NOVEL METHODS FOR DETECTING ANOMALIES IN INFORMATION COMMUNICATION SYSTEMS

Authors

  • Sodiq Jumayev Denov tadbirkorlik va pedagogika instituti
  • Sherzod G‘ulomov

Keywords:

Anomaly detection, information communication systems, machine learning, deep learning, hybrid models, transfer learning, federated learning, explainable AI, real-time monitoring, cybersecurity.

Abstract

As the complexity of ICS increases, security concerns also grow. Anomalies may indicate failures or cyberattacks, making early detection crucial. Traditional statistical and threshold-based methods are ineffective in dynamic ICS environments. ML- and DL-based methods, including support vector machines, autoencoders, and recurrent neural networks, improve accuracy and adaptability. However, they often require high computational resources. Transfer learning, federated learning, and XAI help overcome these limitations. This study analyzes and compares traditional and emerging approaches.

References

Gjorgjievska Perusheska, Milena & Dimitrova, Vesna. (2023). Application of Machine Learning in Intrusion Detection Systems. 10.1007/978-3-031-37717-4_86.

Abu Musa, Tahani & Bouras, Abdelaziz. (2022). Anomaly Detection: A Survey. 10.1007/978-981-16-2102-4_36.

Zhang, Y., Wang, Z., & Jin, H. (2019) - Network Intrusion Detection Based on Improved DGA and VAE

Dey, Samrat & Rahman, Md. Mahbubur. (2018). Flow Based Anomaly Detection in Software Defined Networking: A Deep Learning Approach With Feature Selection Method. 630-635. 10.1109/CEEICT.2018.8628069.

Ali, Mohamed & Al-berry, Maryam & Taha, Zaki. (2021). Convolutional Autoencoder for Anomaly Detection in Crowded Scenes. 10.1007/978-3-030-76346-6_55.

Kopčan, Jaroslav & Skvarek, Ondrej & Klimo, Martin. (2021). Anomaly detection using Autoencoders and Deep Convolution Generative Adversarial Networks. Transportation Research Procedia. 55. 1296-1303. 10.1016/j.trpro.2021.07.113.

Vishwakarma, Pawan Kumar & Suyambu, Muthuvel. (2024). Data Analytics In Smart Grid With Renewable Energy Integration. 10. 1-10.

Xiao, Qingsai & Liu, Jian & Wang, Quiyun & Jiang, Zhengwei & Wang, Xuren & Yao, Yepeng. (2020). Towards Network Anomaly Detection Using Graph Embedding. 10.1007/978-3-030-50423-6_12.

Arqane, Aouatif & Boutkhoum, Omar & Boukhriss, Hicham & Moutaouakkil, Abdelmajid. (2022). Intrusion Detection System using Ensemble Learning Approaches: A Systematic Literature Review. International Journal of Online and Biomedical Engineering (iJOE). 18. 160-175. 10.3991/ijoe.v18i13.33519.

Shahriar, Md Hasan & Haque, Nur Imtiazul & Rahman, Mohammad & Alonso Jr, Miguel. (2020). G-IDS: Generative Adversarial Networks Assisted Intrusion Detection System. 10.48550/arXiv.2006.00676.

S. Aburakhia, T. Tayeh, R. Myers and A. Shami, "A Transfer Learning Framework for Anomaly Detection Using Model of Normality," 2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, Canada, 2020, pp. 0055-0061, doi: 10.1109/IEMCON51383.2020.9284916.

Rane, Jayesh & Mallick, Suraj & Kaya, Ömer & Rane, Nitin. (2024). Federated learning for edge artificial intelligence: Enhancing security, robustness, privacy, personalization, and blockchain integration in IoT. 10.70593/978-81-981271-0-5_3.

Sharma, Jeetesh & Mittal, Murari & Soni, Gunjan. (2023). Explainable artificial intelligence (XAI) enabled anomaly detection and fault classification of an industrial asset. 10.21203/rs.3.rs-2780708/v1.

Published

2025-03-23

How to Cite

Jumayev, S., & G‘ulomov , S. (2025). NOVEL METHODS FOR DETECTING ANOMALIES IN INFORMATION COMMUNICATION SYSTEMS. The Descendants of Al-Fargani, 1(1), 92–99. Retrieved from https://al-fargoniy.uz/index.php/journal/article/view/787