Real-time big data processing for anomaly detection: A Survey

被引:264
作者
Habeeb, Riyaz Ahamed Ariyaluran [1 ]
Nasaruddin, Fariza [1 ]
Gani, Abdullah [2 ]
Hashem, Ibrahim Abaker Targio [2 ]
Ahmed, Ejaz [3 ]
Imran, Muhammad [4 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Dept Informat Syst, Kuala Lumpur 50603, Malaysia
[2] Taylors Univ, Sch Comp & Informat Technol, Subang Jaya 47500, Selangor, Malaysia
[3] Univ Malaya, Ctr Res Mobile Cloud Comp, Kuala Lumpur, Malaysia
[4] King Saud Univ, Coll Appl Comp Sci, Riyadh, Saudi Arabia
关键词
Real-time; Big data processing; Anomaly detection and machine learning algorithms; INTRUSION DETECTION; DETECTION SYSTEM; DATA ANALYTICS; DIFFERENTIAL EVOLUTION; RANDOM FORESTS; CHALLENGES; OPTIMIZATION; NETWORKS; INTERNET; ADOPTION;
D O I
10.1016/j.ijinfomgt.2018.08.006
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
The advent of connected devices and omnipresence of Internet have paved way for intruders to attack networks, which leads to cyber-attack, financial loss, information theft in healthcare, and cyber war. Hence, network security analytics has become an important area of concern and has gained intensive attention among researchers, off late, specifically in the domain of anomaly detection in network, which is considered crucial for network security. However, preliminary investigations have revealed that the existing approaches to detect anomalies in network are not effective enough, particularly to detect them in real time. The reason for the inefficacy of current approaches is mainly due the amassment of massive volumes of data though the connected devices. Therefore, it is crucial to propose a framework that effectively handles real time big data processing and detect anomalies in networks. In this regard, this paper attempts to address the issue of detecting anomalies in real time. Respectively, this paper has surveyed the state-of-the-art real-time big data processing technologies related to anomaly detection and the vital characteristics of associated machine learning algorithms. This paper begins with the explanation of essential contexts and taxonomy of real-time big data processing, anomalous detection, and machine learning algorithms, followed by the review of big data processing technologies. Finally, the identified research challenges of real-time big data processing in anomaly detection are discussed.
引用
收藏
页码:289 / 307
页数:19
相关论文
共 129 条
[1]   A novel weighted support vector machines multiclass classifier based on differential evolution for intrusion detection systems [J].
Aburomman, Abdulla Amin ;
Reaz, Mamun Bin Ibne .
INFORMATION SCIENCES, 2017, 414 :225-246
[2]   An efficient divide-and-conquer approach for big data analytics in machine-to-machine communication [J].
Ahmad, Awais ;
Paul, Anand ;
Rathore, M. Mazhar .
NEUROCOMPUTING, 2016, 174 :439-453
[3]   Unsupervised real-time anomaly detection for streaming data [J].
Ahmad, Subutai ;
Lavin, Alexander ;
Purdy, Scott ;
Agha, Zuha .
NEUROCOMPUTING, 2017, 262 :134-147
[4]   The role of big data analytics in Internet of Things [J].
Ahmed, Ejaz ;
Yaqoob, Ibrar ;
Hashem, Ibrahim Abaker Targio ;
Khan, Imran ;
Ahmed, Abdelmuttlib Ibrahim Abdalla ;
Imran, Muhammad ;
Vasilakos, Athanasios V. .
COMPUTER NETWORKS, 2017, 129 :459-471
[5]   A survey of network anomaly detection techniques [J].
Ahmed, Mohiuddin ;
Mahmood, Abdun Naser ;
Hu, Jiankun .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 :19-31
[6]  
Ahmed Tarem., 2007, SYSML'07: Proceedings of the 2nd USENIX workshop on Tackling computer systems problems with machine learning techniques, P1
[7]   Graph based anomaly detection and description: a survey [J].
Akoglu, Leman ;
Tong, Hanghang ;
Koutra, Danai .
DATA MINING AND KNOWLEDGE DISCOVERY, 2015, 29 (03) :626-688
[8]   Efficient Machine Learning for Big Data: A Review [J].
Al-Jarrah, Omar Y. ;
Yoo, Paul D. ;
Muhaidat, Sami ;
Karagiannidis, George K. ;
Taha, Kamal .
BIG DATA RESEARCH, 2015, 2 (03) :87-93
[9]   Next generation M2M cellular networks: Challenges and practical considerations [J].
Ali, Abdelmohsen ;
Hamouda, Walaa ;
Uysal, Murat .
IEEE Communications Magazine, 2015, 53 (09) :18-24
[10]   Cloud computing-enabled healthcare opportunities, issues, and applications: A systematic review [J].
Ali, Omar ;
Shrestha, Anup ;
Soar, Jeffrey ;
Wamba, Samuel Fosso .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2018, 43 :146-158