, 2025

Google ScholarTM

Check

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.