Analyzing Temporal Dependency Structures in Cyber security: A Case Study of Network Traffic Anomalies
DOI:
https://doi.org/10.54536/ajdsai.v2i1.5081Keywords:
Cyber Security, Network Monitoring, Networks Metrics, Time Series Analysis, Traffic DataAbstract
This research dives deep into the intricate world of temporal dependency structures found in network traffic data, specifically for cybersecurity applications. Investigation of how understanding the timing and relationships between various network metrics can significantly boost our ability to detect anomalies in cyber security systems were carried out. By employing advanced multivariate time series analysis techniques like Vector Auto regression (VAR), Dynamic Bayesian Networks (DBNs), and cutting-edge deep learning methods, which show that taking these temporal dependencies into account leads to a marked improvement in spotting sophisticated attacks, especially when compared to traditional univariate approaches. The ensemble model boasts an impressive 94.3% precision and 91.7% recall in identifying network anomalies across a range of attack vectors, such as distributed denial-of-service (DDoS) attacks, port scanning activities, and data exfiltration attempts. These findings highlight that grasping the complex temporal relationships among network metrics offers vital insights into network behavior patterns, which can be harnessed to create more resilient cyber security monitoring systems.
References
Ahmed, M., Naser Mahmood, A., & Hu, J. (2016). A survey of network anomaly detection techniques. Journal of Network and Computer Applications, 60, 19-31. https://doi.org/10.1016/j.jnca.2015.11.016
Ajimatanrareje1, G.A., Ekeh, C., Igwilo, S. and Osunkwo,C. (2025). The Current Landscape of AI Application in Healthcare: A Review. American Journal of Innovative Science and Engineering (AJISE), 4(2) 1-16. https://doi.org/10.54536/ajise.v4i2.4432
Bereziński, P., Jasiul, B., & Szpyrka, M. (2015). An entropy-based network anomaly detection method. Entropy, 17, 2367-2408. https://doi.org/10.3390/e17042367
Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18, 1153-1176.
Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM Computing Surveys, 41, 1-58. https://doi.org/10.1145/1541880.1541882
Garcia-Teodoro, P., Diaz-Verdejo, J., Maciá-Fernández, G., & Vázquez, E. (2009). Anomaly-based network intrusion detection. Techniques, systems and challenges- Computers & Security, 28, 18-28. https://doi.org/10.1016/j.cose.2008.08.003
Granger, C. W. J. (1969). Investigating causal relations by econometric models and cross-spectral methods. Econometrica, 37, 424-438.
Jin, S., Yeung, D. S., & Wang, X. (2017). Network intrusion detection using improved negative selection algorithm and Granger causality test. Journal of Network and Computer Applications, 82, 135-148.
Khan, P., Islam, M. Z., & Hossain, S. (2025). AI-Powered Cybersecurity: Revolutionizing Business Threat Detection and Response. American Journal of Smart Technology and Solutions, 4(1), 37–48. https://doi.org/10.54536/ajsts.v4i1.4488
Lai, G., Chang, W. C., Yang, Y., & Liu, H. (2018). Modeling long- and short-term temporal patterns with deep neural networks. In Proceedings of the 41st International ACM SIGIR Conference on Research & Development in Information Retrieval (pp. 95-104).
Nychis, G., Sekar, V., Andersen, D. G., Kim, H., & Zhang, H. (2008). An empirical evaluation of entropy-based traffic anomaly detection. Proceedings of the 8th ACM SIGCOMM Conference on Internet Measurement, 151-156.
Radford, B. J., Apolonio, L. M., Trias, A. J., & Simpson, J. A. (2018). Network traffic anomaly detection using recurrent neural networks. arXiv preprint arXiv, 1803.10769. https://arxiv.org/abs/1803.10769
Sims, C. A. (1980). Macroeconomics and reality. Econometric, 48, 1-48.
Siris, V. A., & Papagalou, F. (2006). Application of anomaly detection algorithms for detecting SYN flooding attacks. Computer Communications, 29, 1433-1442.
Sommer, R., & Paxson, V. (2010). Outside the closed world: On using machine learning for network intrusion detection. IEEE Symposium on Security and Privacy, 305-316.
Tulla, H.B. Md, Mahbub,M., Rhaman, N. MD., Midul, M., Sany, R. (2025) Leveraging Machine Learning for IoT Traffic Analysis: Enhancing Privacy and Detecting Malicious Behavior. American Journal of Smart Technology and Solutions (AJISE), 4(2), 31-40. https://doi.org/10.54536/ajise.v4i2.4439
Umer, M. F., Sher, M., & Bi, Y. (2018). Flow-based intrusion detection. Techniques and challenges. Computers & Security. 70, 238-254. http://dx.doi.org/10.1016/j.cose.2017.05.009
Yuan, X., Li, C., & Li, X. Deep Defense: Identifying DDoS attack via deep learning. In 2020 IEEE International Conference on Smart Computing (SMARTCOMP) (2020), (pp. 375-380).
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Chioma C. Howard, Firstman N. Otobo, Eyinanabo Odogu

This work is licensed under a Creative Commons Attribution 4.0 International License.