2020
DOI: 10.1007/978-3-030-58811-3_2
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly Detection for Data Streams Based on Isolation Forest Using Scikit-Multiflow

Abstract: Detecting anomalies in streaming data is an important issue in a variety of real-word applications as it provides some critical information, e.g., Cyber security attacks, Fraud detection or others real-time applications. Different approaches have been designed in order to detect anomalies: statistics-based, isolation-based, clustering-based. In this paper, we present a quick survey of the existing anomaly detection methods for data streams. We focus on Isolation Forest (iForest), a state-of-theart method for a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
12
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(13 citation statements)
references
References 24 publications
1
12
0
Order By: Relevance
“…The major downside of online methods in general, especially unsupervised methods compared to their batch opponents, is the poorer performance when it comes to classifying abnormal and normal data instances. However, we strongly support the hypothesis in [11], when considering critical streaming applications as for detecting network-based malicious activity, a fast model, even with less accuracy, is preferred. However, applying FS shall at least improve the classification performance of OD methods [R-FS05].…”
Section: Requirements With Respect To Feature Selection For Outlier Detection On Streaming Datasupporting
confidence: 68%
“…The major downside of online methods in general, especially unsupervised methods compared to their batch opponents, is the poorer performance when it comes to classifying abnormal and normal data instances. However, we strongly support the hypothesis in [11], when considering critical streaming applications as for detecting network-based malicious activity, a fast model, even with less accuracy, is preferred. However, applying FS shall at least improve the classification performance of OD methods [R-FS05].…”
Section: Requirements With Respect To Feature Selection For Outlier Detection On Streaming Datasupporting
confidence: 68%
“…Furthermore, for the sake of reducing the impact of FP, the pruning algorithm might also filter out single-stage attacks. We deem this step as critical since we support and transfer the statement in [7] for OD-based alert correlation that, especially for critical streaming applications, it is more important not to miss critical TP anomalies forming a single-stage attack while accepting a certain rate of FP.…”
Section: Delimitation From Soaaprmentioning
confidence: 91%
“…, which is often used as a metric on imbalanced data [7]. The effects of FPs and FNs on the clustering result are exemplarily discussed for the Bot attack scenario for which both SOAAPR and GAC achieved good results, and the number of alerts is more meaningful compared to Infiltration.…”
Section: Soaapr Clusteringmentioning
confidence: 99%
See 1 more Smart Citation
“…In our approach we proposed to use ML based algorithm that firstly learns how analyzed metrics behave in normal state and then is able to find anomaly behavior of time series. We tested 3 different algorithms with different parameters [4][5] [6]. The purpose of the algorithm is to load data from metrics in order to detect anomalies.…”
Section: Metrics Anomaly Detectionmentioning
confidence: 99%