Abstract
Detection is one of the biggest threats to the organization. The detection of abnormal behaviors is one of the most difficult tasks for administrators of information systems (IS). Anomaly behavior is defined as any behavior that deviates from normal within or outside the organization IS, including insider attacks and any behavior that threatens the confidentiality, integrity, and availability of information systems for organizations. The detection of anomalies is extremely important to prevent and reduce illegal activities and to provide an effective emergency response.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mahi S (2017) Introduction to data mining and data warehouse. Int J Adv Res Comput Sci 8(4):398–400
Abraham T (2001) IDDM: intrusion detection using data mining techniques 35
Dasgupta D, Sumi Majumdar N, Majumdar NS (2002) Anomaly detection in multidimensional data using negative selection algorithm. In: Proceedings of the 2002 congress on evolutionary computation. CEC’02, pp 1039–1044
Catterson VM, McArthur SDJ, Moss G (2010) Online conditional anomaly detection in multivariate data for transformer monitoring. IEEE Trans Power Deliv 25(4):2556–2564
Patcha A, Park JM (2007) An overview of anomaly detection techniques: existing solutions and latest technological trends. Comput Netw 51(12):3448–3470
Ye N, Li X, Chen Q, Emran SM, Xu M (2001) Probabilistic techniques for intrusion detection based on computer audit data. IEEE Trans Syst Man, Cybern Part A Syst Humans. 31(4):266–274
Anna G, Krzysztof P (2015) Anomaly detection in data streams: the petrol station simulator. In: International conference: beyond databases, architectures and structures, pp 727–736
Radon AN, Wang K, Glasser U, Wehn H, Westwell-Roper A (2015) Contextual verification for false alarm reduction in maritime anomaly detection. In: 2015 IEEE International Conference on big data. IEEE Big Data 2015, pp 1123–1133
Siraj A, Vaughn RB, Bridges SM (2004) Intrusion sensor data fusion in an intelligent intrusion detection system architecture. In: Proceedings of the 37th annual Hawaii international conference on system sciences, 2004, pp 1–10
Siaterlis C, Maglaris B (2004) Towards multisensor data fusion for DoS detection. In: Proceedings of the 2004 ACM symposium on applied computing—SAC’04, p 439
Balakrishna PV, Rame Ganesh B (2014) Anomaly detection and SQL prepare data sets for data mining analysis. Int J Comput Sci Inf Technol 5:6551–6555
RajeshKumar G, Mangathayaru N, Narsimha G (2016) Intrusion detection—a text mining based approach. Special issue on Computing Applications and Data Mining. Int J Comput Sci Inf Secur 14:76–88
Bȩbel B, Królikowski Z, Wrembel R (2006) Formal approach to modelling a multiversion data warehouse. Bull Polish Acad Sci Tech Sci 54(1):51–62
Acknowledgements
The authors express gratitude toward the assistance provided by Accendere Knowledge Management Services Pvt. Ltd. in preparing the manuscripts. We also thank our mentors and faculty members who guided us throughout the research and helped us in achieving the desired results.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Lakshmi, K.N., Neema, N., Mohammed Muddasir, N., Prashanth, M.V. (2020). Anomaly Detection Techniques in Data Mining—A Review. In: Ranganathan, G., Chen, J., Rocha, Á. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 89. Springer, Singapore. https://doi.org/10.1007/978-981-15-0146-3_76
Download citation
DOI: https://doi.org/10.1007/978-981-15-0146-3_76
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0145-6
Online ISBN: 978-981-15-0146-3
eBook Packages: EngineeringEngineering (R0)