Skip to main content

Machine Learning Techniques for Anomaly Detection Application Domains

  • Chapter
  • First Online:
Paradigms of Smart and Intelligent Communication, 5G and Beyond

Part of the book series: Transactions on Computer Systems and Networks ((TCSN))

  • 237 Accesses

Abstract

Anomaly detection is a popular research topic these days since it influences a wide scope of uses. A variety of strategies for detecting abnormalities in various domains have been developed. The most appropriate anomaly detection technique depends on the problem characteristics and problem domain, which is why this chapter focuses on extremely common strategies for recognizing abnormalities in many application areas, namely machine learning techniques. These strategies try to make a system intelligent, allowing it to adopt new things from data sets and readily classify important information from abnormalities. This chapter also addresses the benefits and drawbacks of machine learning approaches, as well as the different types of anomaly detection applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Augusteijn MF, Folkert B (2002) Neural network classification and novelty detection. Int J Remote Sens 23(14):2891–2902

    Article  Google Scholar 

  • Chawla NV, Japkowicz N, Kotcz A (2004) Editorial: special issue on learning from imbalanced data sets. ACM SIGKDD Explor Newsl 6(1):1–6

    Article  Google Scholar 

  • Hofmeyr SA, Forrest S, Somayaji A (1998) Intrusion detection using sequences of system calls. J Comput Secur 6(3):151–180

    Article  Google Scholar 

  • Lane T, Brodley CE (1999) Temporal sequence learning and data reduction for anomaly detection. ACM Trans Inf Syst Secur 2(3):295–331

    Article  Google Scholar 

  • Ming YS (2011) Real time anomaly detection systems for denial of service attacks by weighted k-nearest-neighbor classifiers. Expert Syst Appl 38(4):13492–13498

    Google Scholar 

  • Moore AW, Zuev D (2005) Internet traffic classification using bayesian analysis techniques. In: Proceedings of the ACM SIGMETRICS international conference on Measurement and modeling of computer systems, New York, United States, June 2005

    Google Scholar 

  • Mukkamala S, Sung AH, Ribeiro BM (2005) Model selection for Kernel based intrusion detection systems. In: Proceedings of the international conference in Coimbra, Portugal (2005)

    Google Scholar 

  • Peddabachigari S, Abraham A, Grosan C, Thomas J (2007) Modeling intrusion detection system using hybrid intelligent systems. J Netw Comput ApPl 30(1):114–132

    Article  Google Scholar 

  • Phoha VV (2002) Internet security dictionary. Springer

    MATH  Google Scholar 

  • Tan PN, Steinbach M, Karpatne A, Kumar V(2005) Introduction to data mining, 2nd edn. Pearson Addison-Wesley

    Google Scholar 

  • Theiler J, Cai DM (2003) Resampling approach for anomaly detection in multispectral images. In: Proceedings of SPIE 5093, Orlando, Florida, United States 2003

    Google Scholar 

  • Vapnik VN (1998) Statistical learning theory. Wiley, New York

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Reshu Agarwal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Chaudhary, A., Agarwal, R. (2023). Machine Learning Techniques for Anomaly Detection Application Domains. In: Rai, A., Kumar Singh, D., Sehgal, A., Cengiz, K. (eds) Paradigms of Smart and Intelligent Communication, 5G and Beyond. Transactions on Computer Systems and Networks. Springer, Singapore. https://doi.org/10.1007/978-981-99-0109-8_8

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-0109-8_8

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-0108-1

  • Online ISBN: 978-981-99-0109-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics