Empowering anomaly detection algorithm: a review

Detecting anomalies in a data stream relevant to domains like intrusion detection, fraud detection, security in sensor networks, or event detection in internet of things (IoT) environments is a growing field of research. For instance, the use of surveillance cameras installed everywhere that is usua...

Full description

Bibliographic Details
Published in:IAES International Journal of Artificial Intelligence
Main Author: Basheer M.Y.I.; Ali A.M.; Osman R.; Hamid N.H.A.; Nordin S.; Ariffin M.A.M.; Martínez J.A.I.
Format: Review
Language:English
Published: Institute of Advanced Engineering and Science 2024
Online Access:https://www.scopus.com/inward/record.uri?eid=2-s2.0-85178327053&doi=10.11591%2fijai.v13.i1.pp9-22&partnerID=40&md5=6682a8caed16d044430a5055148f273a
id 2-s2.0-85178327053
spelling 2-s2.0-85178327053
Basheer M.Y.I.; Ali A.M.; Osman R.; Hamid N.H.A.; Nordin S.; Ariffin M.A.M.; Martínez J.A.I.
Empowering anomaly detection algorithm: a review
2024
IAES International Journal of Artificial Intelligence
13
1
10.11591/ijai.v13.i1.pp9-22
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85178327053&doi=10.11591%2fijai.v13.i1.pp9-22&partnerID=40&md5=6682a8caed16d044430a5055148f273a
Detecting anomalies in a data stream relevant to domains like intrusion detection, fraud detection, security in sensor networks, or event detection in internet of things (IoT) environments is a growing field of research. For instance, the use of surveillance cameras installed everywhere that is usually governed by human experts. However, when many cameras are involved, more human expertise is needed, thus making it expensive. Hence, researchers worldwide are trying to invent the best-automated algorithm to detect abnormal behavior using real-time data. The designed algorithm for this purpose may contain gaps that could differentiate the qualities in specific domains. Therefore, this study presents a review of anomaly detection algorithms, introducing the gap that presents the advantages and disadvantages of these algorithms. Since many works of literature were reviewed in this review, it is expected to aid researchers in closing this gap in the future. © 2024, Institute of Advanced Engineering and Science. All rights reserved.
Institute of Advanced Engineering and Science
20894872
English
Review
All Open Access; Gold Open Access
author Basheer M.Y.I.; Ali A.M.; Osman R.; Hamid N.H.A.; Nordin S.; Ariffin M.A.M.; Martínez J.A.I.
spellingShingle Basheer M.Y.I.; Ali A.M.; Osman R.; Hamid N.H.A.; Nordin S.; Ariffin M.A.M.; Martínez J.A.I.
Empowering anomaly detection algorithm: a review
author_facet Basheer M.Y.I.; Ali A.M.; Osman R.; Hamid N.H.A.; Nordin S.; Ariffin M.A.M.; Martínez J.A.I.
author_sort Basheer M.Y.I.; Ali A.M.; Osman R.; Hamid N.H.A.; Nordin S.; Ariffin M.A.M.; Martínez J.A.I.
title Empowering anomaly detection algorithm: a review
title_short Empowering anomaly detection algorithm: a review
title_full Empowering anomaly detection algorithm: a review
title_fullStr Empowering anomaly detection algorithm: a review
title_full_unstemmed Empowering anomaly detection algorithm: a review
title_sort Empowering anomaly detection algorithm: a review
publishDate 2024
container_title IAES International Journal of Artificial Intelligence
container_volume 13
container_issue 1
doi_str_mv 10.11591/ijai.v13.i1.pp9-22
url https://www.scopus.com/inward/record.uri?eid=2-s2.0-85178327053&doi=10.11591%2fijai.v13.i1.pp9-22&partnerID=40&md5=6682a8caed16d044430a5055148f273a
description Detecting anomalies in a data stream relevant to domains like intrusion detection, fraud detection, security in sensor networks, or event detection in internet of things (IoT) environments is a growing field of research. For instance, the use of surveillance cameras installed everywhere that is usually governed by human experts. However, when many cameras are involved, more human expertise is needed, thus making it expensive. Hence, researchers worldwide are trying to invent the best-automated algorithm to detect abnormal behavior using real-time data. The designed algorithm for this purpose may contain gaps that could differentiate the qualities in specific domains. Therefore, this study presents a review of anomaly detection algorithms, introducing the gap that presents the advantages and disadvantages of these algorithms. Since many works of literature were reviewed in this review, it is expected to aid researchers in closing this gap in the future. © 2024, Institute of Advanced Engineering and Science. All rights reserved.
publisher Institute of Advanced Engineering and Science
issn 20894872
language English
format Review
accesstype All Open Access; Gold Open Access
record_format scopus
collection Scopus
_version_ 1809677883834105856