Knowledge-based anomaly detection: Survey, challenges, and future directions

被引:5
作者
Khan, Abdul Qadir [1 ,2 ]
El Jaouhari, Saad [1 ]
Tamani, Nouredine [1 ]
Mroueh, Lina [1 ]
机构
[1] Inst Super Elect Paris Isep, 10 rue Vanves, F-92130 Issy les moulineaux, France
[2] Sorbonne Univ, Paris, France
关键词
Anomaly detection; Knowledge base systems; Rule-based systems; Fuzzy logic; Machine learning; Survey; NETWORK INTRUSION DETECTION; FEATURE-SELECTION; DETECTION SYSTEMS; FUZZY-LOGIC; IDENTIFICATION; ACQUISITION; COMPLEXITY; ONTOLOGY; ATTACKS; DESIGN;
D O I
10.1016/j.engappai.2024.108996
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the rapidly increasing number of Internet-connected objects, a huge amount of data is created, stored, and shared. Depending on the use case, this data is visualized, cleaned, checked, visualized, and processed for various purposes. However, this data may encounter many problems such as inaccuracy, duplication, absence, etc. Such issues can be regarded as anomalies that deviate from a referential point, which can be caused by malicious attackers, abnormal behavior of systems, and a failure of devices, transmission channels, or data processing units. Anomaly detection is still one of the most important issues in cybersecurity, especially when it comes to system monitoring, automated forensics, and post-mortem analysis, which require anomaly detection mechanisms. In the literature, different approaches have been developed to detect anomalies, which can be classified as statistic-based, semantic-based, clustering-based, classification-based, and deep learning-based, depending on the algorithms used. This survey focuses on knowledge-based approaches, a sub-category of semantic-based approaches, as opposed to statistical/learning approaches. We provide a detailed comparison of the recent work in knowledge-based subcategories, namely, rule-based, score-based, and hybrid. We described the components of a knowledge-based system and the steps required to process raw data for anomaly detection. Furthermore, we have collected for each approach, when available, information about its semantic expressiveness, computational complexity, and application domain. Finally, we identify the challenges and discuss some future research directions in knowledge-based anomaly detection. Identifying such approaches and challenges can help cybersecurity engineers design better models that meet their application requirements.
引用
收藏
页数:21
相关论文
共 175 条
[21]  
Baget Jean-Francois, 2011, P 22 INT JOINT C ART, P712
[22]   Fuzzy Based Intrusion Detection Systems in MANET [J].
Balan, Vishnu E. ;
Priyan, M. K. ;
Gokulnath, C. ;
Devi, Usha G. .
BIG DATA, CLOUD AND COMPUTING CHALLENGES, 2015, 50 :109-114
[23]  
Benedikt M., 2022, VLDB 2022 48 INT C V, V15
[24]   fuzzyDL: An Expressive Fuzzy Description Logic Reasoner [J].
Bobillo, Fernando ;
Straccia, Umberto .
2008 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, VOLS 1-5, 2008, :923-+
[25]  
Bonatti PA, 2006, LECT NOTES ARTIF INT, V2955, P19
[26]  
Bordes A., 2013, P 27 ANN C NEUR INF, P2787
[27]   Anomaly detection from log files using data mining techniques [J].
Breier, Jakub ;
Branišová, Jana .
Lecture Notes in Electrical Engineering, 2015, 339 :449-457
[28]   Decision Tree-Based Rule Derivation for Intrusion Detection in Safety-Critical Automotive Systems [J].
Buschlinger, Lucas ;
Rieke, Roland ;
Sarda, Sanat ;
Krauss, Christoph .
30TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING (PDP 2022), 2022, :246-254
[29]   Identification of adverse drug-drug interactions through causal association rule discovery from spontaneous adverse event reports [J].
Cai, Ruichu ;
Liu, Mei ;
Hu, Yong ;
Melton, Brittany L. ;
Matheny, Michael E. ;
Xu, Hua ;
Duan, Lian ;
Waitman, Lemuel R. .
ARTIFICIAL INTELLIGENCE IN MEDICINE, 2017, 76 :7-15
[30]  
Calvanese D., 2005, P 20 NAT C ART INT, P602