A comprehensive survey of anomaly detection in banking, wireless sensor networks, social networks, and healthcare

被引:11
|
作者
Zamini, Mohamad [1 ]
Hasheminejad, Seyed Mohammad Hossein [2 ]
机构
[1] Tarbiat Modares Univ, Dept Informat Technol, Tehran, Iran
[2] Alzahra Univ, Dept Comp Engn, Tehran, Iran
来源
关键词
Anomaly detection; intrusion detection; fraud detection; credit card; banking industry; SINGULAR VALUE DECOMPOSITION; INTRUSION DETECTION METHOD; OUTLIER DETECTION; FRAUD DETECTION; FEATURE-SELECTION; NEURAL-NETWORK; CLUSTERING-ALGORITHM; EVENT DETECTION; FUZZY-LOGIC; MODEL;
D O I
10.3233/IDT-170155
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Anomaly detection is an important issue, which has been investigated in various research fields and application domains. Many anomaly detection techniques have been developed exclusively for certain application domains, in contrast, others are more general. This survey aims to create a structured and comprehensive overview of the research on anomaly detection. First, we tried to introduce the concept of anomalies and types of anomaly detection. We have tried to classify anomaly detection according to their application and then categorized their techniques. For each application and technique, we have described key assumptions, which are used by the techniques to distinguish between normal and abnormal behavior. For each application, a basic anomaly detection technique has been provided, in the end; the differences among existing techniques in each specific category are discussed. Furthermore, we tried to describe the advantages and disadvantages of each technique in that field. In addition, we tried to bring some data sets that were used in some papers in order to test your methods with them. We hope that this survey provides a better concept of the various directions, which has been researched on that specific topic.
引用
收藏
页码:229 / 270
页数:42
相关论文
共 50 条
  • [31] A Lightweight Anomaly Detection Framework for Medical Wireless Sensor Networks
    Salem, Osman
    Liu, Yaning
    Mehaoua, Ahmed
    2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 4358 - 4363
  • [32] Toward an Optimal Anomaly Detection Pattern in Wireless Sensor Networks
    Amrizal, Muhammad Alfian
    Guillen, Luis
    Suganuma, Takuo
    2019 IEEE 43RD ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1, 2019, : 912 - 913
  • [33] Anomaly detection algorithm for detecting attacks in wireless sensor networks
    Van Phuong, Tran
    Hung, Le Xuan
    Cho, Seon Jin
    Lee, Young-Koo
    Lee, Sungyoung
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3975 : 735 - 736
  • [34] Lightweight Acoustic Anomaly Detection Algorithm for Wireless Sensor Networks
    Choi, Eunhye
    Park, Hyunggon
    2024 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC 2024, 2024,
  • [35] A Relative Risk Model for Anomaly Detection in Wireless Sensor Networks
    Tang, Jiayu
    Fan, Pingzhi
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12568 - 12571
  • [36] Anomaly detection in wireless sensor networks based on time factor
    Li, Yan
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 37 (04) : 4639 - 4645
  • [37] An adaptive elliptical anomaly detection model for wireless sensor networks
    Moshtaghi, Masud
    Leckie, Christopher
    Karunasekera, Shanika
    Rajasegarar, Sutharshan
    COMPUTER NETWORKS, 2014, 64 : 195 - 207
  • [38] Sketch based anomaly detection scheme in wireless sensor networks
    Li, Guorui
    Wang, Ying
    2013 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2013, : 344 - 348
  • [39] Anomaly detection and foresight response strategy for wireless sensor networks
    GhasemiGol, Mohammad
    Ghaemi-Bafghi, Abbas
    Yaghmaee-Moghaddam, Mohammad Hossein
    Sadoghi-Yazdi, Hadi
    WIRELESS NETWORKS, 2015, 21 (05) : 1425 - 1442
  • [40] Anomaly detection and foresight response strategy for wireless sensor networks
    Mohammad GhasemiGol
    Abbas Ghaemi-Bafghi
    Mohammad Hossein Yaghmaee-Moghaddam
    Hadi Sadoghi-Yazdi
    Wireless Networks, 2015, 21 : 1425 - 1442