Outlier Detection in Streaming Data for Telecommunications and Industrial Applications: A Survey

被引:0
作者
Mfondoum, Roland N. [1 ]
Ivanov, Antoni [1 ]
Koleva, Pavlina [1 ]
Poulkov, Vladimir [1 ]
Manolova, Agata [1 ]
机构
[1] Tech Univ Sofia, Fac Telecommun, Bul Kl Ohridski 8, Sofia 1000, Bulgaria
关键词
outlier detection; streaming data; 5G; IoT; computational complexity; machine learning; deep learning; ANOMALY DETECTION; WIRELESS SENSOR; ABSOLUTE DEVIATION; SLIDING WINDOWS; DENSITY; FRAMEWORK;
D O I
10.3390/electronics13163339
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Streaming data are present all around us. From traditional radio systems streaming audio to today's connected end-user devices constantly sending information or accessing services, data are flowing constantly between nodes across various networks. The demand for appropriate outlier detection (OD) methods in the fields of fault detection, special events detection, and malicious activities detection and prevention is not only persistent over time but increasing, especially with the recent developments in Telecommunication systems such as Fifth Generation (5G) networks facilitating the expansion of the Internet of Things (IoT). The process of selecting a computationally efficient OD method, adapted for a specific field and accounting for the existence of empirical data, or lack thereof, is non-trivial. This paper presents a thorough survey of OD methods, categorized by the applications they are implemented in, the basic assumptions that they use according to the characteristics of the streaming data, and a summary of the emerging challenges, such as the evolving structure and nature of the data and their dimensionality and temporality. A categorization of commonly used datasets in the context of streaming data is produced to aid data source identification for researchers in this field. Based on this, guidelines for OD method selection are defined, which consider flexibility and sample size requirements and facilitate the design of such algorithms in Telecommunications and other industries.
引用
收藏
页数:33
相关论文
共 203 条
[1]   A local density-based outlier detection method for high dimension data [J].
Abdulghafoor, Shahad Adel ;
Mohamed, Lekaa Ali .
INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 2022, 13 (01) :1683-1699
[2]   Applications of Recurrent Neural Network for Biometric Authentication & Anomaly Detection [J].
Ackerson, Joseph M. ;
Dave, Rushit ;
Seliya, Naeem .
INFORMATION, 2021, 12 (07)
[3]   Autoencoder-based Anomaly Detection in Smart Farming Ecosystem [J].
Adkisson, Mary ;
Kimmell, Jeffrey C. ;
Gupta, Maanak ;
Abdelsalam, Mahmoud .
2021 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2021, :3390-3399
[4]  
Aggarwal A., 2021, Int. J. Inf. Manag. Data Insights, V1,, DOI [DOI 10.1016/J.JJIMEI.2020.100004, 10.1016/j.jjimei.2020.100004]
[5]  
Aggarwal Charu C., 2015, Data Mining: The Textbook, DOI [DOI 10.1007/978-3-319-14142-8, 10.1007/978-3-319-14142-8]
[6]   LSTM Recurrent Neural Network (RNN) for Anomaly Detection in Cellular Mobile Networks [J].
Al Mamun, S. M. Abdullah ;
Beyaz, Mehmet .
MACHINE LEARNING FOR NETWORKING, 2019, 11407 :222-237
[7]   A Survey of Outlier Detection Techniques in IoT: Review and Classification [J].
Al Samara, Mustafa ;
Bennis, Ismail ;
Abouaissa, Abdelhafid ;
Lorenz, Pascal .
JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2022, 11 (01)
[8]  
Al-jabery K.K., 2020, COMPUTATIONAL LEARNI, P125
[9]  
Al-taei R., 2019, P INT C HIGH PERF CO, P98
[10]   Anomaly Detection for Cyber-Security Based on Convolution Neural Network : A survey [J].
Alabadi, Montdher ;
Celik, Yuksel .
2ND INTERNATIONAL CONGRESS ON HUMAN-COMPUTER INTERACTION, OPTIMIZATION AND ROBOTIC APPLICATIONS (HORA 2020), 2020, :558-571