CFP last date
22 April 2024
Reseach Article

A Comprehensive Survey on Online Anomaly Detection

by Amol M. Pawar, Manisha S. Mahindrakar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 119 - Number 17
Year of Publication: 2015
Authors: Amol M. Pawar, Manisha S. Mahindrakar
10.5120/21162-4217

Amol M. Pawar, Manisha S. Mahindrakar . A Comprehensive Survey on Online Anomaly Detection. International Journal of Computer Applications. 119, 17 ( June 2015), 41-45. DOI=10.5120/21162-4217

@article{ 10.5120/21162-4217,
author = { Amol M. Pawar, Manisha S. Mahindrakar },
title = { A Comprehensive Survey on Online Anomaly Detection },
journal = { International Journal of Computer Applications },
issue_date = { June 2015 },
volume = { 119 },
number = { 17 },
month = { June },
year = { 2015 },
issn = { 0975-8887 },
pages = { 41-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume119/number17/21162-4217/ },
doi = { 10.5120/21162-4217 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:05:01.047616+05:30
%A Amol M. Pawar
%A Manisha S. Mahindrakar
%T A Comprehensive Survey on Online Anomaly Detection
%J International Journal of Computer Applications
%@ 0975-8887
%V 119
%N 17
%P 41-45
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Anomaly is a data point that does not follow to the normal points describing the data. Anomaly detection has vital applications in data cleaning and moreover in the mining of anomalous points for fraud recognition, intrusion detection, stock market analysis, customized marketing, system sensors, and email spam detection. Discovering anomalous points among the data points is the fundamental thought to find out an anomaly. Anomaly detection signals out the objects mostly deviating from a particular data set. The majorities of the anomaly detection techniques are normally implemented in batch mode, and so cannot be essentially reached out to large-scale problems without giving up the reckoning and memory requirements. To address this problem, existing online anomaly detection technique with oversampling and Principal Component Analysis (PCA), aim at identifying presence of anomalies from a big amount of data via an online updating technique. The oversampling strategy is used to duplicate the target instance and balance the data set and the PCA is used as a renowned unsupervised dimension reduction method, which determines the principal directions of the data distributions. Inspite of the duplication, the computation and memory requirement is reduced using an online updation technique. Thus present framework is ideal for online applications which have reckoning or memory restrictions.

References
  1. D. M. Hawkins, 1980 Identification of Outliers.
  2. V. Chandola, A. Banerjee, and V. Kumar, 2009 Anomaly Detection: A Survey.
  3. Yuh-Jye Lee, Yi-Ren Yeh, and Yu-Chiang Frank Wang, 2013 Anomaly Detection via Online Oversampling Principal Component Analysis.
  4. Nguyen Lu Dang Khoa, Sanjay Chawla, 2011 Online Anomaly Detection Systems Using Incremental Commute Time.
  5. H. -P. Kriegel, M. Schubert, and A. Zimek, 2008 Angle-Based Outlier Detection in High-Dimensional Data.
  6. F. Angiulli, S. Basta, and C. Pizzuti, 2006 Distance-Based Detection and Prediction of Outliers.
  7. Edwin M. Knox and Raymond T. Ng, 1998 Algorithms for Mining Distance-Based Outliers in Large Datasets.
  8. Christian Callegari, Loris Gazzarrini, Stefano Giordano, Michele Pagano, and Teresa Pepe, 2011 A novel PCA-based Network Anomaly Detection.
  9. Numenta White Paper, The Science of Anomaly Detection.
  10. Jiawei Han, Micheline Kamber, Data Mining: Concepts and Techniques.
Index Terms

Computer Science
Information Sciences

Keywords

Anomaly detection online updation technique oversampling principal component analysis unsupervised dimension reduction.