Anomaly Detection Techniques Causes and Issues

  • Authors

    • G. Sandhya Madhuri
    • Dr. M. Usha Rani
    https://doi.org/10.14419/ijet.v7i3.24.22791
  • .
  • Anomaly means something which is not normal. Any data point which deviates or placed in distance from all other normal data points is an anomaly. That is why anomalies are also called as outliers.  Anomaly detection is also called as deviation detection because anomalous objects have attribute values that are different from all other normal data objects. In this paper we have discussed about various causes of anomalies, anomaly detection approaches and also issues that are to be taken care during finding out the best technique for anomaly detection.

  • References

    1. [1] D. Polla, "A Framework for Cooperative Intrusion Detection", Proc. 21st Nat'l Information Systems Security Conf., pp. 361-373, 1998.

      [2] D. Zerkle, "A Data-Mining Analysis of RTID Alarms", Recent Advances in Intrusion Detection, 1999.

      [3] G. Grinstein, "Workshop on Information Exploration Shootout Project and Benchmark Data Sets: Evaluating How Visualization Does in Analyzing Real-World Data Analysis Problems", Proc. IEEE Visualization 97 Conf., pp. 511-513, 1997.

      [4] K. Cox, S. Eick, T. He, "3D Geographic Network Displays", ACM Sigmod Record, vol. 25, no. 4, pp. 50, Dec. 1996.

      [5] E.E. Koutsofios, "Visualizing Large-Scale Telecommunication Networks and Services", Proc. IEEE Visualization 97 Conf., pp. 457-461, 1997.

      [6] S.G. Eick, G.J. Wills, "Navigating Large Networks with Hierarchies", Visualization 93 Conf. Proc., pp. 204-210, 1993.

      [7] R. Becker, S. Eick, A. Wilks, "Visualizing Network Data", Readings in Information Visualization: Using Vision To Think, pp. 215-227, 1999.

      [8] T. Bray, "Measuring the Web", Readings in Information Visualization: Using Vision To Think, pp. 469-492, 1999

      [9] Davidson, "What Your Database Hides Away", New Scientist no. 1855, pp. 28-31, Jan. 1993.

      [10] R.F. Erbacher, D. Frincke, "Visualization in Detection of Intrusions and Misuse in Large-Scale Networks", Proc. Int'l Conf. Information Visualization 2000, pp. 294-299, 2000.

      [11] Introduction to “Data Mining†book by Pang-Ning Tan, Michigan State University, Michael Steinbach, University of Minnesota, Vipin Kumar, University of Minnesota and Army High Performance Computing Research Center.

  • Downloads

  • How to Cite

    Sandhya Madhuri, G., & M. Usha Rani, D. (2018). Anomaly Detection Techniques Causes and Issues. International Journal of Engineering & Technology, 7(3.24), 449-453. https://doi.org/10.14419/ijet.v7i3.24.22791