<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                                                <journal-id>acin</journal-id>
            <journal-title-group>
                                                                                    <journal-title>Acta Infologica</journal-title>
            </journal-title-group>
                                        <issn pub-type="epub">2602-3563</issn>
                                                                                            <publisher>
                    <publisher-name>Istanbul University</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.26650/acin.1142806</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Computer Software</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Bilgisayar Yazılımı</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                        <trans-title-group xml:lang="tr">
                                    <trans-title>Otokodlayıcı Tabanlı Denetimsiz Öğrenme Yöntemi ile Ağ Trafiğindeki Saldırıların Algılanması</trans-title>
                                </trans-title-group>
                                                                                                                                                                                                <article-title>Detection of Attacks in Network Traffic with the Autoencoder-Based Unsupervised Learning Method</article-title>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-3551-7021</contrib-id>
                                                                <name>
                                    <surname>Özkan</surname>
                                    <given-names>Yalçın</given-names>
                                </name>
                                                                    <aff>İSTİNYE ÜNİVERSİTESİ, İKTİSADİ, İDARİ VE SOSYAL BİLİMLER FAKÜLTESİ</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20221231">
                    <day>12</day>
                    <month>31</month>
                    <year>2022</year>
                </pub-date>
                                        <volume>6</volume>
                                        <issue>2</issue>
                                        <fpage>199</fpage>
                                        <lpage>207</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20220709">
                        <day>07</day>
                        <month>09</month>
                        <year>2022</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20221014">
                        <day>10</day>
                        <month>14</month>
                        <year>2022</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2017, Acta Infologica</copyright-statement>
                    <copyright-year>2017</copyright-year>
                    <copyright-holder>Acta Infologica</copyright-holder>
                </permissions>
            
                                                                                                <trans-abstract xml:lang="tr">
                            <p>Ağ sistemlerine yapılan saldırıların etkisi ve oluşturduğu hasarların boyutu gün geçtikçe artış eğilimi göstermektedir. Saldırıları zamanında ve etkin biçimde tespit ederek uygun savunma sistemleri geliştirmek üzere makine öğrenmesi algoritmalarına dayalı çözümler geliştirilmeye başlanmıştır. Bu çalışma, ağlara yönelik anormal trafiğin derin öğrenme algoritmaları yardımıyla belirlenmesi üzerine odaklanmakta ve saldırıların tespit edilmesinde kullanılabilecek bir derin otokodlayıcı model mimarisi önerilmektedir. Bu amaçla önce otokodlayıcı ile sınıf etiketleri olmayan normal veri kümesi denetimsiz biçimde eğitilerek bir otokodlayıcı model elde edilmekte, bu model normal saldırı gözlemlerine sahip küçük boyutlu bir test verisiyle birlikte çalıştırılarak bir eşik değer elde edilmektedir. Eşik değer, model performansını optimum kılacak bir değer olarak hesaplanmaktadır. Denetimli öğrenme yöntemlerinin, siber saldırıların tespit edilmesinde, etiketleme işleminin zorluklara ve maliyet artışlarına neden olduğu gözlemlenmektedir. Bu maliyetleri aşmak ve zaman kazanmak için etiketlendirme işlemine başvurmadan sadece küçük bir test verisini kullanarak eşik değer hesaplanmakta ve yeni gelen bir güncel ağ trafik bilgisi bu eşik değere göre sınıflandırılmaktadır.</p></trans-abstract>
                                                                                                                                    <abstract><p>The effects of attacks on network systems and the extent of damages caused by them tend to increase every day. Solutions based on machine learning algorithms have started to be developed in order to develop appropriate defense systems by detecting attacks in a timely and effective manner. This study focuses on detecting abnormal traffic on networks through deep learning algorithms, and a deep autoencoder model architecture that can be used to detect attacks is recommended. To this end, an autoencoder model is first obtained by training the normal dataset without class labels in an unsupervised manner with an autoencoder, and a threshold value is obtained by running this model with small size test data with normal attack observations. The threshold value is calculated as a value that will optimize the model performance. It is observed that supervised learning methods lead to difficulties and cost increases in the detection of cyber-attacks and the labeling process. The threshold value is calculated using only small test data without resorting to labeling in order to overcome these costs and save time, and the incoming up-to-date network traffic information is classified based on this threshold value.</p></abstract>
                                                            
            
                                                                                        <kwd-group>
                                                    <kwd>Deep learning</kwd>
                                                    <kwd>  Autoencoders</kwd>
                                                    <kwd>  Unsupervised learning</kwd>
                                            </kwd-group>
                            
                                                <kwd-group xml:lang="tr">
                                                    <kwd>Derin öğrenme</kwd>
                                                    <kwd>  Otokodlayıcılar</kwd>
                                                    <kwd>  Denetimsiz öğrenme</kwd>
                                            </kwd-group>
                                                                                                                                        </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">Abadi, M., Agarval, A., Barham, P., Brevdo., Chen, A., Citro, C. ... Corrado, G.S. (2015), TensorFlow: Large-scale machine learning on heterogeneous systems, Software available from tensorflow.org, DOI: 10.5281/zenodo.4724125 google scholar</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">Aygun, R. C., &amp; Yavuz, A. G. (2017, June). Network anomaly detection with stochastically improved autoencoder based models. In 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud) (pp. 193-198). IEEE. google scholar</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">Chollet, F., &amp; others. (2015). Keras. GitHub. Retrieved from https://github.com/fchollet/keras google scholar</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">Chollet, F., (2019). Python ile Derin Öğrenme [Deep Learning with Python]. (Aksoy, B.A. Trans.). İstanbul, Turkey: Buzdağı yayınevi. google scholar</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">CICIDS2017. (2017), Intrusion Detection Systems Datasets, Retrieved from https://www.unb.ca/cic/datasets/ids-2017.html google scholar</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">Dutta,V., Pawlicki,M., Kozik,R. &amp; Choras, M. (2022). Unsupervised network traffic anomaly detection with deep autoencoders, Logic Journal of the IGPL, jzac002. google scholar</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">Gao M, Ma L , Liu H, Zhang Z, Ning Z &amp; Xu, J. (2020). Malicious Network Traffic Detection Based on Deep Neural Networks and Association Analysis. Sensors.; 20(5):1452. https://doi.org/10.3390/s20051452 google scholar</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">He, M., Wang, X., Zhou, J., Xi, Y., Jin, L., &amp; Wang, X. (2021). Deep-Feature-Based Autoencoder Network for Few-Shot Malicious Traffic Detection. Security and Communication Networks, 2021. https://doi.org/10.1155/2021/6659022 google scholar</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">Hunter, J. D. (2007), Matplotlib: A 2D graphics environment, Computing in Science \&amp; Engineering, Volume 9, Number 3, Pages 90-95. google scholar</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">Khraisat, A., Gondal, I., Vamplew, P. &amp; Kamruzzaman, J. (2019). Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecur 2, 20 (2019). https://doi.org/10.1186/s42400-019-0038-7 google scholar</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">Mirsky, Y., Doitshman, T., Elovici, Y., Shabtai, A. &amp; Kitsune. (2018). An Ensemble of Autoencoders for Online Network Intrusion Detection, Proceedings of the 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, CA, USA. 18-21 February 2018. google scholar</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">Özkan, Y., (2021). Uygulamalı Derin Öğrenme. Papatya Bilim Yayınevi. google scholar</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">Öztemel, E., (2020). Yapay Sinir Ağları. (4th ed.) [Neural networks], İstanbul, Turkey: Papatya Bilim yayınevi, ISBN: 978- 975-6797-39-6. google scholar</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">Roshan, K. &amp; Zafar, A. (2021). An Optimized Auto-Encoder based Approach for Detecting Zero-Day Cyber-Attacks in Computer Network. 5th International Conference on Information Systems and Computer Networks (ISCON), 2021, pp. 1-6, doi: 10.1109/ISCON52037.2021.9702437. google scholar</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">Rossum, G., &amp; Drake Jr, F. L. (1995). Python reference manual. Centrum voor Wiskunde en Informatica Amsterdam. google scholar</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">Sharafaldin,I., Habibi Lashkari, A.H., &amp; Ghorbani, A.A., (2018). Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization, 4th International Conference on Information Systems Security and Privacy (ICISSP), Portugal, January 2018 google scholar</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">Song, Y., Hyun, S., &amp; Cheong, Y. G. (2021). Analysis of Autoencoders for Network Intrusion Detection. Sensors (Basel, Switzerland), 21(13), 4294, https:// doi.org/10.3390/s21134294 google scholar</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">Yang, L., Song, Y., Gao, S., Xiao, B., &amp; Hu, A. (2020). Griffin: An Ensemble of AutoEncoders for Anomaly Traffic Detection in SDN, GLOBECOM 2020 - 2020 IEEE Global Communications Conference, 2020, pp. 1-6, doi: 10.1109/GLOBECOM42002.2020.9322187. google scholar</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
