2020
DOI: 10.1007/978-981-15-0146-3_76
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly Detection Techniques in Data Mining—A Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…While, anomaly-based detection techniques, seek to identify abnormalities in network traffic or system behaviour that could indicate the existence of malicious activity [72]. The anomalies could be created due to many factors, such as noise or phenomena that has a certain probability of being happened by certain conditions, which threatens the confidentiality, availability, and integration of data for an organization [73,74]. Therefore, anomalies are unusual behaviours triggered by a person/object that leave footsteps in the computing environment [75].…”
Section: Cyber Securitymentioning
confidence: 99%
“…While, anomaly-based detection techniques, seek to identify abnormalities in network traffic or system behaviour that could indicate the existence of malicious activity [72]. The anomalies could be created due to many factors, such as noise or phenomena that has a certain probability of being happened by certain conditions, which threatens the confidentiality, availability, and integration of data for an organization [73,74]. Therefore, anomalies are unusual behaviours triggered by a person/object that leave footsteps in the computing environment [75].…”
Section: Cyber Securitymentioning
confidence: 99%