Empowering anomaly detection algorithm: a review

Muhammad Yunus Iqbal Basheer, Azliza Mohd Ali, Rozianawaty Osman, Nurzeatul Hamimah Abdul Hamid, Sharifalillah Nordin, Muhammad Azizi Mohd Ariffin, José Antonio Iglesias Martínez

Abstract


Detecting anomalies in a data stream relevant to domains like intrusion detection, fraud detection, security in sensor networks, or event detection in internet of things (IoT) environments is a growing field of research. For instance, the use of surveillance cameras installed everywhere that is usually governed by human experts. However, when many cameras are involved, more human expertise is needed, thus making it expensive. Hence, researchers worldwide are trying to invent the best-automated algorithm to detect abnormal behavior using real-time data. The designed algorithm for this purpose may contain gaps that could differentiate the qualities in specific domains. Therefore, this study presents a review of anomaly detection algorithms, introducing the gap that presents the advantages and disadvantages of these algorithms. Since many works of literature were reviewed in this review, it is expected to aid researchers in closing this gap in the future.

Keywords


Algorithm; Anomaly detection; Autonomous; Real-time; Streaming data;

Full Text:

PDF


DOI: http://doi.org/10.11591/ijai.v13.i1.pp9-22

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

IAES International Journal of Artificial Intelligence (IJ-AI)
ISSN/e-ISSN 2089-4872/2252-8938 
This journal is published by the Institute of Advanced Engineering and Science (IAES) in collaboration with Intelektual Pustaka Media Utama (IPMU).

View IJAI Stats