A Comprehensive Survey of Anomaly Detection Algorithms

被引:13
|
作者
Samariya D. [1 ,2 ]
Thakkar A. [2 ]
机构
[1] School of Engineering, Information Technology and Physical Sciences, Federation University, Churchill, VIC
[2] Department of Computer Science and Engineering, Chandubhai S Patel Institute of Technology (CSPIT), Charotar University of Science and Technology (CHARUSAT), CHARUSAT Campus, Gujarat, Changa
关键词
Anomaly; Anomaly detection; Outlier analysis; Outlier detection; Survey;
D O I
10.1007/s40745-021-00362-9
中图分类号
学科分类号
摘要
Anomaly or outlier detection is consider as one of the vital application of data mining, which deals with anomalies or outliers. Anomalies are considered as data points that are dramatically different from the rest of the data points. In this survey, we comprehensively present anomaly detection algorithms in an organized manner. We begin this survey with the definition of anomaly, then provide essential elements of anomaly detection, such as different types of anomaly, different application domains, and evaluation measures. Such anomaly detection algorithms are categorized in seven categories based on their working mechanisms, which includes total of 52 algorithms. The categories are anomaly detection algorithms based on statistics, density, distance, clustering, isolation, ensemble and subspace. For each category, we provide the time complexity of each algorithm and their general advantages and disadvantages. In the end, we compared all discussed anomaly detection algorithms in detail. © 2021, The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature.
引用
收藏
页码:829 / 850
页数:21
相关论文
共 50 条
  • [41] On Algorithms Selection for Unsupervised Anomaly Detection
    Zoppi, Tommaso
    Ceccarelli, Andrea
    Bondavalli, Andrea
    2018 IEEE 23RD PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2018, : 279 - 288
  • [42] A Brief Survey on Contemporary Methods for Anomaly Detection in Videos
    Zaheer, M. Zaigham
    Lee, Jin Ha
    Lee, Seung-Ik
    Seo, Beom-Su
    2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC): ICT CONVERGENCE LEADING THE AUTONOMOUS FUTURE, 2019, : 472 - 473
  • [43] Robust Anomaly Detection Algorithms for Real-time Big Data Comparison of algorithms
    Hasani, Zirije
    2017 6TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2017, : 449 - 454
  • [44] Deep Learning for Time Series Anomaly Detection: A Survey
    Darban, Zahra zamanzadeh
    Webb, Geoffrey i.
    Pan, Shirui
    Aggarwal, Charu
    Salehi, Mahsa
    ACM COMPUTING SURVEYS, 2025, 57 (01)
  • [45] Flight data anomaly detection: A survey
    Peng Y.
    He Y.
    Wang S.
    Liu D.
    Liu L.
    Yi Qi Yi Biao Xue Bao/Chinese Journal of Scientific Instrument, 2019, 40 (03): : 1 - 13
  • [46] Survey of anomaly intrusion detection research
    Yang, Hong-Yu
    Zhu, Dan
    Xie, Feng
    Xie, Li-Xia
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2009, 38 (05): : 587 - 596
  • [47] BGP Anomaly Detection Techniques: A Survey
    Al-Musawi, Bahaa
    Branch, Philip
    Armitage, Grenville
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (01): : 377 - 396
  • [48] Anomaly Detection for Discrete Sequences: A Survey
    Chandola, Varun
    Banerjee, Arindam
    Kumar, Vipin
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2012, 24 (05) : 823 - 839
  • [49] Anomaly detection survey for information security
    Kaur, Harsurinder
    Pannu, Husanbir Singh
    SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, : 251 - +
  • [50] A Survey of Anomaly Detection Methods in Networks
    Zhang, Weiyu
    Yang, Qingbo
    Geng, Yushui
    2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, : 619 - 621