2019
DOI: 10.1016/j.ijinfomgt.2018.08.006
|View full text |Cite
|
Sign up to set email alerts
|

Real-time big data processing for anomaly detection: A Survey

Abstract: The advent of connected devices and omnipresence of Internet have paved way for intruders to attack networks, which leads to cyber-attack, financial loss, information theft in healthcare, and cyber war. Hence, network security analytics has become an important area of concern and has gained intensive attention among researchers, off late, specifically in the domain of anomaly detection in network, which is considered crucial for network security. However, preliminary investigations have revealed that the exist… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
52
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
10

Relationship

2
8

Authors

Journals

citations
Cited by 275 publications
(52 citation statements)
references
References 88 publications
(129 reference statements)
0
52
0
Order By: Relevance
“…Authors in [21] presented the status of empirical research and application areas in big data by employing a systematic mapping method. In the same vein, authors in [22] also conducted a survey on big data technologies and machine learning algorithms with a particular focus on anomaly detection. A systematic review of literature which aims to determine the scope, application, and challenges of big data analytics in healthcare was presented by [23].…”
Section: Related Workmentioning
confidence: 99%
“…Authors in [21] presented the status of empirical research and application areas in big data by employing a systematic mapping method. In the same vein, authors in [22] also conducted a survey on big data technologies and machine learning algorithms with a particular focus on anomaly detection. A systematic review of literature which aims to determine the scope, application, and challenges of big data analytics in healthcare was presented by [23].…”
Section: Related Workmentioning
confidence: 99%
“…Several applications provide insights for data security, e.g. the recent papers on botnet traffic [14], data stream of network infections [15], physical intrusions in building [16]. Safety applications of anomaly detection are not common: some researches forecast specific hazards, e.g.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Several methods for anomaly detection have been presented in literature, some of most popular anomaly detection are SVM, Replicator neural networks, correlation-based detection, density-based techniques (k-nearest neighbor, local outlier factor), deviations from association rules and ensemble techniques (using feature bagging or score normalization). Output of anomaly detection system could be score or label [93]. Score (commonly used for unsupervised or semi-supervised) is a ranked list of anomalies that are assigned to each instance depending on the degree to which instance is considered anomaly whereas labeling (used for supervised) are binary output (anomaly or not) ( Fig.…”
Section: Anomaly Detectionmentioning
confidence: 99%