Abstract
In several studies, machine learning techniques that are repossessed in intrusion detection systems wangle wide-ranging acknowledgment by changing into a high-yielding domain and continues to be the main target of the researcher's vast significance. After several years of study, the intrusion detection community still faces difficult issues. During the process of detecting unexpected new attacks, reducing the high rate of false alarms remains an unanswered problem. Identification of anomalies is a key problem in malware detection in which the existence of planned or unintentional caused assaults, defects elsewhere is demonstrated by disturbances of normal conduct. This paper offers a top-level view of analysis directions for the utilization of tagged and untagged information to handle the difficulty of the identification of anomalies. By performance comparison of the available semi-supervised and unsupervised algorithms, you can select the best anomaly detection algorithm. The documented references would cowl the most theoretical issues, leading the researcher in new ways for study.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
F. Angiulli, R. Ben-Eliyahu-Zohary, L. Palopoli, Outlier Detection Using Default Logic (2003)
P.D.L. Ertöz, E. Eilertson, A. Lazarevic, P.-N. Tan, V. Kumar, J. Srivastava.: Minds-Minnesota Intrusion Detection System (Next Gener. MIT Press, 2004)
C. Mishra, T. Bagyammal, L. Parameswaran, An algorithm design for anomaly detection in thermal images, in innovations in electrical and electronic engineering, in ed. by M.N. Favorskaya, Mekhilef, S., Pandey, R. Kumar, N. Singh (Singapore: Springer Singapore, 2021)
X. Niu, L. Wang, X. Yang, A comparison study of credit card fraud detection: supervised versus unsupervised, arXiv Preprint arXiv:1904.10604 (2019)
F. Carcillo, et al.: Combining unsupervised and supervised learning in credit card fraud detection. Inf. Sci. (2019)
A. Srivastava et al., Credit card fraud detection using hidden Markov model. IEEE Trans. Dependable Secure Comput. 5(1), 37–48 (2008)
A. Malathi, J. Amudha, P. Narayana, A Prototype to Detect Anomalies Using Machine Learning Algorithms and Deep Neural Network, Lecture Notes in Computational Vision and Biomechanics, vol. 28 (Springer Netherlands, 2018), pp. 1084–1094
T. Shon, J. Moon, A hybrid machine learning approach to network anomaly detection. Inf. Sci. 177(18), 3799–3821 (2007)
Y. Tian et al., Ramp loss one-class support vector machine: a robust and effective approach to anomaly detection problems. Neurocomputing 310, 223–235 (2018)
S. Bhattacharyya et al., Data mining for credit card fraud: a comparative study. Decis. Supp. Syst. 50(3), 602–613 (2011)
M. Hejazi, Y.P. Singh., One-class support vector machines approach to anomaly detection. Appl. Artif. Intell. 27(5), 351–366 (2013)
C. Fan et al., Analytical investigation of autoencoder-based methods for unsupervised anomaly detection in building energy data. Appl. Energy 211, 1123–1135 (2018)
T. Sweers, T. Heskes, J. Krijthe, Autoencoding Credit Card Fraud (2018)
P. Filzmoser, R.G. Garrett, C. Reimann, Multivariate outlier detection in exploration geochemistry. Comput. Geosci. 31(5), 579–587 (2005)
F.R. Hampel et al., Robust statistics: the approach based on influence functions, 2011196
P. Filzmoser, K. Hron, C. Reimann, Interpretation of multivariate outliers for compositional data. Comput. Geosci. 39, 77–85 (2012)
S. Hochreiter, J. Schmidhuber, Long short-term memory. Neural. Comput. 9, 1735–1780 (1997)
A. Ashok, S. Smitha, M.H.K. Krishna, Attribute reduction based anomaly detection scheme by clustering dependent oversampling PCA, in 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1298–1304 (2016). https://doi.org/10.1109/ICACCI.2016.7732226
M.M. Breunig, H.-P. Kriegel, R.T. Ng, J. Sander, Lof: Identifying density-based local outliers, in Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data ed by W. Chen, J. F. Naughton, P. A. Bernstein May 16–18(Dallas, Texas, USA, ACM, 2000), pp. 93–104
H. Yong-xu, D. Lei, Q. Jiang-long et al., Parallel detection design based on isolation forest. J. Comput. Engi. Sci. 39(2), 236–244 (2017)
K. Kavikuil, J. Amudha, Leveraging deep learning for anomaly detection in video surveillance. Adv. Intell. Syst. Comput. 815, 239–247 (2019) (Springer Verlag)
R. Vinayakumar, K.P. Soman, P. Poornachandran, Long short-term memory based operation log anomaly detection, in 2017 International Conference on Advances in Computing, Communications, and Informatics (ICACCI)
G.R. Ramya, P. Sivakumar, An incremental learning temporal influence model for identifying topical influencers on Twitter dataset. Soc. Netw. Anal. Min. 11 (2021) https://doi.org/10.1007/s13278-021-00732-4
A. Anandharaj, P.B. Sivakumar, Anomaly detection in time series data using hierarchical temporal memory model, in 2019 3rd International Conference on Electronics, Communication, and Aerospace Technology (ICECA), pp. 1287–1292 (2019). https://doi.org/10.1109/ICECA.2019.8821966
J. Van Hulse, T.M. Khoshgoftaar, A. Napolitano, Experimental perspectives on learning from imbalanced data, in Proceedings of the 24th International Conference on Machine Learning (2007)
M. Krivko, A hybrid model for plastic card fraud detection systems. Expert Syst. Appl. 37(8), 6070–6076 (2010)
T. Garcıa, V. Dıaz, F. Macia, Vazquez, Anomaly-based network intrusion detection. Comput. Secur. 28, 18–28 (2009)
T. Vijayakumar, Posed inverse problem rectification using novel deep convolutional neural network. J. Innovat. Image Proc. (JIIP) 2(03), 121–127 (2020)
H. Wang, Sustainable development and management in consumer electronics using soft computation. J. Soft Comput. Parad. (JSCP) 1(01), 56 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Manish Kumar, M., Ramya, G.R. (2022). Performance Comparison of Anomaly Detection Algorithms. In: Ranganathan, G., Fernando, X., Shi, F. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 311. Springer, Singapore. https://doi.org/10.1007/978-981-16-5529-6_58
Download citation
DOI: https://doi.org/10.1007/978-981-16-5529-6_58
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-5528-9
Online ISBN: 978-981-16-5529-6
eBook Packages: EngineeringEngineering (R0)