A survey of anomaly detection techniques

被引:0
|
作者
Fatma M. Ghamry
Ghada M. El-Banby
Adel S. El-Fishawy
Fathi E. Abd El-Samie
Moawad I. Dessouky
机构
[1] Menoufia University,Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering
[2] Communication and Electronics Department,Department of Industrial Electronics and Control Engineering, Faculty of Electronic Engineering
[3] Bilbeis Higher Institute for Engineering,Department of Information Technology, College of Computer and Information Sciences
[4] BHIE,undefined
[5] Menoufia University,undefined
[6] Princess Nourah Bint Abdulrahman University,undefined
来源
Journal of Optics | 2024年 / 53卷
关键词
Object detection; Anomaly detection; Image processing; Medical images;
D O I
暂无
中图分类号
学科分类号
摘要
The phrase "anomaly detection" is often used to describe any technique that looks for samples that differ from expected patterns. Depending on availability of data labels, types of abnormalities and applications, many anomaly detection techniques have been developed. This study aims to give a well-organized and a thorough review of anomaly detection techniques. We think it will aid in a better understanding of the topic of anomaly detection. It also presents the different approaches introduced in the literature for anomaly detection from images as well as other patterns. Despite the common availability of categorical data in practice, anomaly detection from categorical data has received a relatively little attention as compared to that from quantitative data. We divide the anomaly detection research methodologies into distinct categories. We describe the fundamental anomaly detection techniques, as well as their modifications and importantance. In addition, we highlight the merits and demerits of each category. Finally, we discuss the research gaps and limitations encountered, when using anomaly detection techniques for categorical data to solve real-world problems.
引用
收藏
页码:756 / 774
页数:18
相关论文
共 50 条
  • [1] A survey of anomaly detection techniques
    Ghamry, Fatma M.
    El-Banby, Ghada M.
    El-Fishawy, Adel S.
    Abd El-Samie, Fathi E.
    Dessouky, Moawad I.
    JOURNAL OF OPTICS-INDIA, 2024, 53 (02): : 756 - 774
  • [2] BGP Anomaly Detection Techniques: A Survey
    Al-Musawi, Bahaa
    Branch, Philip
    Armitage, Grenville
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (01): : 377 - 396
  • [3] A survey of network anomaly detection techniques
    Ahmed, Mohiuddin
    Mahmood, Abdun Naser
    Hu, Jiankun
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 : 19 - 31
  • [4] A survey of anomaly detection techniques in financial domain
    Ahmed, Mohiuddin
    Mahmood, Abdun Naser
    Islam, Md. Rafiqul
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 55 : 278 - 288
  • [5] Survey on Anomaly Detection using Data Mining Techniques
    Agrawal, Shikha
    Agrawal, Jitendra
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 19TH ANNUAL CONFERENCE, KES-2015, 2015, 60 : 708 - 713
  • [6] Anomaly Detection Techniques using Deep Learning in IoT: A Survey
    Sharma, Bhawana
    Sharma, Lokesh
    Lal, Chhagan
    PROCEEDINGS OF 2019 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND KNOWLEDGE ECONOMY (ICCIKE' 2019), 2019, : 146 - 149
  • [7] A Survey on Blockchain Anomaly Detection Using Data Mining Techniques
    Li, Ji
    Gu, Chunxiang
    Wei, Fushan
    Chen, Xi
    BLOCKCHAIN AND TRUSTWORTHY SYSTEMS, BLOCKSYS 2019, 2020, 1156 : 491 - 504
  • [8] A Survey of BGP Anomaly Detection Using Machine Learning Techniques
    Hammood, Noor Hadi
    Al-Musawi, Bahaa
    Alhilali, Ahmed Hazim
    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY (ATIS 2021), 2022, 1554 : 109 - 120
  • [9] A comprehensive survey of anomaly detection techniques for high dimensional big data
    Srikanth Thudumu
    Philip Branch
    Jiong Jin
    Jugdutt (Jack) Singh
    Journal of Big Data, 7
  • [10] Deep Learning Techniques for Anomaly based Intrusion Detection System: A Survey
    Kumar, Yogendra
    Chouhan, Lokesh
    Subba, Basant
    2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL PERFORMANCE EVALUATION (COMPE-2021), 2021, : 915 - 920