no code implementations • 2 Mar 2023 • Yair Meidan, Dan Avraham, Hanan Libhaber, Asaf Shabtai
To overcome this, we propose a two-step collaborative anomaly detection method which first uses an autoencoder to differentiate frequent (`benign') and infrequent (possibly `malicious') traffic flows.