Empowering anomaly detection algorithm: a review
Detecting anomalies in a data stream relevant to domains like intrusion detection, fraud detection, security in sensor networks, or event detection in internet of things (IoT) environments is a growing field of research. For instance, the use of surveillance cameras installed everywhere that is usua...
Published in: | IAES International Journal of Artificial Intelligence |
---|---|
Main Author: | |
Format: | Review |
Language: | English |
Published: |
Institute of Advanced Engineering and Science
2024
|
Online Access: | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85178327053&doi=10.11591%2fijai.v13.i1.pp9-22&partnerID=40&md5=6682a8caed16d044430a5055148f273a |
id |
2-s2.0-85178327053 |
---|---|
spelling |
2-s2.0-85178327053 Basheer M.Y.I.; Ali A.M.; Osman R.; Hamid N.H.A.; Nordin S.; Ariffin M.A.M.; Martínez J.A.I. Empowering anomaly detection algorithm: a review 2024 IAES International Journal of Artificial Intelligence 13 1 10.11591/ijai.v13.i1.pp9-22 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85178327053&doi=10.11591%2fijai.v13.i1.pp9-22&partnerID=40&md5=6682a8caed16d044430a5055148f273a Detecting anomalies in a data stream relevant to domains like intrusion detection, fraud detection, security in sensor networks, or event detection in internet of things (IoT) environments is a growing field of research. For instance, the use of surveillance cameras installed everywhere that is usually governed by human experts. However, when many cameras are involved, more human expertise is needed, thus making it expensive. Hence, researchers worldwide are trying to invent the best-automated algorithm to detect abnormal behavior using real-time data. The designed algorithm for this purpose may contain gaps that could differentiate the qualities in specific domains. Therefore, this study presents a review of anomaly detection algorithms, introducing the gap that presents the advantages and disadvantages of these algorithms. Since many works of literature were reviewed in this review, it is expected to aid researchers in closing this gap in the future. © 2024, Institute of Advanced Engineering and Science. All rights reserved. Institute of Advanced Engineering and Science 20894872 English Review All Open Access; Gold Open Access |
author |
Basheer M.Y.I.; Ali A.M.; Osman R.; Hamid N.H.A.; Nordin S.; Ariffin M.A.M.; Martínez J.A.I. |
spellingShingle |
Basheer M.Y.I.; Ali A.M.; Osman R.; Hamid N.H.A.; Nordin S.; Ariffin M.A.M.; Martínez J.A.I. Empowering anomaly detection algorithm: a review |
author_facet |
Basheer M.Y.I.; Ali A.M.; Osman R.; Hamid N.H.A.; Nordin S.; Ariffin M.A.M.; Martínez J.A.I. |
author_sort |
Basheer M.Y.I.; Ali A.M.; Osman R.; Hamid N.H.A.; Nordin S.; Ariffin M.A.M.; Martínez J.A.I. |
title |
Empowering anomaly detection algorithm: a review |
title_short |
Empowering anomaly detection algorithm: a review |
title_full |
Empowering anomaly detection algorithm: a review |
title_fullStr |
Empowering anomaly detection algorithm: a review |
title_full_unstemmed |
Empowering anomaly detection algorithm: a review |
title_sort |
Empowering anomaly detection algorithm: a review |
publishDate |
2024 |
container_title |
IAES International Journal of Artificial Intelligence |
container_volume |
13 |
container_issue |
1 |
doi_str_mv |
10.11591/ijai.v13.i1.pp9-22 |
url |
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85178327053&doi=10.11591%2fijai.v13.i1.pp9-22&partnerID=40&md5=6682a8caed16d044430a5055148f273a |
description |
Detecting anomalies in a data stream relevant to domains like intrusion detection, fraud detection, security in sensor networks, or event detection in internet of things (IoT) environments is a growing field of research. For instance, the use of surveillance cameras installed everywhere that is usually governed by human experts. However, when many cameras are involved, more human expertise is needed, thus making it expensive. Hence, researchers worldwide are trying to invent the best-automated algorithm to detect abnormal behavior using real-time data. The designed algorithm for this purpose may contain gaps that could differentiate the qualities in specific domains. Therefore, this study presents a review of anomaly detection algorithms, introducing the gap that presents the advantages and disadvantages of these algorithms. Since many works of literature were reviewed in this review, it is expected to aid researchers in closing this gap in the future. © 2024, Institute of Advanced Engineering and Science. All rights reserved. |
publisher |
Institute of Advanced Engineering and Science |
issn |
20894872 |
language |
English |
format |
Review |
accesstype |
All Open Access; Gold Open Access |
record_format |
scopus |
collection |
Scopus |
_version_ |
1809677883834105856 |