Knowledge-based anomaly detection: Survey, challenges, and future directions

被引:5
作者
Khan, Abdul Qadir [1 ,2 ]
El Jaouhari, Saad [1 ]
Tamani, Nouredine [1 ]
Mroueh, Lina [1 ]
机构
[1] Inst Super Elect Paris Isep, 10 rue Vanves, F-92130 Issy les moulineaux, France
[2] Sorbonne Univ, Paris, France
关键词
Anomaly detection; Knowledge base systems; Rule-based systems; Fuzzy logic; Machine learning; Survey; NETWORK INTRUSION DETECTION; FEATURE-SELECTION; DETECTION SYSTEMS; FUZZY-LOGIC; IDENTIFICATION; ACQUISITION; COMPLEXITY; ONTOLOGY; ATTACKS; DESIGN;
D O I
10.1016/j.engappai.2024.108996
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the rapidly increasing number of Internet-connected objects, a huge amount of data is created, stored, and shared. Depending on the use case, this data is visualized, cleaned, checked, visualized, and processed for various purposes. However, this data may encounter many problems such as inaccuracy, duplication, absence, etc. Such issues can be regarded as anomalies that deviate from a referential point, which can be caused by malicious attackers, abnormal behavior of systems, and a failure of devices, transmission channels, or data processing units. Anomaly detection is still one of the most important issues in cybersecurity, especially when it comes to system monitoring, automated forensics, and post-mortem analysis, which require anomaly detection mechanisms. In the literature, different approaches have been developed to detect anomalies, which can be classified as statistic-based, semantic-based, clustering-based, classification-based, and deep learning-based, depending on the algorithms used. This survey focuses on knowledge-based approaches, a sub-category of semantic-based approaches, as opposed to statistical/learning approaches. We provide a detailed comparison of the recent work in knowledge-based subcategories, namely, rule-based, score-based, and hybrid. We described the components of a knowledge-based system and the steps required to process raw data for anomaly detection. Furthermore, we have collected for each approach, when available, information about its semantic expressiveness, computational complexity, and application domain. Finally, we identify the challenges and discuss some future research directions in knowledge-based anomaly detection. Identifying such approaches and challenges can help cybersecurity engineers design better models that meet their application requirements.
引用
收藏
页数:21
相关论文
共 175 条
[71]  
Holland JH., 1978, PATTERNDIRECTED INFE, P313, DOI [10.1016/B978-0-12-737550-2.50020-8, 10.1145/1045343.1045373]
[72]   VERY SIMPLE CLASSIFICATION RULES PERFORM WELL ON MOST COMMONLY USED DATASETS [J].
HOLTE, RC .
MACHINE LEARNING, 1993, 11 (01) :63-91
[73]   Inconsistency Detection in Knowledge Graph with Entity and Path Semantics [J].
Hong, Zhi-Yu ;
Ma, Zongmin .
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2023, 39 (02) :291-303
[74]   An Anomaly Detection Method for Metro Signal and Control Systems [J].
Huang, Yibin ;
Li, Ken Yat Hung ;
Pei, Cheng ;
Wang, Lei ;
Ming, Wai Lau Laura ;
Cheung, Kevin Man Sing ;
Lau, K. M. Kwok Ming ;
Chan, C. P. Chin Pang ;
Ma, Zeya ;
Peng, Zhijin ;
Chen, Jingliang .
IFAC PAPERSONLINE, 2022, 55 (10) :1645-1650
[75]   Fuzzy logic-based DDoS attacks and network traffic anomaly detection methods: Classification, overview, and future perspectives [J].
Javaheri, Danial ;
Gorgin, Saeid ;
Lee, Jeong-A ;
Masdari, Mohammad .
INFORMATION SCIENCES, 2023, 626 :315-338
[76]   A hybrid methodology for anomaly detection in Cyber-Physical Systems [J].
Jeffrey, Nicholas ;
Tan, Qing ;
Villar, Jose R. .
NEUROCOMPUTING, 2024, 568
[77]  
Johanyak Z. C., 2008, 2008 IEEE International Conference on Computational Cybernetics (ICCC), P69, DOI 10.1109/ICCCYB.2008.4721381
[78]   Fuzzy Rule Interpolation Matlab toolbox -: FRI toolbox [J].
Johanyak, Zsolt Csaba ;
Tikk, Domonkos ;
Kovacs, Szilveszter ;
Wong, Kok Wai .
2006 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, VOLS 1-5, 2006, :351-+
[79]  
Joyia G.J., 2017, J Commun, V12, P240, DOI [DOI 10.12720/JCM.12.4.240-247, 10.12720/jcm.12.4.240-247]
[80]  
Katsilieris F, 2018, IEEE RAD CONF, P786, DOI 10.1109/RADAR.2018.8378660