A comprehensive survey of anomaly detection in banking, wireless sensor networks, social networks, and healthcare

被引:14
作者
Zamini, Mohamad [1 ]
Hasheminejad, Seyed Mohammad Hossein [2 ]
机构
[1] Tarbiat Modares Univ, Dept Informat Technol, Tehran, Iran
[2] Alzahra Univ, Dept Comp Engn, Tehran, Iran
来源
INTELLIGENT DECISION TECHNOLOGIES-NETHERLANDS | 2019年 / 13卷 / 02期
关键词
Anomaly detection; intrusion detection; fraud detection; credit card; banking industry; SINGULAR VALUE DECOMPOSITION; INTRUSION DETECTION METHOD; OUTLIER DETECTION; FRAUD DETECTION; FEATURE-SELECTION; NEURAL-NETWORK; CLUSTERING-ALGORITHM; EVENT DETECTION; FUZZY-LOGIC; MODEL;
D O I
10.3233/IDT-170155
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Anomaly detection is an important issue, which has been investigated in various research fields and application domains. Many anomaly detection techniques have been developed exclusively for certain application domains, in contrast, others are more general. This survey aims to create a structured and comprehensive overview of the research on anomaly detection. First, we tried to introduce the concept of anomalies and types of anomaly detection. We have tried to classify anomaly detection according to their application and then categorized their techniques. For each application and technique, we have described key assumptions, which are used by the techniques to distinguish between normal and abnormal behavior. For each application, a basic anomaly detection technique has been provided, in the end; the differences among existing techniques in each specific category are discussed. Furthermore, we tried to describe the advantages and disadvantages of each technique in that field. In addition, we tried to bring some data sets that were used in some papers in order to test your methods with them. We hope that this survey provides a better concept of the various directions, which has been researched on that specific topic.
引用
收藏
页码:229 / 270
页数:42
相关论文
共 279 条
[1]   Automatic detection of erythemato-squamous diseases using PSO-SVM based on association rules [J].
Abdi, Mohammad Javad ;
Giveki, Davar .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2013, 26 (01) :603-608
[2]  
Abello J., 2010, Proceedings 2010 10th IEEE International Conference on Data Mining (ICDM 2010), P8, DOI 10.1109/ICDM.2010.145
[3]  
Agarwal D., 2005, Proc. IEEE Int'l Conf. Data Mining (ICDM), P8
[4]  
Agarwal Sameer, 2006, P 23 INT C MACH LEAR, P17
[5]  
Aggarwal C. C., 2012, Proceedings of the 2012 SIAM International Conference on Data Mining, P624
[6]  
Aggarwal CC, 2001, SIGMOD RECORD, V30, P37
[7]   NIDS: A network based approach to intrusion detection and prevention [J].
Ahmed, Martuza ;
Pal, Rima ;
Hossain, Md. Mojammel ;
Bikas, Md. Abu Naser ;
Hasan, Md. Khalad .
IACSIT-SC 2009: INTERNATIONAL ASSOCIATION OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY - SPRING CONFERENCE, 2009, :141-144
[8]  
Aickelin U, 2003, LECT NOTES COMPUT SC, V2787, P147
[9]  
Akilarasu G, 2016, WIREL NETW, P1
[10]  
Akoglu L, 2010, LECT NOTES ARTIF INT, V6119, P410