NOVEL METHODS FOR DETECTING ANOMALIES IN INFORMATION COMMUNICATION SYSTEMS
Keywords:
Anomaly detection, information communication systems, machine learning, deep learning, hybrid models, transfer learning, federated learning, explainable AI, real-time monitoring, cybersecurity.Abstract
As the complexity of ICS increases, security concerns also grow. Anomalies may indicate failures or cyberattacks, making early detection crucial. Traditional statistical and threshold-based methods are ineffective in dynamic ICS environments. ML- and DL-based methods, including support vector machines, autoencoders, and recurrent neural networks, improve accuracy and adaptability. However, they often require high computational resources. Transfer learning, federated learning, and XAI help overcome these limitations. This study analyzes and compares traditional and emerging approaches.
References
Gjorgjievska Perusheska, Milena & Dimitrova, Vesna. (2023). Application of Machine Learning in Intrusion Detection Systems. 10.1007/978-3-031-37717-4_86.
Abu Musa, Tahani & Bouras, Abdelaziz. (2022). Anomaly Detection: A Survey. 10.1007/978-981-16-2102-4_36.
Zhang, Y., Wang, Z., & Jin, H. (2019) - Network Intrusion Detection Based on Improved DGA and VAE
Dey, Samrat & Rahman, Md. Mahbubur. (2018). Flow Based Anomaly Detection in Software Defined Networking: A Deep Learning Approach With Feature Selection Method. 630-635. 10.1109/CEEICT.2018.8628069.
Ali, Mohamed & Al-berry, Maryam & Taha, Zaki. (2021). Convolutional Autoencoder for Anomaly Detection in Crowded Scenes. 10.1007/978-3-030-76346-6_55.
Kopčan, Jaroslav & Skvarek, Ondrej & Klimo, Martin. (2021). Anomaly detection using Autoencoders and Deep Convolution Generative Adversarial Networks. Transportation Research Procedia. 55. 1296-1303. 10.1016/j.trpro.2021.07.113.
Vishwakarma, Pawan Kumar & Suyambu, Muthuvel. (2024). Data Analytics In Smart Grid With Renewable Energy Integration. 10. 1-10.
Xiao, Qingsai & Liu, Jian & Wang, Quiyun & Jiang, Zhengwei & Wang, Xuren & Yao, Yepeng. (2020). Towards Network Anomaly Detection Using Graph Embedding. 10.1007/978-3-030-50423-6_12.
Arqane, Aouatif & Boutkhoum, Omar & Boukhriss, Hicham & Moutaouakkil, Abdelmajid. (2022). Intrusion Detection System using Ensemble Learning Approaches: A Systematic Literature Review. International Journal of Online and Biomedical Engineering (iJOE). 18. 160-175. 10.3991/ijoe.v18i13.33519.
Shahriar, Md Hasan & Haque, Nur Imtiazul & Rahman, Mohammad & Alonso Jr, Miguel. (2020). G-IDS: Generative Adversarial Networks Assisted Intrusion Detection System. 10.48550/arXiv.2006.00676.
S. Aburakhia, T. Tayeh, R. Myers and A. Shami, "A Transfer Learning Framework for Anomaly Detection Using Model of Normality," 2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, Canada, 2020, pp. 0055-0061, doi: 10.1109/IEMCON51383.2020.9284916.
Rane, Jayesh & Mallick, Suraj & Kaya, Ömer & Rane, Nitin. (2024). Federated learning for edge artificial intelligence: Enhancing security, robustness, privacy, personalization, and blockchain integration in IoT. 10.70593/978-81-981271-0-5_3.
Sharma, Jeetesh & Mittal, Murari & Soni, Gunjan. (2023). Explainable artificial intelligence (XAI) enabled anomaly detection and fault classification of an industrial asset. 10.21203/rs.3.rs-2780708/v1.
Additional Files
Published
How to Cite
Issue
Section
Categories
License
Copyright (c) 2025 Sodiq Jumayev, Sherzod G‘ulomov

This work is licensed under a Creative Commons Attribution 4.0 International License.