A Comprehensive Survey of Anomaly Detection Algorithms

被引:12
|
作者
Samariya D. [1 ,2 ]
Thakkar A. [2 ]
机构
[1] School of Engineering, Information Technology and Physical Sciences, Federation University, Churchill, VIC
[2] Department of Computer Science and Engineering, Chandubhai S Patel Institute of Technology (CSPIT), Charotar University of Science and Technology (CHARUSAT), CHARUSAT Campus, Gujarat, Changa
关键词
Anomaly; Anomaly detection; Outlier analysis; Outlier detection; Survey;
D O I
10.1007/s40745-021-00362-9
中图分类号
学科分类号
摘要
Anomaly or outlier detection is consider as one of the vital application of data mining, which deals with anomalies or outliers. Anomalies are considered as data points that are dramatically different from the rest of the data points. In this survey, we comprehensively present anomaly detection algorithms in an organized manner. We begin this survey with the definition of anomaly, then provide essential elements of anomaly detection, such as different types of anomaly, different application domains, and evaluation measures. Such anomaly detection algorithms are categorized in seven categories based on their working mechanisms, which includes total of 52 algorithms. The categories are anomaly detection algorithms based on statistics, density, distance, clustering, isolation, ensemble and subspace. For each category, we provide the time complexity of each algorithm and their general advantages and disadvantages. In the end, we compared all discussed anomaly detection algorithms in detail. © 2021, The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature.
引用
收藏
页码:829 / 850
页数:21
相关论文
共 50 条
  • [1] A comprehensive survey on network anomaly detection
    Gilberto Fernandes
    Joel J. P. C. Rodrigues
    Luiz Fernando Carvalho
    Jalal F. Al-Muhtadi
    Mario Lemes Proença
    Telecommunication Systems, 2019, 70 : 447 - 489
  • [2] A comprehensive survey on network anomaly detection
    Fernandes, Gilberto
    Rodrigues, Joel J. P. C.
    Carvalho, Luiz Fernando
    Al-Muhtadi, Jalal F.
    Proenca, Mario Lemes, Jr.
    TELECOMMUNICATION SYSTEMS, 2019, 70 (03) : 447 - 489
  • [3] Survey of Cloud Traffic Anomaly Detection Algorithms
    Paulikas, Giedrius
    Sandonavicius, Donatas
    Stasiukaitis, Edgaras
    Vilutis, Gytis
    Vaitkunas, Mindaugas
    INFORMATION AND SOFTWARE TECHNOLOGIES, ICIST 2022, 2022, 1665 : 19 - 32
  • [4] Anomaly Detection in Smart Environments: A Comprehensive Survey
    Faehrmann, Daniel
    Martin, Laura
    Sanchez, Luis
    Damer, Naser
    IEEE ACCESS, 2024, 12 : 64006 - 64049
  • [5] A comprehensive survey on intrusion detection algorithms
    Li, Yang
    Li, Zhengming
    Li, Mengyao
    COMPUTERS & ELECTRICAL ENGINEERING, 2025, 121
  • [6] Anomaly Detection in Dynamic Graphs: A Comprehensive Survey
    Ekle, Ocheme Anthony
    Eberle, William
    ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA, 2024, 18 (08)
  • [7] Anomaly Detection in Blockchain Networks: A Comprehensive Survey
    Ul Hassan, Muneeb
    Rehmani, Mubashir Husain
    Chen, Jinjun
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2023, 25 (01): : 289 - 318
  • [8] A Survey on Unsupervised Anomaly Detection Algorithms for Industrial Images
    Cui, Yajie
    Liu, Zhaoxiang
    Lian, Shiguo
    IEEE ACCESS, 2023, 11 : 55297 - 55315
  • [9] Anomaly Detection on Blockchain in Financial Fields: A Comprehensive Survey
    Xu, Tiankai
    Liu, Zixuan
    Gao, Haoyu
    Lei, Hong
    Ma, Qishun
    2024 4TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND ARTIFICIAL INTELLIGENCE, CCAI 2024, 2024, : 199 - 207
  • [10] A Comprehensive Survey on Graph Anomaly Detection With Deep Learning
    Ma, Xiaoxiao
    Wu, Jia
    Xue, Shan
    Yang, Jian
    Zhou, Chuan
    Sheng, Quan Z.
    Xiong, Hui
    Akoglu, Leman
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2023, 35 (12) : 12012 - 12038