CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

A Survey: Analysis of Current Approaches in Anomaly Detection

by Prashansa Chouhan, Vineet Richhariya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 111 - Number 17
Year of Publication: 2015
Authors: Prashansa Chouhan, Vineet Richhariya
10.5120/19760-1541

Prashansa Chouhan, Vineet Richhariya . A Survey: Analysis of Current Approaches in Anomaly Detection. International Journal of Computer Applications. 111, 17 ( February 2015), 32-36. DOI=10.5120/19760-1541

@article{ 10.5120/19760-1541,
author = { Prashansa Chouhan, Vineet Richhariya },
title = { A Survey: Analysis of Current Approaches in Anomaly Detection },
journal = { International Journal of Computer Applications },
issue_date = { February 2015 },
volume = { 111 },
number = { 17 },
month = { February },
year = { 2015 },
issn = { 0975-8887 },
pages = { 32-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume111/number17/19760-1541/ },
doi = { 10.5120/19760-1541 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:48:11.149379+05:30
%A Prashansa Chouhan
%A Vineet Richhariya
%T A Survey: Analysis of Current Approaches in Anomaly Detection
%J International Journal of Computer Applications
%@ 0975-8887
%V 111
%N 17
%P 32-36
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

An anomaly is abnormal activity or deviation from the normal behaviour. Anomaly detection is the process of removing these abnormal or anomalous behaviours from the data or services. Anomaly detection techniques are used to detect and discard anomalies from the data or services. In this survey paper we describe overview of some anomaly detection techniques which are on collective anomaly detection and clustering anomaly which are generated due to variety of abnormal activities such as credit card fraud detection, mobile phone fraud, banking fraud, cyber attack etc. an important aspect as the nature of anomaly. In existing paper introduced the concept of collective anomaly for network traffic analysis. It’s used the variant of k-mean and x-mean algorithm for clustering network traffic and detects DOS attack. In the anomaly detection models anomalies are detected by comparing the tracing data with the actual data. On the basis of comparison deviations in the traced data or services are identified and they are considered as anomaly. To overcome these entire problems we proposed a novel technique to the combination of classification and Genetic based anomaly. We develop an efficient sampling technique which capture the underlying distribution of data and create a summary to be able to monitor high capacity network.

References
  1. Mohiuddin Ahmed, Abdun Naser Mahmood, “Network Traffic Analysis based on collective anomaly detection” 2014 IEEE 9th Conference on Industrial Electronics and Applications.
  2. F. Ren, L. Hu, H. Liang, X. Liu, and W. Ren, “Using density-based incremental clustering for anomaly detection,” in Proceedings of the 2008 International Conference on Computer Science and Software Engineering. Washington, DC, USA: IEEE Computer Society, 2008, pp. 986–989. [Online]. Available: http://dx.doi.org/10.1109/CSSE.2008.811
  3. K. Burbeck and S. Nadjm-tehrani, “ADWICE - anomaly detection with real-time incremental clustering,” in Proceedings of the 7th International Conference on Information Security and Cryptology, Seoul, Korea. Springer Verlag, pp. 4007-424, 2004.
  4. A. Rasoulifard, A. G. Bafghi, and M. Kahani, Incremental Hybrid Intrusion Detection Using Ensemble of Weak Classifiers, in Communications in Computer and Information Science. Springer Berlin Heidelberg, November 23 2008, vol. 6, pp. 577–584. [Online]. Available: http://10.1007/978-3-540-89985-3
  5. M. V. Joshi, I. T. J. Watson, and R. C. Agarwal, “Mining needles in a haystack: Classifying rare classes via two-phase rule induction,” SIGMOD Record (ACM Special Interest Group on Management of Data), Vol. 30, No. 2, pp. 91-102, 2001.
  6. J. Theiler and D. M. Cai, “Resampling approach for anomaly detection in multispectral images,” in Proc. SPIE, pp. 230–240, 2003.
  7. B.Senthilnayaki, K.Venkatalakshmi, A. Kann an, “An Intelligent Intrusion Detection System Using Genetic Based Feature Selection and Modified J48 Decision Tree Classifier” 2013 Fifth International Conference on Advanced Computing (ICoAC)
  8. P. Laskov, C. Gehl, S. Kr¨uger, and K.-R. M¨uller, “Incremental support vector learning: Analysis, implementation and applications,” Journal of Machine Learning Research, vol. 7, pp. 1909–1936, 2006.
  9. S. Jiang, X. Song, H. Wang, J.-J. Han, and Q.-H. Li, “A clustering-based method for unsupervised intrusion detections,” Pattern Recognition Letters, vol. 27, pp. 802–810, 2006.
  10. H. Cheng, P.-N. Tan, C. Potter, and S. A. Klooster, “Detection and characterization of anomalies in multivariate time series,” in Proceedings of the SIAM (SDM), pp. 413– 424, 2009
Index Terms

Computer Science
Information Sciences

Keywords

Anomaly Detection Techniques Clustering CAD Genetic and Classification based Technique