Abstract
Anomalies refer to any non-conforming patterns to the expected behavior in the system. The detection of anomaly in real time from logs arriving at very high velocity and are in huge volume requires a distributed framework with high throughput and low latency. In this research, statistical method has been implemented for finding the suspicious associations in Spark Streaming, a highly scalable distributed and streaming framework. The models were deployed in both local mode as well as in cluster mode to perform anomaly detection on server logs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kline, K., Nam, S., Barford, P., Plonka, A., Ron, A.: Traffic anomaly detection at fine time scales with Bayes. In: International Conference on Internet Monitoring and Protection (2008)
Mukkamala, S., Sung, A., Ribeiro, B.: Model selection for kernel based intrusion detection systems. In: Proceedings of International Conference on Adaptive and Natural Computing Algorithm (2005)
Manocha, S., Girolami, M.: An empirical analysis of the probabilistic k-nearest neighbor classifier. Pattern Recogn. Lett. 28, 1818–1824 (2007)
Angiulli, F., Pizzuti, C.: Fast outlier detection in high dimen-sional spaces. Lecture Notes Comput. Sci. 2431, 43–78 (2002)
Ramaswamy, S., Rastogi, R., Shim, K.: Efficient algorithms for mining outliers from large data sets. In: Proceedings of the 2000 ACM SIGMOD, pp. 427–438 (2000)
Alnafessah, A., Casale, G.: Artificial neural networks based techniques for anomaly detection in apache spark (2019)
Duda, R.O., Hart, P., Stork, D.: Pattern Classification, 2nd edn (2001)
Rawat, S.: Efficient data mining algorithms for intrusion detection. In: Proceedings of the 4th Conference on Engineering of Intelligent Systems (EIS’04) (2005)
Patcha, A., Park, J.-M.: An overview of anomaly detection techniques: Existing solutions and latest technological trends. Comput. Networks 51, 3448–3470 (2007)
Chandola, V., Banarjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Survey J. 41 (2009)
Gu, Y., McCallum, A., Towsley, D.: Detecting anomalies in network traffic using maximum entropy estimation. In: Proceedings of IMC (2005)
Lee, W., Xiang, D.: Information-theoretic measures for anomaly detection. In: Proceedings of IEEE Symposium on Security and Privacy (2001)
Rettig, S., Khayati, M.: Online anomaly detection over big data streams (2015)
Ahmad, S., Lavin, A., Purdy, S., Agha, Z.: Unsupervised real-time anomaly detection for streaming data. Neurocomputing 262, 134–147 (2017)
Otey, M., Ghoting, A., Parthasarathy, S.: Fast distributed outlier detection in mixed-attribute data sets. Data Mining Knowl. Discovery 12, 203–228 (2006)
Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surveys 41, 1–58 (2009)
Solaimani, M., Iftekhar, M., Khan, L., Thuraisingham, B.: Statistical technique for online anomaly detection using spark over heterogeneous data from multi-source vmware performance data. In: IEEE International Conference on Big Data (2014)
Dunning, T.: Better anomaly detection with the t-digest (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Karn, R., Joshi, S.R., Bista, U., Joshi, B., Baral, D.S., Shakya, A. (2021). Anomaly Detection in Distributed Streams. In: Senjyu, T., Mahalle, P.N., Perumal, T., Joshi, A. (eds) Information and Communication Technology for Intelligent Systems. ICTIS 2020. Smart Innovation, Systems and Technologies, vol 196. Springer, Singapore. https://doi.org/10.1007/978-981-15-7062-9_14
Download citation
DOI: https://doi.org/10.1007/978-981-15-7062-9_14
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-7061-2
Online ISBN: 978-981-15-7062-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)