Skip to main content

Anomaly Detection Techniques in Data Mining—A Review

  • Conference paper
  • First Online:
Inventive Communication and Computational Technologies

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 89))

Abstract

Detection is one of the biggest threats to the organization. The detection of abnormal behaviors is one of the most difficult tasks for administrators of information systems (IS). Anomaly behavior is defined as any behavior that deviates from normal within or outside the organization IS, including insider attacks and any behavior that threatens the confidentiality, integrity, and availability of information systems for organizations. The detection of anomalies is extremely important to prevent and reduce illegal activities and to provide an effective emergency response.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mahi S (2017) Introduction to data mining and data warehouse. Int J Adv Res Comput Sci 8(4):398–400

    Google Scholar 

  2. Abraham T (2001) IDDM: intrusion detection using data mining techniques 35

    Google Scholar 

  3. Dasgupta D, Sumi Majumdar N, Majumdar NS (2002) Anomaly detection in multidimensional data using negative selection algorithm. In: Proceedings of the 2002 congress on evolutionary computation. CEC’02, pp 1039–1044

    Google Scholar 

  4. Catterson VM, McArthur SDJ, Moss G (2010) Online conditional anomaly detection in multivariate data for transformer monitoring. IEEE Trans Power Deliv 25(4):2556–2564

    Article  Google Scholar 

  5. Patcha A, Park JM (2007) An overview of anomaly detection techniques: existing solutions and latest technological trends. Comput Netw 51(12):3448–3470

    Article  Google Scholar 

  6. Ye N, Li X, Chen Q, Emran SM, Xu M (2001) Probabilistic techniques for intrusion detection based on computer audit data. IEEE Trans Syst Man, Cybern Part A Syst Humans. 31(4):266–274

    Google Scholar 

  7. Anna G, Krzysztof P (2015) Anomaly detection in data streams: the petrol station simulator. In: International conference: beyond databases, architectures and structures, pp 727–736

    Google Scholar 

  8. Radon AN, Wang K, Glasser U, Wehn H, Westwell-Roper A (2015) Contextual verification for false alarm reduction in maritime anomaly detection. In: 2015 IEEE International Conference on big data. IEEE Big Data 2015, pp 1123–1133

    Google Scholar 

  9. Siraj A, Vaughn RB, Bridges SM (2004) Intrusion sensor data fusion in an intelligent intrusion detection system architecture. In: Proceedings of the 37th annual Hawaii international conference on system sciences, 2004, pp 1–10

    Google Scholar 

  10. Siaterlis C, Maglaris B (2004) Towards multisensor data fusion for DoS detection. In: Proceedings of the 2004 ACM symposium on applied computing—SAC’04, p 439

    Google Scholar 

  11. Balakrishna PV, Rame Ganesh B (2014) Anomaly detection and SQL prepare data sets for data mining analysis. Int J Comput Sci Inf Technol 5:6551–6555

    Google Scholar 

  12. RajeshKumar G, Mangathayaru N, Narsimha G (2016) Intrusion detection—a text mining based approach. Special issue on Computing Applications and Data Mining. Int J Comput Sci Inf Secur 14:76–88

    Google Scholar 

  13. Bȩbel B, Królikowski Z, Wrembel R (2006) Formal approach to modelling a multiversion data warehouse. Bull Polish Acad Sci Tech Sci 54(1):51–62

    MATH  Google Scholar 

Download references

Acknowledgements

The authors express gratitude toward the assistance provided by Accendere Knowledge Management Services Pvt. Ltd. in preparing the manuscripts. We also thank our mentors and faculty members who guided us throughout the research and helped us in achieving the desired results.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. N. Lakshmi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lakshmi, K.N., Neema, N., Mohammed Muddasir, N., Prashanth, M.V. (2020). Anomaly Detection Techniques in Data Mining—A Review. In: Ranganathan, G., Chen, J., Rocha, Á. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 89. Springer, Singapore. https://doi.org/10.1007/978-981-15-0146-3_76

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-0146-3_76

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-0145-6

  • Online ISBN: 978-981-15-0146-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics