A Systematic Review on Anomaly Detection
-
Published:2023-03-20
Issue:
Volume:
Page:75-82
-
ISSN:2581-9429
-
Container-title:International Journal of Advanced Research in Science, Communication and Technology
-
language:en
-
Short-container-title:IJARSCT
Author:
Jaiprakash Prajapati 1, Prof. Nilesh Choudhary 1
Affiliation:
1. Godavari College of Engineering, Jalgaon, Maharashtra, India
Abstract
Anomaly detection has been used for many years to perceive and extract anomalous points from data. This is an important question that has been explored in various research areas and application domains. Many anomaly detection techniques are specifically designed for specific application domains, while others are more general. Many data science strategies had been used to come across anomalies. One widely used technique is deep machine learning, which play an important role in this field. This research paper provides a systematic literature review analysing ML models for detecting anomalies. Our review analyses the models from four perspectives: the Problem nature and challenges, Classification and formulation, Review of past work, and the future opportunities. When applying a given technique to a particular domain, these assumptions can be used as guidelines to assess the effectiveness of the technique in that domain. We also discuss the computational complexity of the technique, as this is an important issue in real application domains. We hope that this paper will provide a better understanding of the different directions in which research has been done on this topic, and how techniques developed in one area can be applied in domains for which they were not intended to begin with.
Publisher
Naksh Solutions
Reference41 articles.
1. V. Chandola, A. Banerjee, and V. Kumar, “Anomaly Detection : A Survey,” ACM Comput. Surv., vol. 41, no. 3, pp. 71–97, 2009, doi: 10.1145/1541880.1541882. 2. R. A. Ariyaluran Habeeb, F. Nasaruddin, A. Gani, I. A. Targio Hashem, E. Ahmed, and M. Imran, “Real-time big data processing for anomaly detection: A Survey,” Int. J. Inf. Manage., vol. 45, no. February, pp. 289–307, 2019, doi: 10.1016/j.ijinfomgt.2018.08.006. 3. V. Chandola, A. Banerjee, and V. Kumar, “Anomaly Detection for Discrete Sequences: A Survey,” IEEE Trans. Knowl. Data Eng., vol. 24, no. 5, pp. 1–16, 2012. 4. Y. Yu, “A survey of anomaly intrusion detection techniques,” J. Comput. Sci. Coll., pp. 9–17, 2012, [Online]. Available: http://dl.acm.org/citation.cfm?id=2379707. 5. C. F. Tsai, Y. F. Hsu, C. Y. Lin, and W. Y. Lin, “Intrusion detection by machine learning: A review,” Expert Syst. Appl.,vol. 36, no. 10, pp. 11994–12000, 2009, doi: 10.1016/j.eswa.2009.05.029.
|
|