Skip to main content

Performance Comparison of Anomaly Detection Algorithms

  • Conference paper
  • First Online:
Inventive Communication and Computational Technologies

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 311))

Abstract

In several studies, machine learning techniques that are repossessed in intrusion detection systems wangle wide-ranging acknowledgment by changing into a high-yielding domain and continues to be the main target of the researcher's vast significance. After several years of study, the intrusion detection community still faces difficult issues. During the process of detecting unexpected new attacks, reducing the high rate of false alarms remains an unanswered problem. Identification of anomalies is a key problem in malware detection in which the existence of planned or unintentional caused assaults, defects elsewhere is demonstrated by disturbances of normal conduct. This paper offers a top-level view of analysis directions for the utilization of tagged and untagged information to handle the difficulty of the identification of anomalies. By performance comparison of the available semi-supervised and unsupervised algorithms, you can select the best anomaly detection algorithm. The documented references would cowl the most theoretical issues, leading the researcher in new ways for study.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. F. Angiulli, R. Ben-Eliyahu-Zohary, L. Palopoli, Outlier Detection Using Default Logic (2003)

    Google Scholar 

  2. P.D.L. Ertöz, E. Eilertson, A. Lazarevic, P.-N. Tan, V. Kumar, J. Srivastava.: Minds-Minnesota Intrusion Detection System (Next Gener. MIT Press, 2004)

    Google Scholar 

  3. C. Mishra, T. Bagyammal, L. Parameswaran, An algorithm design for anomaly detection in thermal images, in innovations in electrical and electronic engineering, in ed. by M.N. Favorskaya, Mekhilef, S., Pandey, R. Kumar, N. Singh (Singapore: Springer Singapore, 2021)

    Google Scholar 

  4. X. Niu, L. Wang, X. Yang, A comparison study of credit card fraud detection: supervised versus unsupervised, arXiv Preprint arXiv:1904.10604 (2019)

  5. F. Carcillo, et al.: Combining unsupervised and supervised learning in credit card fraud detection. Inf. Sci. (2019)

    Google Scholar 

  6. A. Srivastava et al., Credit card fraud detection using hidden Markov model. IEEE Trans. Dependable Secure Comput. 5(1), 37–48 (2008)

    Article  Google Scholar 

  7. A. Malathi, J. Amudha, P. Narayana, A Prototype to Detect Anomalies Using Machine Learning Algorithms and Deep Neural Network, Lecture Notes in Computational Vision and Biomechanics, vol. 28 (Springer Netherlands, 2018), pp. 1084–1094

    Google Scholar 

  8. T. Shon, J. Moon, A hybrid machine learning approach to network anomaly detection. Inf. Sci. 177(18), 3799–3821 (2007)

    Google Scholar 

  9. Y. Tian et al., Ramp loss one-class support vector machine: a robust and effective approach to anomaly detection problems. Neurocomputing 310, 223–235 (2018)

    Article  Google Scholar 

  10. S. Bhattacharyya et al., Data mining for credit card fraud: a comparative study. Decis. Supp. Syst. 50(3), 602–613 (2011)

    Google Scholar 

  11. M. Hejazi, Y.P. Singh., One-class support vector machines approach to anomaly detection. Appl. Artif. Intell. 27(5), 351–366 (2013)

    Google Scholar 

  12. C. Fan et al., Analytical investigation of autoencoder-based methods for unsupervised anomaly detection in building energy data. Appl. Energy 211, 1123–1135 (2018)

    Article  Google Scholar 

  13. T. Sweers, T. Heskes, J. Krijthe, Autoencoding Credit Card Fraud (2018)

    Google Scholar 

  14. P. Filzmoser, R.G. Garrett, C. Reimann, Multivariate outlier detection in exploration geochemistry. Comput. Geosci. 31(5), 579–587 (2005)

    Google Scholar 

  15. F.R. Hampel et al., Robust statistics: the approach based on influence functions, 2011196

    Google Scholar 

  16. P. Filzmoser, K. Hron, C. Reimann, Interpretation of multivariate outliers for compositional data. Comput. Geosci. 39, 77–85 (2012)

    Google Scholar 

  17. S. Hochreiter, J. Schmidhuber, Long short-term memory. Neural. Comput. 9, 1735–1780 (1997)

    Article  Google Scholar 

  18. A. Ashok, S. Smitha, M.H.K. Krishna, Attribute reduction based anomaly detection scheme by clustering dependent oversampling PCA, in 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1298–1304 (2016). https://doi.org/10.1109/ICACCI.2016.7732226

  19. M.M. Breunig, H.-P. Kriegel, R.T. Ng, J. Sander, Lof: Identifying density-based local outliers, in Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data ed by W. Chen, J. F. Naughton, P. A. Bernstein May 16–18(Dallas, Texas, USA, ACM, 2000), pp. 93–104

    Google Scholar 

  20. H. Yong-xu, D. Lei, Q. Jiang-long et al., Parallel detection design based on isolation forest. J. Comput. Engi. Sci. 39(2), 236–244 (2017)

    Google Scholar 

  21. K. Kavikuil, J. Amudha, Leveraging deep learning for anomaly detection in video surveillance. Adv. Intell. Syst. Comput. 815, 239–247 (2019) (Springer Verlag)

    Google Scholar 

  22. R. Vinayakumar, K.P. Soman, P. Poornachandran, Long short-term memory based operation log anomaly detection, in 2017 International Conference on Advances in Computing, Communications, and Informatics (ICACCI)

    Google Scholar 

  23. G.R. Ramya, P. Sivakumar, An incremental learning temporal influence model for identifying topical influencers on Twitter dataset. Soc. Netw. Anal. Min. 11 (2021) https://doi.org/10.1007/s13278-021-00732-4

  24. A. Anandharaj, P.B. Sivakumar, Anomaly detection in time series data using hierarchical temporal memory model, in 2019 3rd International Conference on Electronics, Communication, and Aerospace Technology (ICECA), pp. 1287–1292 (2019). https://doi.org/10.1109/ICECA.2019.8821966

  25. J. Van Hulse, T.M. Khoshgoftaar, A. Napolitano, Experimental perspectives on learning from imbalanced data, in Proceedings of the 24th International Conference on Machine Learning (2007)

    Google Scholar 

  26. M. Krivko, A hybrid model for plastic card fraud detection systems. Expert Syst. Appl. 37(8), 6070–6076 (2010)

    Google Scholar 

  27. T. Garcıa, V. Dıaz, F. Macia, Vazquez, Anomaly-based network intrusion detection. Comput. Secur. 28, 18–28 (2009)

    Google Scholar 

  28. T. Vijayakumar, Posed inverse problem rectification using novel deep convolutional neural network. J. Innovat. Image Proc. (JIIP) 2(03), 121–127 (2020)

    Article  Google Scholar 

  29. H. Wang, Sustainable development and management in consumer electronics using soft computation. J. Soft Comput. Parad. (JSCP) 1(01), 56 (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Maya Manish Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Manish Kumar, M., Ramya, G.R. (2022). Performance Comparison of Anomaly Detection Algorithms. In: Ranganathan, G., Fernando, X., Shi, F. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 311. Springer, Singapore. https://doi.org/10.1007/978-981-16-5529-6_58

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-5529-6_58

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-5528-9

  • Online ISBN: 978-981-16-5529-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics