Knowledge-based anomaly detection: Survey, challenges, and future directions

被引:5
作者
Khan, Abdul Qadir [1 ,2 ]
El Jaouhari, Saad [1 ]
Tamani, Nouredine [1 ]
Mroueh, Lina [1 ]
机构
[1] Inst Super Elect Paris Isep, 10 rue Vanves, F-92130 Issy les moulineaux, France
[2] Sorbonne Univ, Paris, France
关键词
Anomaly detection; Knowledge base systems; Rule-based systems; Fuzzy logic; Machine learning; Survey; NETWORK INTRUSION DETECTION; FEATURE-SELECTION; DETECTION SYSTEMS; FUZZY-LOGIC; IDENTIFICATION; ACQUISITION; COMPLEXITY; ONTOLOGY; ATTACKS; DESIGN;
D O I
10.1016/j.engappai.2024.108996
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the rapidly increasing number of Internet-connected objects, a huge amount of data is created, stored, and shared. Depending on the use case, this data is visualized, cleaned, checked, visualized, and processed for various purposes. However, this data may encounter many problems such as inaccuracy, duplication, absence, etc. Such issues can be regarded as anomalies that deviate from a referential point, which can be caused by malicious attackers, abnormal behavior of systems, and a failure of devices, transmission channels, or data processing units. Anomaly detection is still one of the most important issues in cybersecurity, especially when it comes to system monitoring, automated forensics, and post-mortem analysis, which require anomaly detection mechanisms. In the literature, different approaches have been developed to detect anomalies, which can be classified as statistic-based, semantic-based, clustering-based, classification-based, and deep learning-based, depending on the algorithms used. This survey focuses on knowledge-based approaches, a sub-category of semantic-based approaches, as opposed to statistical/learning approaches. We provide a detailed comparison of the recent work in knowledge-based subcategories, namely, rule-based, score-based, and hybrid. We described the components of a knowledge-based system and the steps required to process raw data for anomaly detection. Furthermore, we have collected for each approach, when available, information about its semantic expressiveness, computational complexity, and application domain. Finally, we identify the challenges and discuss some future research directions in knowledge-based anomaly detection. Identifying such approaches and challenges can help cybersecurity engineers design better models that meet their application requirements.
引用
收藏
页数:21
相关论文
共 175 条
[1]   Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review [J].
Abdullahi, Mujaheed ;
Baashar, Yahia ;
Alhussian, Hitham ;
Alwadain, Ayed ;
Aziz, Norshakirah ;
Capretz, Luiz Fernando ;
Abdulkadir, Said Jadid .
ELECTRONICS, 2022, 11 (02)
[2]  
Ahmed A., 2019, Int. J. Acad. Eng. Res. (IJAER)
[3]  
Akoglu L, 2010, LECT NOTES ARTIF INT, V6119, P410
[4]   A Survey of Outlier Detection Techniques in IoT: Review and Classification [J].
Al Samara, Mustafa ;
Bennis, Ismail ;
Abouaissa, Abdelhafid ;
Lorenz, Pascal .
JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2022, 11 (01)
[5]   Detection of IoT-botnet attacks using fuzzy rule interpolation [J].
Al-Kasassbeh, Mouhammd ;
Almseidin, Mohammad ;
Alrfou, Khaled ;
Kovacs, Szilveszter .
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 39 (01) :421-431
[6]  
Ali S. Ahamed, 2023, 2023 International Conference on Communication, Security and Artificial Intelligence (ICCSAI), P982, DOI 10.1109/ICCSAI59793.2023.10421539
[7]  
Alkasassbeh M, 2016, INT J ADV COMPUT SC, V7, P436
[8]  
Almseidin Mohammad, 2021, 2021 International Conference on Information Technology (ICIT), P290, DOI 10.1109/ICIT52682.2021.9491742
[9]  
Almseidin M., 2019, Int. J. Adv. Sci. Eng. Inf. Technol., V9, P575
[10]  
Almseidin M, 2019, Arxiv, DOI arXiv:1904.08790