Abstract
Anomaly detection is a popular research topic these days since it influences a wide scope of uses. A variety of strategies for detecting abnormalities in various domains have been developed. The most appropriate anomaly detection technique depends on the problem characteristics and problem domain, which is why this chapter focuses on extremely common strategies for recognizing abnormalities in many application areas, namely machine learning techniques. These strategies try to make a system intelligent, allowing it to adopt new things from data sets and readily classify important information from abnormalities. This chapter also addresses the benefits and drawbacks of machine learning approaches, as well as the different types of anomaly detection applications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Augusteijn MF, Folkert B (2002) Neural network classification and novelty detection. Int J Remote Sens 23(14):2891–2902
Chawla NV, Japkowicz N, Kotcz A (2004) Editorial: special issue on learning from imbalanced data sets. ACM SIGKDD Explor Newsl 6(1):1–6
Hofmeyr SA, Forrest S, Somayaji A (1998) Intrusion detection using sequences of system calls. J Comput Secur 6(3):151–180
Lane T, Brodley CE (1999) Temporal sequence learning and data reduction for anomaly detection. ACM Trans Inf Syst Secur 2(3):295–331
Ming YS (2011) Real time anomaly detection systems for denial of service attacks by weighted k-nearest-neighbor classifiers. Expert Syst Appl 38(4):13492–13498
Moore AW, Zuev D (2005) Internet traffic classification using bayesian analysis techniques. In: Proceedings of the ACM SIGMETRICS international conference on Measurement and modeling of computer systems, New York, United States, June 2005
Mukkamala S, Sung AH, Ribeiro BM (2005) Model selection for Kernel based intrusion detection systems. In: Proceedings of the international conference in Coimbra, Portugal (2005)
Peddabachigari S, Abraham A, Grosan C, Thomas J (2007) Modeling intrusion detection system using hybrid intelligent systems. J Netw Comput ApPl 30(1):114–132
Phoha VV (2002) Internet security dictionary. Springer
Tan PN, Steinbach M, Karpatne A, Kumar V(2005) Introduction to data mining, 2nd edn. Pearson Addison-Wesley
Theiler J, Cai DM (2003) Resampling approach for anomaly detection in multispectral images. In: Proceedings of SPIE 5093, Orlando, Florida, United States 2003
Vapnik VN (1998) Statistical learning theory. Wiley, New York
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Chaudhary, A., Agarwal, R. (2023). Machine Learning Techniques for Anomaly Detection Application Domains. In: Rai, A., Kumar Singh, D., Sehgal, A., Cengiz, K. (eds) Paradigms of Smart and Intelligent Communication, 5G and Beyond. Transactions on Computer Systems and Networks. Springer, Singapore. https://doi.org/10.1007/978-981-99-0109-8_8
Download citation
DOI: https://doi.org/10.1007/978-981-99-0109-8_8
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-0108-1
Online ISBN: 978-981-99-0109-8
eBook Packages: Computer ScienceComputer Science (R0)