Anomaly detection: A survey

@article{Chandola2009AnomalyDA,
  title={Anomaly detection: A survey},
  author={V. Chandola and A. Banerjee and V. Kumar},
  journal={ACM Comput. Surv.},
  year={2009},
  volume={41},
  pages={15:1-15:58}
}
  • V. Chandola, A. Banerjee, V. Kumar
  • Published 2009
  • Computer Science
  • ACM Comput. Surv.
  • Anomaly detection is an important problem that has been researched within diverse research areas and application domains. [...] Key Method This template provides an easier and more succinct understanding of the techniques belonging to each category. Further, for each category, we identify the advantages and disadvantages of the techniques in that category. We also provide a discussion on the computational complexity of the techniques since it is an important issue in real application domains. We hope that this…Expand Abstract

    Figures, Tables, and Topics from this paper.

    Isolation-Based Anomaly Detection
    • 435
    • PDF
    A survey of anomaly detection techniques in financial domain
    • 145
    • Highly Influenced
    • PDF
    A Comparative Evaluation of Unsupervised Anomaly Detection Algorithms for Multivariate Data
    • 307
    • PDF
    Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
    • 1,015
    • PDF
    Network Anomaly Detection: Methods, Systems and Tools
    • 666
    • Highly Influenced
    • PDF
    Data preprocessing for anomaly based network intrusion detection: A review
    • 210
    • PDF
    A survey of network anomaly detection techniques
    • 445
    • PDF
    Anomaly Detection Analysis of Intrusion Data Using Supervised & Unsupervised Approach
    • 63
    • PDF

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 28 REFERENCES
    A Machine Learning Approach to Anomaly Detection
    • 82
    • Highly Influential
    • PDF
    Estimating the Support of a High-Dimensional Distribution
    • 4,011
    • Highly Influential
    • PDF
    ROCK: A Robust Clustering Algorithm for Categorical Attributes
    • 534
    • Highly Influential
    • PDF
    Activity monitoring: noticing interesting changes in behavior
    • 467
    • Highly Influential
    Discovering cluster-based local outliers
    • 541
    • Highly Influential
    • PDF
    NSOM: A Real-Time Network-Based Intrusion Detection System Using Self-Organizing Maps
    • 104
    • Highly Influential
    • PDF
    Markov monitoring with unknown states
    • 106
    • Highly Influential
    • PDF
    Rejection of Outliers
    • 346
    • Highly Influential
    Outlier Detection in Multivariate Time Series by Projection Pursuit
    • 97
    • Highly Influential
    • PDF