Knowledge-based anomaly detection: Survey, challenges, and future directions

被引:3
|
作者
Khan, Abdul Qadir [1 ,2 ]
El Jaouhari, Saad [1 ]
Tamani, Nouredine [1 ]
Mroueh, Lina [1 ]
机构
[1] Inst Super Elect Paris Isep, 10 rue Vanves, F-92130 Issy les moulineaux, France
[2] Sorbonne Univ, Paris, France
关键词
Anomaly detection; Knowledge base systems; Rule-based systems; Fuzzy logic; Machine learning; Survey; NETWORK INTRUSION DETECTION; FEATURE-SELECTION; DETECTION SYSTEMS; FUZZY-LOGIC; IDENTIFICATION; ACQUISITION; COMPLEXITY; ONTOLOGY; ATTACKS; DESIGN;
D O I
10.1016/j.engappai.2024.108996
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the rapidly increasing number of Internet-connected objects, a huge amount of data is created, stored, and shared. Depending on the use case, this data is visualized, cleaned, checked, visualized, and processed for various purposes. However, this data may encounter many problems such as inaccuracy, duplication, absence, etc. Such issues can be regarded as anomalies that deviate from a referential point, which can be caused by malicious attackers, abnormal behavior of systems, and a failure of devices, transmission channels, or data processing units. Anomaly detection is still one of the most important issues in cybersecurity, especially when it comes to system monitoring, automated forensics, and post-mortem analysis, which require anomaly detection mechanisms. In the literature, different approaches have been developed to detect anomalies, which can be classified as statistic-based, semantic-based, clustering-based, classification-based, and deep learning-based, depending on the algorithms used. This survey focuses on knowledge-based approaches, a sub-category of semantic-based approaches, as opposed to statistical/learning approaches. We provide a detailed comparison of the recent work in knowledge-based subcategories, namely, rule-based, score-based, and hybrid. We described the components of a knowledge-based system and the steps required to process raw data for anomaly detection. Furthermore, we have collected for each approach, when available, information about its semantic expressiveness, computational complexity, and application domain. Finally, we identify the challenges and discuss some future research directions in knowledge-based anomaly detection. Identifying such approaches and challenges can help cybersecurity engineers design better models that meet their application requirements.
引用
收藏
页数:21
相关论文
共 50 条
  • [1] Anomaly detection for space information networks: A survey of challenges, techniques, and future directions
    Diro, Abebe
    Kaisar, Shahriar
    V. Vasilakos, Athanasios
    Anwar, Adnan
    Nasirian, Araz
    Olani, Gaddisa
    COMPUTERS & SECURITY, 2024, 139
  • [2] Skeletal Video Anomaly Detection Using Deep Learning: Survey, Challenges, and Future Directions
    Mishra, Pratik K.
    Mihailidis, Alex
    Khan, Shehroz S.
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2024, 8 (02): : 1073 - 1085
  • [3] Online model-based anomaly detection in multivariate time series: Taxonomy, survey, research challenges and future directions
    Correia, Lucas
    Goos, Jan-Christoph
    Klein, Philipp
    Baeck, Thomas
    Kononova, Anna V.
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2024, 138
  • [4] Knowledge-based sales advisory: Experiences and future directions
    Jannach, Dietmar
    Zanker, Markus
    ICE-B 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON E-BUSINESS, 2006, : 200 - +
  • [5] Malware Detection Issues, Challenges, and Future Directions: A Survey
    Aboaoja, Faitouri A.
    Zainal, Anazida
    Ghaleb, Fuad A.
    Al-rimy, Bander Ali Saleh
    Eisa, Taiseer Abdalla Elfadil
    Elnour, Asma Abbas Hassan
    APPLIED SCIENCES-BASEL, 2022, 12 (17):
  • [6] Dynamic Knowledge-Based Tracking and Autonomous Anomaly Detection
    Chai, Jianduo
    He, Shaoming
    Shin, Hyo-Sang
    Tsourdos, Antonios
    IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS, 2024, 60 (02) : 1597 - 1611
  • [7] From Knowledge-based to Competency-based Computing Education: Future Directions
    Clear, Alison
    Clear, Tony
    Impagliazzo, John
    Wang, Pearl
    2020 IEEE FRONTIERS IN EDUCATION CONFERENCE (FIE 2020), 2020,
  • [8] Copy-move forgery detection: Survey, challenges and future directions
    Abd Warif, Nor Bakiah
    Wahab, Ainuddin Wahid Abdul
    Idris, Mohd Yamani Idna
    Ramli, Roziana
    Salleh, Rosli
    Shamshirband, Shahaboddin
    Choo, Kim-Kwang Raymond
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 75 : 259 - 278
  • [9] Data Analytics in Machine Learning: New Directions and Challenges in Knowledge-Based Systems
    Fujita, Hamido
    ADVANCES IN ENGINEERING RESEARCH AND APPLICATION, 2019, 63 : 3 - 3
  • [10] Deep crowd anomaly detection: state-of-the-art, challenges, and future research directions
    Sharif, Md. Haidar
    Jiao, Lei
    Omlin, Christian W.
    ARTIFICIAL INTELLIGENCE REVIEW, 2025, 58 (05)