<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                                                <journal-id>j. nat. appl. sci.</journal-id>
            <journal-title-group>
                                                                                    <journal-title>Süleyman Demirel Üniversitesi Fen Bilimleri Enstitüsü Dergisi</journal-title>
            </journal-title-group>
                                        <issn pub-type="epub">1308-6529</issn>
                                                                                            <publisher>
                    <publisher-name>Süleyman Demirel University</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.19113/sdufenbed.1703191</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Artificial Intelligence (Other)</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Yapay Zeka (Diğer)</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                        <article-title>Learning from the Normal: Anomaly-Based Intrusion Detection Using Isolation Forest, LOF, and One-Class SVM</article-title>
                                                                                                                                                                                                <trans-title-group xml:lang="tr">
                                    <trans-title>Anomali Tabanlı Saldırı Tespiti için Normal Trafikten Öğrenme: Isolation Forest, LOF ve One-Class SVM Yaklaşımları</trans-title>
                                </trans-title-group>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0009-0009-3455-7206</contrib-id>
                                                                <name>
                                    <surname>Alhajahmad</surname>
                                    <given-names>Bashar</given-names>
                                </name>
                                                                    <aff>SİİRT ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20260424">
                    <day>04</day>
                    <month>24</month>
                    <year>2026</year>
                </pub-date>
                                        <volume>30</volume>
                                        <issue>1</issue>
                                        <fpage>29</fpage>
                                        <lpage>42</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20250521">
                        <day>05</day>
                        <month>21</month>
                        <year>2025</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20260318">
                        <day>03</day>
                        <month>18</month>
                        <year>2026</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 1995, Süleyman Demirel University Journal of Natural and Applied Sciences</copyright-statement>
                    <copyright-year>1995</copyright-year>
                    <copyright-holder>Süleyman Demirel University Journal of Natural and Applied Sciences</copyright-holder>
                </permissions>
            
                                                                                                <abstract><p>This study presents a comparative analysis of three widely adopted unsupervised anomaly detection algorithms—Isolation Forest, Local Outlier Factor (LOF), and One-Class Support Vector Machine (SVM)—with the aim of evaluating their effectiveness in detecting network intrusions. Using a publicly available cybersecurity dataset, this study applied Principal Component Analysis (PCA) to reduce dimensionality and optimize computational performance. Each model was trained exclusively on normal traffic data and was tested against mixed data containing both normal and attack instances. The performance was assessed using key metrics, including precision, recall, and F1-score, along with confusion matrices, to evaluate the classification behavior. The results indicate that the One-Class SVM achieved the best overall performance, with the highest recall (99.06%) and F1-score (0.8511), making it highly effective in detecting a broad range of attack types while maintaining a manageable false-positive rate. While Isolation Forest achieved strong precision (78.56%), it underperformed in recall, making it more suitable for applications where false positives must be minimized. LOF delivered a balanced but less robust performance owing to its higher false-alarm rate.</p></abstract>
                                                                                                                                    <trans-abstract xml:lang="tr">
                            <p>Bu çalışma, ağ tabanlı saldırıların tespitine yönelik olarak yaygın biçimde kullanılan üç gözetimsiz anomali tespit algoritmasının — Isolation Forest, Yerel Aykırı Değer Faktörü (LOF) ve Tek Sınıf Destek Vektör Makinesi (One-Class SVM) — karşılaştırmalı bir analizini sunmaktadır. Çalışmada, kamuya açık bir siber güvenlik veri seti kullanılmış ve hesaplama maliyetini azaltmak ile model performansını artırmak amacıyla Temel Bileşenler Analizi (PCA) uygulanmıştır. Modeller yalnızca normal ağ trafiği verileriyle eğitilmiş, ardından hem normal hem de saldırı örneklerini içeren karışık veri üzerinde test edilmiştir. Performans değerlendirmesi, sınıflandırma başarımını ölçmek amacıyla doğruluk, geri çağırma, F1 puanı ve karışıklık matrisleri gibi temel metrikler kullanılarak gerçekleştirilmiştir. Elde edilen sonuçlar, One-Class SVM algoritmasının %99,06 geri çağırma oranı ve 0,8511 F1 puanı ile en yüksek genel performansı sağladığını, geniş yelpazedeki saldırı türlerini etkili şekilde tespit ederken kabul edilebilir düzeyde yanlış pozitif oranını koruduğunu göstermektedir. Isolation Forest algoritması yüksek doğruluk (%78,56) elde etmiş olmasına rağmen, düşük geri çağırma performansı nedeniyle yanlış pozitiflerin en aza indirilmesinin öncelikli olduğu senaryolarda daha uygun bir seçenek olarak değerlendirilmektedir. LOF algoritması ise görece yüksek yanlış alarm oranı nedeniyle daha dengeli fakat daha az sağlam bir performans sergilemiştir</p></trans-abstract>
                                                            
            
                                                            <kwd-group>
                                                    <kwd>Anomaly detection</kwd>
                                                    <kwd>  Unsupervised learning</kwd>
                                                    <kwd>  Cybersecurity</kwd>
                                                    <kwd>  One-Class SVM</kwd>
                                                    <kwd>  Local outlier factor (LOF)</kwd>
                                            </kwd-group>
                                                        
                                                                            <kwd-group xml:lang="tr">
                                                    <kwd>Anomali algılama</kwd>
                                                    <kwd>  Siber güvenlik</kwd>
                                                    <kwd>  Gözetimsiz öğrenme</kwd>
                                                    <kwd>  Tek sınıflı svm</kwd>
                                                    <kwd>  İzolasyon rmanı</kwd>
                                                    <kwd>  Yerel yykırı değer faktörü</kwd>
                                            </kwd-group>
                                                                                                        <funding-group specific-use="FundRef">
                    <award-group>
                                                    <funding-source>
                                <named-content content-type="funder_name">N/A</named-content>
                            </funding-source>
                                                                            <award-id>N/A</award-id>
                                            </award-group>
                </funding-group>
                                </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">[1]	Tatineni, S. 2021. Machine learning approaches for anomaly detection in cybersecurity: a comparative analysis. International Journal of Computer Engineering and Technology, 12(1), 42–50.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">[2]	Segurola-Gil, L., Moreno-Moreno, M., Irigoien, I. ve diğerleri. 2024. Unsupervised anomaly detection approach for cyberattack identification. International Journal of Machine Learning and Cybernetics, 15, 5291–5302.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">[3]	Chandola, V., Banerjee, A., Kumar, V. 2009. Anomaly detection: A survey. ACM Computing Surveys, 41(3), 1–58. 
https://doi.org/10.1145/1541880.1541882</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">[4]	Liu, F. T., Ting, K. M., Zhou, Z. H. 2012. Isolation-based anomaly detection. ACM Transactions on Knowledge Discovery from Data, 6(1), 1–39.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">[5]	Breunig, M. M., Kriegel, H.-P., Ng, R. T., Sander, J. 2000. LOF: Identifying density-based local outliers. ACM SIGMOD Record, 29(2), 93–104.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">[6]	Schölkopf, B., Platt, J. C., Shawe-Taylor, J., Smola, A. J., Williamson, R. C. 2001. Estimating the support of a high-dimensional distribution. Neural Computation, 13(7), 1443–1471.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">[7]	Handa, A., Sharma, A., Shukla, S. K. 2019. Machine learning in cybersecurity: a review. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 9(4), e1306.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">[8]	Adiban, M., Siniscalchi, S. M., Salvi, G. 2023. A step-by-step training method for multi-generator GANs with application to anomaly detection and cybersecurity. Neurocomputing, 537, 296–308.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">[9]	Goswami, M. 2024. AI-based anomaly detection for real-time cybersecurity. International Journal of Research and Review in Technology, 3(1), 45–53.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">[10]	Yaseen, A. 2023. The role of machine learning in network anomaly detection for cybersecurity. Sage Scientific Review of Applied Machine Learning, 6(8), 16–34.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">[11]	Alabadi, M., Çelik, Y. 2020. Anomaly detection for cyber-security based on convolution neural network: A survey. Uluslararası İnsan Bilgisayar Etkileşimi, Optimizasyon ve Robotik Uygulamaları Kongresi (HORA), IEEE, 1–14.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">[12]	Inuwa, M. M., Das, R. 2024. A comparative analysis of various machine learning methods for anomaly detection in cyber attacks on IoT networks. Internet of Things, 26, 101162.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">[13]	Hong, J., Liu, C. C., Govindarasu, M. 2014. Integrated anomaly detection for cyber security of the substations. IEEE Transactions on Smart Grid, 5(4), 1643–1653.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">[14]	Choppadandi, A., Kaur, J., Chenchala, P. K., Agarwal, A., Nakra, V., Pandian, P. K. G. 2021. Anomaly detection in cybersecurity: leveraging machine learning algorithms. ESP Journal of Engineering and Technology Advances, 1(2), 34–41.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">[15]	H. Kamal, M. Mashaly, “AE-DTNN: Autoencoder–Dense–Transformer Neural Network Model for Efficient Anomaly-Based Intrusion Detection Systems,” Machine Learning and Knowledge Extraction, vol. 7, no. 3, p. 78, 2025.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">[16]	N. Borgioli, F. Aromolo, L. T. X. Phan, G. Buttazzo, “A convolutional autoencoder architecture for robust network intrusion detection in embedded systems,” Journal of Systems Architecture, vol. 156, p. 103283, 2024.</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">[17]	Jia, W., Sun, M., Lian, J. ve diğerleri. 2022. Feature dimensionality reduction: a review. Complex &amp; Intelligent Systems, 8, 2663–2693.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">[18]	Liu, F. T., Ting, K. M., Zhou, Z. H. 2008. Isolation Forest. 2008 IEEE International Conference on Data Mining (ICDM), IEEE, Pisa, Italy, 15–19 Aralık 2008, 413–422.</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">[19]	Jolliffe, I. T., Cadima, J. 2016. Principal component analysis: a review and recent developments. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 374(2065), 20150202.</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">[20]	Scikit-learn developers. sklearn.neighbors.LocalOutlierFactor. https://scikit-learn.org/stable/modules/generated/sklearn.neighbors.LocalOutlierFactor.html (access date: 20.04.2025).</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">[21]	Tax, D. M. J., Duin, R. P. W. 2004. Support vector data description. Machine Learning, 54(1), 45–66.</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">[22]	Scikit-learn developers. sklearn.svm.OneClassSVM. https://scikit-learn.org/stable/modules/generated/sklearn.svm.OneClassSVM.html (access date: 20.04.2025).</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">[23]	Al Farizi, W. S., Hidayah, I., &amp; Rizal, M. N. (2021, September). Isolation forest based anomaly detection: A systematic literature review. In 2021 8th International Conference on Information Technology, Computer and Electrical Engineering (ICITACEE) (pp. 118-122). IEEE.</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">[24]	Saadah, B. (2025). ANOMALY DETECTION IN MNIST DATASET USING ONE-CLASS SVM. Jurnal Kecerdasan Buatan dan Teknologi Informasi, 4(3), 264-270.</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">[25]	Jolliffe, I. (2011). Principal component analysis. In International encyclopedia of statistical science (pp. 1094-1096). Springer, Berlin, Heidelberg.</mixed-citation>
                    </ref>
                                    <ref id="ref26">
                        <label>26</label>
                        <mixed-citation publication-type="journal">[26]	Almaiah, M. A., Almomani, O., Alsaaidah, A., Al-Otaibi, S., Bani-Hani, N., Hwaitat, A. K. A., ... &amp; Aldhyani, T. H. (2022). Performance investigation of principal component analysis for intrusion detection system using different support vector machine kernels. Electronics, 11(21), 3571.</mixed-citation>
                    </ref>
                                    <ref id="ref27">
                        <label>27</label>
                        <mixed-citation publication-type="journal">[27]	Aoufi, S., Derhab, A., &amp; Guerroumi, M. (2020). Survey of false data injection in smart power grid: Attacks, countermeasures and challenges. Journal of Information Security and Applications, 54, 102518.</mixed-citation>
                    </ref>
                                    <ref id="ref28">
                        <label>28</label>
                        <mixed-citation publication-type="journal">[28]	Ferrag, M.A., Maglaras, L., Moschoyiannis, S., &amp; Janicke, H. (2020). Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. Journal of Information Security and Applications, 50, 102419.</mixed-citation>
                    </ref>
                                    <ref id="ref29">
                        <label>29</label>
                        <mixed-citation publication-type="journal">[29]	Shone, N., Ngoc, T.N., Phai, V.D., &amp; Shi, Q. (2018). A deep learning approach to network intrusion detection. IEEE Transactions on Emerging Topics in Computational Intelligence, 2(1), 41–50.</mixed-citation>
                    </ref>
                                    <ref id="ref30">
                        <label>30</label>
                        <mixed-citation publication-type="journal">[30]	Vinayakumar, Vinayakumar, R., Alazab, M., Soman, K.P., Poornachandran, P., &amp; Venkatraman, S. (2019). Deep learning approach for intelligent intrusion detection system. IEEE Access, 7, 41525–41550.</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
