Machine Learning for Anomaly Detection: A Systematic Review

Anomaly detection has been used for decades to identify and extract anomalous components from data. Many techniques have been used to detect anomalies. One of the increasingly significant techniques is Machine Learning (ML), which plays an important role in this area. In this research paper, we conduct a Systematic Literature Review (SLR) which analyzes ML models that detect anomalies in their application. Our review analyzes the models from four perspectives; the applications of anomaly detection, ML techniques, performance metrics for ML models, and the classification of anomaly detection. In our review, we have identified 290 research articles, written from 2000-2020, that discuss ML techniques for anomaly detection. After analyzing the selected research articles, we present 43 different applications of anomaly detection found in the selected research articles. Moreover, we identify 29 distinct ML models used in the identification of anomalies. Finally, we present 22 different datasets that are applied in experiments on anomaly detection, as well as many other general datasets. In addition, we observe that unsupervised anomaly detection has been adopted by researchers more than other classification anomaly detection systems. Detection of anomalies using ML models is a promising area of research, and there are a lot of ML models that have been implemented by researchers. Therefore, we provide researchers with recommendations and guidelines based on this review.

[1]  Guofei Gu,et al.  Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems , 2006, Sixth International Conference on Data Mining (ICDM'06).

[2]  Victoria J. Hodge,et al.  A Survey of Outlier Detection Methodologies , 2004, Artificial Intelligence Review.

[3]  Mohammad Zulkernine,et al.  Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection , 2006, 2006 IEEE International Conference on Communications.

[4]  Takehisa Yairi,et al.  An Anomaly Detection Method for Spacecraft Using Relevance Vector Learning , 2005, PAKDD.

[5]  Rachel Greenstadt,et al.  Using Machine Learning for Behavior-Based Access Control: Scalable Anomaly Detection on TCP Connections and HTTP Requests , 2013, MILCOM 2013 - 2013 IEEE Military Communications Conference.

[6]  Sahin Albayrak,et al.  Monitoring Smartphones for Anomaly Detection , 2008, Mob. Networks Appl..

[7]  Christopher Leckie,et al.  High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning , 2016, Pattern Recognit..

[8]  Mahmood Fathy,et al.  Deep-anomaly: Fully convolutional neural network for fast anomaly detection in crowded scenes , 2016, Comput. Vis. Image Underst..

[9]  Amir H. Gandomi,et al.  Optimal virtual machine selection for anomaly detection using a swarm intelligence approach , 2019, Appl. Soft Comput..

[10]  Marimuthu Palaniswami,et al.  Centered Hyperspherical and Hyperellipsoidal One-Class Support Vector Machines for Anomaly Detection in Sensor Networks , 2010, IEEE Transactions on Information Forensics and Security.

[11]  Tuomo Sipola,et al.  Anomaly Detection from Network Logs Using Diffusion Maps , 2011, EANN/AIAI.

[12]  Carla E. Brodley,et al.  Anomaly Detection Using an Ensemble of Feature Models , 2010, 2010 IEEE International Conference on Data Mining.

[13]  Vasant Honavar,et al.  Learning Classifiers for Misuse Detection Using a Bag of System Calls Representation , 2005, ISI.

[14]  Abdallah Shami,et al.  Data Mining Techniques in Intrusion Detection Systems: A Systematic Literature Review , 2018, IEEE Access.

[15]  Gang He,et al.  Anomaly Detection for Key Performance Indicators Through Machine Learning , 2018, 2018 International Conference on Network Infrastructure and Digital Content (IC-NIDC).

[16]  Shikha Agrawal,et al.  Survey on Anomaly Detection using Data Mining Techniques , 2015, KES.

[17]  Peter Filzmoser,et al.  Robust feature selection and robust PCA for internet traffic anomaly detection , 2012, 2012 Proceedings IEEE INFOCOM.

[18]  Marimuthu Palaniswami,et al.  CESVM: Centered Hyperellipsoidal Support Vector Machine Based Anomaly Detection , 2008, 2008 IEEE International Conference on Communications.

[19]  Davide Cozzolino,et al.  Single-image splicing localization through autoencoder-based anomaly detection , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).

[20]  Li Guo,et al.  Network anomaly detection based on TCM-KNN algorithm , 2007, ASIACCS '07.

[21]  Ioannis Lambadaris,et al.  Network traffic anomaly detection using clustering techniques and performance comparison , 2013, 2013 26th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE).

[22]  Fang Dong,et al.  A hybrid unsupervised clustering-based anomaly detection method , 2021, Tsinghua Science and Technology.

[23]  Amutha Prabakar Muniyandi,et al.  Network Anomaly Detection by Cascading K-Means Clustering and C4.5 Decision Tree algorithm , 2012 .

[24]  Yi Du,et al.  Anomaly detection in traffic using L1-norm minimization extreme learning machine , 2015, Neurocomputing.

[25]  Jung-Min Park,et al.  An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.

[26]  Amy Loutfi,et al.  Sleep Stage Classification Using Unsupervised Feature Learning , 2012, Adv. Artif. Neural Syst..

[27]  Fabio A. González,et al.  Anomaly Detection Using Real-Valued Negative Selection , 2003, Genetic Programming and Evolvable Machines.

[28]  Ahmed Dawoud,et al.  Deep Learning for Network Anomalies Detection , 2018, 2018 International Conference on Machine Learning and Data Engineering (iCMLDE).

[29]  Vrizlynn L. L. Thing,et al.  IEEE 802.11 Network Anomaly Detection and Attack Classification: A Deep Learning Approach , 2017, 2017 IEEE Wireless Communications and Networking Conference (WCNC).

[30]  Mohammed Samaka,et al.  Machine Learning for Anomaly Detection and Categorization in Multi-Cloud Environments , 2017, 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud).

[31]  Valeria Bertacco,et al.  Machine learning-based anomaly detection for post-silicon bug diagnosis , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[32]  Muhammad Munwar Iqbal,et al.  Enhanced Network Anomaly Detection Based on Deep Neural Networks , 2018, IEEE Access.

[33]  Lance Sherry,et al.  Anomaly detection in aircraft data using Recurrent Neural Networks (RNN) , 2016, 2016 Integrated Communications Navigation and Surveillance (ICNS).

[34]  D. Ashok Kumar,et al.  A Novel Algorithm for Network Anomaly Detection Using Adaptive Machine Learning , 2018 .

[35]  Lovekesh Vig,et al.  Anomaly detection in ECG time signals via deep long short-term memory networks , 2015, 2015 IEEE International Conference on Data Science and Advanced Analytics (DSAA).

[36]  Heesung Kwon,et al.  Kernel Eigenspace Separation Transform for Subspace Anomaly Detection in Hyperspectral Imagery , 2007, IEEE Geoscience and Remote Sensing Letters.

[37]  Maghsoud Abbaspour,et al.  An anomaly-based botnet detection approach for identifying stealthy botnets , 2011, 2011 IEEE International Conference on Computer Applications and Industrial Electronics (ICCAIE).

[38]  Nathalie Japkowicz,et al.  Frequency-based anomaly detection for the automotive CAN bus , 2015, 2015 World Congress on Industrial Control Systems Security (WCICSS).

[39]  Mohammad Esmalifalak,et al.  A data mining approach for fault diagnosis: An application of anomaly detection algorithm , 2014 .

[40]  Antonio Liotta,et al.  Spatial anomaly detection in sensor networks using neighborhood information , 2017, Inf. Fusion.

[41]  H. Dai,et al.  Applying both positive and negative selection to supervised learning for anomaly detection , 2005, GECCO '05.

[42]  Salim Hariri,et al.  Wireless Anomaly Detection Based on IEEE 802.11 Behavior Analysis , 2015, IEEE Transactions on Information Forensics and Security.

[43]  Xin Xu,et al.  Sequential anomaly detection based on temporal-difference learning: Principles, models and case studies , 2010, Appl. Soft Comput..

[44]  Mohammad Zulkernine,et al.  An anomaly intrusion detection method using the CSI-KNN algorithm , 2008, SAC '08.

[45]  Jack Beuth,et al.  Anomaly Detection and Classification in a Laser Powder Bed Additive Manufacturing Process using a Trained Computer Vision Algorithm , 2018 .

[46]  Namita Mittal,et al.  Hybrid Approach for Detection of Anomaly Network Traffic using Data Mining Techniques , 2012 .

[47]  Yu-Xin Meng,et al.  The practice on using machine learning for network anomaly intrusion detection , 2011, 2011 International Conference on Machine Learning and Cybernetics.

[48]  Rommel N. Carvalho,et al.  Deep Learning Anomaly Detection as Support Fraud Investigation in Brazilian Exports and Anti-Money Laundering , 2016, 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA).

[49]  Xiaobo Zhou,et al.  A-GHSOM: An adaptive growing hierarchical self organizing map for network anomaly detection , 2012, J. Parallel Distributed Comput..

[50]  Sufyan T. Faraj Al-Janabi,et al.  A Neural Network Based Anomaly Intrusion Detection System , 2011, 2011 Developments in E-systems Engineering.

[51]  Taeshik Shon,et al.  A hybrid machine learning approach to network anomaly detection , 2007, Inf. Sci..

[52]  Marcus Chang,et al.  Mote-Based Online Anomaly Detection Using Echo State Networks , 2009, DCOSS.

[53]  Alfonso Valdes,et al.  Anomaly Detection in Electrical Substation Circuits via Unsupervised Machine Learning , 2016, 2016 IEEE 17th International Conference on Information Reuse and Integration (IRI).

[54]  Y. Kawahara,et al.  Telemetry-mining: a machine learning approach to anomaly detection and fault diagnosis for space systems , 2006, 2nd IEEE International Conference on Space Mission Challenges for Information Technology (SMC-IT'06).

[55]  Yuan-Kai Wang,et al.  Real-time camera anomaly detection for real-world video surveillance , 2011, 2011 International Conference on Machine Learning and Cybernetics.

[56]  M. M. A. Hashem,et al.  Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches , 2019, Internet Things.

[57]  Sushil Jajodia,et al.  Applications of Data Mining in Computer Security , 2002, Advances in Information Security.

[58]  Ganesh Kumar,et al.  Anomaly Detection System in Cloud Environment Using Fuzzy Clustering Based ANN , 2015, Mobile Networks and Applications.

[59]  B. Muthukumar,et al.  Intrusion Detection System (IDS): Anomaly Detection Using Outlier Detection Approach , 2015 .

[60]  Wei Li,et al.  Transferred Deep Learning for Anomaly Detection in Hyperspectral Imagery , 2017, IEEE Geoscience and Remote Sensing Letters.

[61]  Shuicheng Yan,et al.  Detecting Anomaly in Videos from Trajectory Similarity Analysis , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[62]  Luiz Eduardo Soares de Oliveira,et al.  Toward a reliable anomaly-based intrusion detection in real-world environments , 2017, Comput. Networks.

[63]  Georg Langs,et al.  Unsupervised Anomaly Detection with Generative Adversarial Networks to Guide Marker Discovery , 2017, IPMI.

[64]  Li Ma,et al.  Anomaly Detection for Hyperspectral Images Based on Robust Locally Linear Embedding , 2010 .

[65]  Gianluca Dini,et al.  MADAM: A Multi-level Anomaly Detector for Android Malware , 2012, MMM-ACNS.

[66]  Sangho Choe,et al.  Anomaly Detection in Power Quality Measurements Using Proximity-Based Unsupervised Machine Learning Techniques , 2019, 2019 Electric Power Quality and Supply Reliability Conference (PQ) & 2019 Symposium on Electrical Engineering and Mechatronics (SEEM).

[67]  Shilin He,et al.  Experience Report: System Log Analysis for Anomaly Detection , 2016, 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE).

[68]  Carla E. Brodley,et al.  FRaC: a feature-modeling approach for semi-supervised and unsupervised anomaly detection , 2012, Data Mining and Knowledge Discovery.

[69]  Göran Falkman,et al.  Online Learning and Sequential Anomaly Detection in Trajectories , 2014, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[70]  Rania A. Mokhtar,et al.  Anomaly detection approach using hybrid algorithm of data mining technique , 2017, 2017 International Conference on Communication, Control, Computing and Electronics Engineering (ICCCCEE).

[71]  Erik Elmroth,et al.  Performance Anomaly Detection and Bottleneck Identification , 2015, ACM Comput. Surv..

[72]  Juntae Kim,et al.  The Anomaly Detection by Using DBSCAN Clustering with Multiple Parameters , 2011, 2011 International Conference on Information Science and Applications.

[73]  Sandeep Sharma,et al.  Anomaly Detection in Medical Wireless Sensor Networks using Machine Learning Algorithms , 2015 .

[74]  Asok Ray,et al.  Symbolic time series analysis for anomaly detection: A comparative evaluation , 2005, Signal Process..

[75]  Miriam A. M. Capretz,et al.  An ensemble learning framework for anomaly detection in building energy consumption , 2017 .

[76]  Dan Pei,et al.  Opprentice: Towards Practical and Automatic Anomaly Detection Through Machine Learning , 2015, Internet Measurement Conference.

[77]  Xue-Qin Zhang,et al.  CH-SVM Based Network Anomaly Detection , 2007, 2007 International Conference on Machine Learning and Cybernetics.

[78]  Francesco Palmieri,et al.  Network anomaly detection through nonlinear analysis , 2010, Comput. Secur..

[79]  Faisal Muhammad Shah,et al.  An ensemble framework of anomaly detection using hybridized feature selection approach (HFSA) , 2015, 2015 SAI Intelligent Systems Conference (IntelliSys).

[80]  Yang Wang,et al.  A Deep Learning Approach for Network Anomaly Detection Based on AMF-LSTM , 2018, NPC.

[81]  Yuchong Li,et al.  Network-Wide Traffic Anomaly Detection and Localization Based on Robust Multivariate Probabilistic Calibration Model , 2015 .

[82]  S. Venkatesan,et al.  Anomaly Detection in IPv4 and IPv6 networks using machine learning , 2015, 2015 Annual IEEE India Conference (INDICON).

[83]  Yusheng Ji,et al.  Weighting technique on multi-timeline for machine learning-based anomaly detection system , 2015, 2015 International Conference on Computing, Communication and Security (ICCCS).

[84]  Hans Wehn,et al.  2015 Ieee International Conference on Big Data (big Data) Maritime Situation Analysis Framework Vessel Interaction Classification and Anomaly Detection , 2022 .

[85]  Anukool Lakhina,et al.  Multivariate Online Anomaly Detection Using Kernel Recursive Least Squares , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[86]  E. Sivasankar,et al.  Anomaly Detection on Shuttle data using Unsupervised Learning Techniques , 2019, 2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE).

[87]  Ejaz Ahmed,et al.  Real-time big data processing for anomaly detection: A Survey , 2019, Int. J. Inf. Manag..

[88]  Aashis Tiwari,et al.  Anomaly detection in IIoT: a case study using machine learning , 2018, COMAD/CODS.

[89]  Larry J. Greenstein,et al.  ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access Networks , 2009, IEEE INFOCOM 2009.

[90]  Sylvio Barbon Junior,et al.  Anomaly detection using the correlational paraconsistent machine with digital signatures of network segment , 2017, Inf. Sci..

[91]  Lyudmila Sukhostat,et al.  Anomaly detection in network traffic using extreme learning machine , 2016, 2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT).

[92]  Zheng Huang,et al.  Anomaly detection in electronic invoice systems based on machine learning , 2020, Inf. Sci..

[93]  Sung-Bae Cho,et al.  Evolutionary neural networks for anomaly detection based on the behavior of a program , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[94]  Vir V. Phoha,et al.  K-Means+ID3: A Novel Method for Supervised Anomaly Detection by Cascading K-Means Clustering and ID3 Decision Tree Learning Methods , 2007, IEEE Transactions on Knowledge and Data Engineering.

[95]  Sung-Bae Cho,et al.  Evolutionary Learning Program's Behavior in Neural Networks for Anomaly Detection , 2004, ICONIP.

[96]  Song Fu,et al.  Adaptive Anomaly Identification by Exploring Metric Subspace in Cloud Computing Infrastructures , 2013, 2013 IEEE 32nd International Symposium on Reliable Distributed Systems.

[97]  Kai Ming Ting,et al.  Defying the gravity of learning curve: a characteristic of nearest neighbour anomaly detectors , 2016, Machine Learning.

[98]  Andy Brown,et al.  Recurrent Neural Network Attention Mechanisms for Interpretable System Log Anomaly Detection , 2018, Proceedings of the First Workshop on Machine Learning for Computing Systems.

[99]  Seref Sagiroglu,et al.  Big data analytics for network anomaly detection from netflow data , 2017, 2017 International Conference on Computer Science and Engineering (UBMK).

[100]  Jinoh Kim,et al.  An Empirical Evaluation of Deep Learning for Network Anomaly Detection , 2018, 2018 International Conference on Computing, Networking and Communications (ICNC).

[101]  Andrew Walenstein,et al.  A Survey of Anomaly Detection for Connected Vehicle Cybersecurity and Safety , 2018, 2018 IEEE Intelligent Vehicles Symposium (IV).

[102]  Hong-Zheng Fang,et al.  Anomaly detection of spacecraft based on least squares support vector machine , 2011, 2011 Prognostics and System Health Managment Confernece.

[103]  Mary Shaw,et al.  Semantic anomaly detection in online data sources , 2002, ICSE '02.

[104]  Chun-De Yang,et al.  Using Immune Algorithm to Optimize Anomaly Detection Based on SVM , 2006, 2006 International Conference on Machine Learning and Cybernetics.

[105]  Ali Alqazzaz,et al.  AD-IoT: Anomaly Detection of IoT Cyberattacks in Smart City Using Machine Learning , 2019, 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC).

[106]  Joel J. P. C. Rodrigues,et al.  A comprehensive survey on network anomaly detection , 2018, Telecommunication Systems.

[107]  Leandros A. Maglaras,et al.  Intrusion detection in SCADA systems using machine learning techniques , 2014, 2014 Science and Information Conference.

[108]  Nizar Bouguila,et al.  Unsupervised Anomaly Intrusion Detection via Localized Bayesian Feature Selection , 2011, 2011 IEEE 11th International Conference on Data Mining.

[109]  V. Rao Vemuri,et al.  Adaptive anomaly detection with evolving connectionist systems , 2007, J. Netw. Comput. Appl..

[110]  Gian Antonio Susto,et al.  Anomaly Detection through on-line Isolation Forest: An application to plasma etching , 2017, 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).

[111]  Alfredo De Santis,et al.  Network anomaly detection with the restricted Boltzmann machine , 2013, Neurocomputing.

[112]  Valeria V. Krzhizhanovskaya,et al.  Anomaly detection in earth dam and levee passive seismic data using support vector machines and automatic feature selection , 2017, J. Comput. Sci..

[113]  C. Purdy,et al.  Reducing calculation requirements in FPGA implementation of deep learning algorithms for online anomaly intrusion detection , 2017, 2017 IEEE National Aerospace and Electronics Conference (NAECON).

[114]  Wei-Yang Lin,et al.  Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..

[115]  Yuh-Jye Lee,et al.  A study on anomaly detection ensembles , 2017, J. Appl. Log..

[116]  Gisung Kim,et al.  A novel hybrid intrusion detection method integrating anomaly detection with misuse detection , 2014, Expert Syst. Appl..

[117]  Lei Shi,et al.  MAD-GAN: Multivariate Anomaly Detection for Time Series Data with Generative Adversarial Networks , 2019, ICANN.

[118]  R. Zuo Machine Learning of Mineralization-Related Geochemical Anomalies: A Review of Potential Methods , 2017, Natural Resources Research.

[119]  J. Albert Mayan,et al.  Anomaly Detection by Using CFS Subset and Neural Network with WEKA Tools , 2019 .

[120]  Ling Huang,et al.  ANTIDOTE: understanding and defending against poisoning of anomaly detectors , 2009, IMC '09.

[121]  Amit K. Roy-Chowdhury,et al.  Context-Aware Activity Recognition and Anomaly Detection in Video , 2013, IEEE Journal of Selected Topics in Signal Processing.

[122]  Yongdae Kim,et al.  A machine learning framework for network anomaly detection using SVM and GA , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.

[123]  Marius Kloft,et al.  Image Anomaly Detection with Generative Adversarial Networks , 2018, ECML/PKDD.

[124]  Seyed Mojtaba Hosseini Bamakan,et al.  Ramp loss one-class support vector machine; A robust and effective approach to anomaly detection problems , 2018, Neurocomputing.

[125]  Kehua Miao,et al.  Detecting Anomalies in Application Performance Management System with Machine Learning Algorihms , 2019, 2019 3rd International Conference on Electronic Information Technology and Computer Engineering (EITCE).

[126]  Miguel Nicolau,et al.  A Hybrid Autoencoder and Density Estimation Model for Anomaly Detection , 2016, PPSN.

[127]  Xiao‐Hai Yan,et al.  Estimation of subsurface temperature anomaly in the Indian Ocean during recent global surface warming hiatus from satellite measurements: A support vector machine approach , 2015 .

[128]  Ljiljana Trajkovic,et al.  Performance evaluation of BGP anomaly classifiers , 2015, 2015 Third International Conference on Digital Information, Networking, and Wireless Communications (DINWC).

[129]  Yugyung Lee,et al.  Real-time network anomaly detection system using machine learning , 2015, 2015 11th International Conference on the Design of Reliable Communication Networks (DRCN).

[130]  Murat Can Ganiz,et al.  An anomaly detection framework for BGP , 2011, 2011 International Symposium on Innovations in Intelligent Systems and Applications.

[131]  Meijuan Yin,et al.  Network Anomaly Detection Using Random Forests and Entropy of Traffic Features , 2012, 2012 Fourth International Conference on Multimedia Information Networking and Security.

[132]  Antonio Liotta,et al.  Anomaly Detection in Sensor Systems Using Lightweight Machine Learning , 2013, 2013 IEEE International Conference on Systems, Man, and Cybernetics.

[133]  Joel J. P. C. Rodrigues,et al.  Hybrid Deep-Learning-Based Anomaly Detection Scheme for Suspicious Flow Detection in SDN: A Social Multimedia Perspective , 2019, IEEE Transactions on Multimedia.

[134]  Ira Assent,et al.  AnyOut: Anytime Outlier Detection on Streaming Data , 2012, DASFAA.

[135]  Ryohei Fujimaki,et al.  Anomaly Detection Support Vector Machine and Its Application to Fault Diagnosis , 2008, 2008 Eighth IEEE International Conference on Data Mining.

[136]  Ali Gökhan Yavuz,et al.  Network Anomaly Detection with Stochastically Improved Autoencoder Based Models , 2017, 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud).

[137]  Xi Chen,et al.  Direct Robust Matrix Factorizatoin for Anomaly Detection , 2011, 2011 IEEE 11th International Conference on Data Mining.

[138]  Amaury Lendasse,et al.  Anomaly-Based Intrusion Detection Using Extreme Learning Machine and Aggregation of Network Traffic Statistics in Probability Space , 2018, Cognitive Computation.

[139]  Emin Anarim,et al.  An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks , 2005, Expert Syst. Appl..

[140]  Shikha Agrawal,et al.  A Survey on Anomaly Detection in Network Intrusion Detection System Using Particle Swarm Optimization Based Machine Learning Techniques , 2013 .

[141]  Slim Abdennadher,et al.  Enhancing one-class support vector machines for unsupervised anomaly detection , 2013, ODD '13.

[142]  Abdallah Moubayed,et al.  Clustering Enabled Classification using Ensemble Feature Selection for Intrusion Detection , 2019, 2019 International Conference on Computing, Networking and Communications (ICNC).

[143]  Milos Manic,et al.  Fuzzy logic based anomaly detection for embedded network security cyber sensor , 2011, 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).

[144]  Yong Feng,et al.  An unsupervised anomaly intrusion detection algorithm based on swarm intelligence , 2005, 2005 International Conference on Machine Learning and Cybernetics.

[145]  Yizhou Yu,et al.  Anomaly detection in GPS data based on visual analytics , 2010, 2010 IEEE Symposium on Visual Analytics Science and Technology.

[146]  Randy C. Paffenroth,et al.  Anomaly Detection with Robust Deep Autoencoders , 2017, KDD.

[147]  Qing Li,et al.  Multi-Scale LSTM Model for BGP Anomaly Classification , 2018, IEEE Transactions on Services Computing.

[148]  Konstantinos Demertzis,et al.  A Hybrid Network Anomaly and Intrusion Detection Approach Based on Evolving Spiking Neural Network Classification , 2013, e-Democracy.

[149]  Borko Furht,et al.  Sensor fault and patient anomaly detection and classification in medical wireless sensor networks , 2013, 2013 IEEE International Conference on Communications (ICC).

[150]  Pedro Casas,et al.  Stream-based Machine Learning for Network Security and Anomaly Detection , 2018, Big-DAMA@SIGCOMM.

[151]  R. Jha,et al.  Anomaly detection in network traffic using K-mean clustering , 2016, 2016 3rd International Conference on Recent Advances in Information Technology (RAIT).

[152]  Georgios Kambourakis,et al.  The best of both worlds: a framework for the synergistic operation of host and cloud anomaly-based IDS for smartphones , 2014, EuroSec '14.

[153]  RadhaKanta Mahapatra,et al.  Business data mining - a machine learning perspective , 2001, Inf. Manag..

[154]  Jun Sun,et al.  Anomaly Detection for a Water Treatment System Using Unsupervised Machine Learning , 2017, 2017 IEEE International Conference on Data Mining Workshops (ICDMW).

[155]  Thomas G. Dietterich,et al.  Systematic construction of anomaly detection benchmarks from real data , 2013, ODD '13.

[156]  D. Dasgupta,et al.  Combining negative selection and classification techniques for anomaly detection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[157]  Dong Seong Kim,et al.  Fusions of GA and SVM for Anomaly Detection in Intrusion Detection System , 2005, ISNN.

[158]  Carla Purdy,et al.  Toward an Online Anomaly Intrusion Detection System Based on Deep Learning , 2016, 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA).

[159]  Martin Cooney,et al.  A holistic smart home demonstrator for anomaly detection and response , 2015, 2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).

[160]  Sung Deok Cha,et al.  SAD: web session anomaly detection based on parameter estimation , 2004, Comput. Secur..

[161]  Jun Morimoto,et al.  Nonlinear structure of escape-times to falls for a passive dynamic walker on an irregular slope: Anomaly detection using multi-class support vector machine and latent state extraction by canonical correlation analysis , 2011, 2011 IEEE/RSJ International Conference on Intelligent Robots and Systems.

[162]  Nhien-An Le-Khac,et al.  Collective Anomaly Detection Based on Long Short-Term Memory Recurrent Neural Networks , 2016, FDSE.

[163]  Hartmut König,et al.  Towards Learning Normality for Anomaly Detection in Industrial Control Networks , 2013, AIMS.

[164]  S. Srinoy,et al.  Anomaly-Based Intrusion Detection using Fuzzy Rough Clustering , 2006, 2006 International Conference on Hybrid Information Technology.

[165]  Mohammad Zulkernine,et al.  Efficacy of Hidden Markov Models Over Neural Networks in Anomaly Intrusion Detection , 2006, 30th Annual International Computer Software and Applications Conference (COMPSAC'06).

[166]  Qinghong Yang,et al.  An anomaly prediction framework for financial IT systems using hybrid machine learning methods , 2019 .

[167]  Jinoh Kim,et al.  A survey of deep learning-based network anomaly detection , 2017, Cluster Computing.

[168]  Martin Knahl,et al.  Anomaly Detection in IaaS Clouds , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.

[169]  Balachander Krishnamurthy,et al.  Rule-Based Anomaly Detection on IP Flows , 2009, IEEE INFOCOM 2009.

[170]  Martial Hebert,et al.  A Discriminative Framework for Anomaly Detection in Large Videos , 2016, ECCV.

[171]  Raman K. Mehra,et al.  Ensemble methods for anomaly detection and distributed intrusion detection in Mobile Ad-Hoc Networks , 2008, Inf. Fusion.

[172]  Claudia Eckert,et al.  Is negative selection appropriate for anomaly detection? , 2005, GECCO '05.

[173]  Iqbal Gondal,et al.  Unitary Anomaly Detection for Ubiquitous Safety in Machine Health Monitoring , 2012, ICONIP.

[174]  Shadi Aljawarneh,et al.  Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model , 2017, J. Comput. Sci..

[175]  Anton van den Hengel,et al.  Deep Anomaly Detection with Deviation Networks , 2019, KDD.

[176]  Guifa Teng,et al.  Unsupervised SVM Based on p-kernels for Anomaly Detection , 2006, First International Conference on Innovative Computing, Information and Control - Volume I (ICICIC'06).

[177]  Vipin Kumar,et al.  Anomaly Detection for Discrete Sequences: A Survey , 2012, IEEE Transactions on Knowledge and Data Engineering.

[178]  Giulio Di Gravio,et al.  Machine learning for anomaly detection and process phase classification to improve safety and maintenance activities , 2020, Journal of Manufacturing Systems.

[179]  Chen Shen,et al.  Spatio-Temporal AutoEncoder for Video Anomaly Detection , 2017, ACM Multimedia.

[180]  Fatemeh Barani,et al.  ManetSVM: Dynamic anomaly detection using one-class support vector machine in MANETs , 2013, 2013 10th International ISC Conference on Information Security and Cryptology (ISCISC).

[181]  Andrew S. Miner,et al.  Anomaly intrusion detection using one class SVM , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..

[182]  Sanjay Ranka,et al.  Conditional Anomaly Detection , 2007, IEEE Transactions on Knowledge and Data Engineering.

[183]  Salvatore J. Stolfo,et al.  Anomaly Detection in Computer Security and an Application to File System Accesses , 2005, ISMIS.

[184]  Brian Litt,et al.  Semi-Supervised Anomaly Detection for EEG Waveforms Using Deep Belief Nets , 2010, 2010 Ninth International Conference on Machine Learning and Applications.

[185]  Mingyan Teng,et al.  Anomaly detection on time series , 2010, 2010 IEEE International Conference on Progress in Informatics and Computing.

[186]  Jugal K. Kalita,et al.  Network Anomaly Detection: Methods, Systems and Tools , 2014, IEEE Communications Surveys & Tutorials.

[187]  Huang Chuanhe,et al.  Anomaly detection using Support Vector Machine classification with k-Medoids clustering , 2012, 2012 Third Asian Himalayas International Conference on Internet.

[188]  Dong Il Kim,et al.  Network traffic anomalies detection and identification with flow monitoring , 2008, 2008 5th IFIP International Conference on Wireless and Optical Communications Networks (WOCN '08).

[189]  Pedro Casas,et al.  RawPower: Deep Learning based Anomaly Detection from Raw Network Traffic Measurements , 2018, SIGCOMM Posters and Demos.

[190]  Yves Le Traon,et al.  A training-resistant anomaly detection system , 2018, Comput. Secur..

[191]  Deepan Muthirayan,et al.  Hierarchical Temporal Memory Based Machine Learning for Real-Time, Unsupervised Anomaly Detection in Smart Grid: WiP Abstract , 2020, 2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS).

[192]  Chu-Hsing Lin,et al.  Anomaly Detection Using LibSVM Training Tools , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[193]  Hong Gu,et al.  Anomaly detection combining one-class SVMs and particle swarm optimization algorithms , 2010 .

[194]  Subutai Ahmad,et al.  Unsupervised real-time anomaly detection for streaming data , 2017, Neurocomputing.

[195]  Oliver Obst,et al.  Spatiotemporal Anomaly Detection in Gas Monitoring Sensor Networks , 2008, EWSN.

[196]  Stefano Zanero,et al.  Seeing the invisible: forensic uses of anomaly detection and machine learning , 2008, OPSR.

[197]  Michael J. Chapple,et al.  System Anomaly Detection: Mining Firewall Logs , 2006, 2006 Securecomm and Workshops.

[198]  Radu State,et al.  Machine Learning Approach for IP-Flow Record Anomaly Detection , 2011, Networking.

[199]  Takehisa Yairi,et al.  An approach to spacecraft anomaly detection problem using kernel feature space , 2005, KDD '05.

[200]  Qusay H. Mahmoud,et al.  A hybrid model for anomaly-based intrusion detection in SCADA networks , 2017, 2017 IEEE International Conference on Big Data (Big Data).

[201]  Song Fu,et al.  Performance Metric Selection for Autonomic Anomaly Detection on Cloud Computing Systems , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[202]  Sung-Bae Cho,et al.  Web traffic anomaly detection using C-LSTM neural networks , 2018, Expert Syst. Appl..

[203]  Ling Huang,et al.  Stealthy poisoning attacks on PCA-based anomaly detectors , 2009, SIGMETRICS Perform. Evaluation Rev..

[204]  Lalu Banoth,et al.  A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2017 .

[205]  David J. Hill,et al.  Anomaly detection in streaming environmental sensor data: A data-driven modeling approach , 2010, Environ. Model. Softw..

[206]  Marimuthu Palaniswami,et al.  Quarter Sphere Based Distributed Anomaly Detection in Wireless Sensor Networks , 2007, 2007 IEEE International Conference on Communications.

[207]  Zhenghong Xiao,et al.  An Anomaly Detection Scheme Based on Machine Learning for WSN , 2009, 2009 First International Conference on Information Science and Engineering.

[208]  Song Fu,et al.  An Anomaly Detection Framework for Autonomic Management of Compute Cloud Systems , 2010, 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops.

[209]  Kriangkrai Limthong,et al.  Network traffic anomaly detection using machine learning approaches , 2012, 2012 IEEE Network Operations and Management Symposium.

[210]  Mohammad Teshnehlab,et al.  An anomaly detection method to detect web attacks using Stacked Auto-Encoder , 2018, 2018 6th Iranian Joint Congress on Fuzzy and Intelligent Systems (CFIS).

[211]  Konrad Rieck,et al.  A close look on n-grams in intrusion detection: anomaly detection vs. classification , 2013, AISec.

[212]  Olfa Nasraoui,et al.  Anomaly detection based on unsupervised niche clustering with application to network intrusion detection , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).

[213]  Min Wu,et al.  Adaptive Cost-Sensitive Online Classification , 2018, IEEE Transactions on Knowledge and Data Engineering.

[214]  Fekadu Yihunie,et al.  Applying Machine Learning to Anomaly-Based Intrusion Detection Systems , 2019, 2019 IEEE Long Island Systems, Applications and Technology Conference (LISAT).

[215]  Qi Wang,et al.  Online Anomaly Detection in Crowd Scenes via Structure Analysis , 2015, IEEE Transactions on Cybernetics.

[216]  Peter W. Tse,et al.  Anomaly Detection Through a Bayesian Support Vector Machine , 2010, IEEE Transactions on Reliability.

[217]  Hitesh Shah,et al.  An anomaly detection in smart cities modeled as wireless sensor network , 2016, 2016 International Conference on Signal and Information Processing (IConSIP).

[218]  Jiankun Hu,et al.  Towards reliable data feature retrieval and decision engine in host-based anomaly detection systems , 2015, 2015 IEEE 10th Conference on Industrial Electronics and Applications (ICIEA).

[219]  Johnny S. Wong,et al.  On the symbiosis of specification-based and anomaly-based detection , 2010, Comput. Secur..

[220]  Jugal K. Kalita,et al.  A Survey of Outlier Detection Methods in Network Anomaly Identification , 2011, Comput. J..

[221]  Gisung Kim,et al.  Self-adaptive and dynamic clustering for online anomaly detection , 2011, Expert Syst. Appl..

[222]  Yaroslav M. Linder,et al.  Unsupervised Anomaly Detection in Time Series Using LSTM-Based Autoencoders , 2019, 2019 IEEE International Conference on Advanced Trends in Information Theory (ATIT).

[223]  Mahesh Chandra Govil,et al.  A comparative analysis of SVM and its stacking with other classification algorithm for intrusion detection , 2016, 2016 International Conference on Advances in Computing, Communication, & Automation (ICACCA) (Spring).

[224]  Diane J. Cook,et al.  Enhancing Anomaly Detection Using Temporal Pattern Discovery , 2009 .

[225]  Philip K. Chan,et al.  Learning rules for anomaly detection of hostile network traffic , 2003, Third IEEE International Conference on Data Mining.

[226]  Berend Jan van der Zwaag,et al.  RoADS: A Road Pavement Monitoring System for Anomaly Detection Using Smart Phones , 2015, MSM/MUSE/SenseML.

[227]  Philip K. Chan,et al.  Learning Rules and Clusters for Anomaly Detection in Network Traffic , 2005 .

[228]  Leman Akoglu,et al.  Less is More: Building Selective Anomaly Ensembles , 2015 .

[229]  James R. Gattiker,et al.  Anomaly Detection Enhanced Classification in Computer Intrusion Detection , 2002, SVM.

[230]  Eleazar Eskin,et al.  Detecting Errors within a Corpus using Anomaly Detection , 2000, ANLP.

[231]  Sridhar Adepu,et al.  Anomaly Detection in Cyber Physical Systems Using Recurrent Neural Networks , 2017, 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE).

[232]  Avishai Wool,et al.  Control variable classification, modeling and anomaly detection in Modbus/TCP SCADA systems , 2015, Int. J. Crit. Infrastructure Prot..

[233]  Yasser Yasami,et al.  A novel unsupervised classification approach for network anomaly detection by k-Means clustering and ID3 decision tree learning methods , 2010, The Journal of Supercomputing.

[234]  Xinbo Gao,et al.  Robust tensor subspace learning for anomaly detection , 2011, Int. J. Mach. Learn. Cybern..

[235]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[236]  Kevin B. Korb,et al.  Anomaly detection in vessel tracks using Bayesian networks , 2014, Int. J. Approx. Reason..

[237]  Roberto Proietti,et al.  Self-Taught Anomaly Detection With Hybrid Unsupervised/Supervised Machine Learning in Optical Networks , 2019, Journal of Lightwave Technology.

[238]  Manish Marwah,et al.  Thermal anomaly prediction in data centers , 2010, 2010 12th IEEE Intersociety Conference on Thermal and Thermomechanical Phenomena in Electronic Systems.

[239]  Zina Chkirbene,et al.  Hybrid Machine Learning for Network Anomaly Intrusion Detection , 2020, 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT).

[240]  Saadiah Yahya,et al.  Anomaly detection based on profile signature in network using machine learning technique , 2016, 2016 IEEE Region 10 Symposium (TENSYMP).

[241]  Naruemon Wattanapongsakorn,et al.  Network intrusion detection with Fuzzy Genetic Algorithm for unknown attacks , 2013, The International Conference on Information Networking 2013 (ICOIN).

[242]  Gabriel Maciá-Fernández,et al.  Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..

[243]  Carlos García Garino,et al.  An autonomous labeling approach to support vector machines algorithms for network traffic anomaly detection , 2012, Expert Syst. Appl..

[244]  Salvatore J. Stolfo,et al.  A Geometric Framework for Unsupervised Anomaly Detection , 2002, Applications of Data Mining in Computer Security.

[245]  Hans D. Schotten,et al.  Evaluation of Machine Learning-based Anomaly Detection Algorithms on an Industrial Modbus/TCP Data Set , 2018, ARES.

[246]  Leon Reznik,et al.  Machine Learning in Anomaly Detection: Example of Colluded Applications Attack in Android Devices , 2019, 2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA).

[247]  Anup Ghosh,et al.  Simple, state-based approaches to program-based anomaly detection , 2002, TSEC.

[248]  Weizhong Yan,et al.  One-class extreme learning machines for gas turbine combustor anomaly detection , 2016, 2016 International Joint Conference on Neural Networks (IJCNN).

[249]  Brett J. Borghetti,et al.  A Review of Anomaly Detection in Automated Surveillance , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[250]  Le Thanh Sach,et al.  An anomaly-based network intrusion detection system using Deep learning , 2017, 2017 International Conference on System Science and Engineering (ICSSE).

[251]  Pere Barlet-Ros,et al.  Practical anomaly detection based on classifying frequent traffic patterns , 2012, 2012 Proceedings IEEE INFOCOM Workshops.

[252]  Mohammed J. Zaki,et al.  ADMIT: anomaly-based data mining for intrusions , 2002, KDD.

[253]  R. Remya,et al.  A hybrid method based on genetic algorithm, self-organised feature map, and support vector machine for better network anomaly detection , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).

[254]  Baojiang Cui,et al.  Anomaly Detection Model Based on Hadoop Platform and Weka Interface , 2016, 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS).

[255]  Markus Schneider,et al.  Expected similarity estimation for large-scale batch and streaming anomaly detection , 2016, Machine Learning.

[256]  Albert Y. Zomaya,et al.  NHAD: Neuro-Fuzzy Based Horizontal Anomaly Detection in Online Social Networks , 2018, IEEE Transactions on Knowledge and Data Engineering.

[257]  Yuefei Zhu,et al.  A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.

[258]  Wei Xu,et al.  Improving one-class SVM for anomaly detection , 2003, Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693).

[259]  Tinoosh Mohsenin,et al.  Real-Time Anomaly Detection Framework for Many-Core Router through Machine-Learning Techniques , 2016, JETC.

[260]  Gholamhossein Dastghaibyfard,et al.  Two-tier network anomaly detection model: a machine learning approach , 2017, Journal of Intelligent Information Systems.

[261]  Yingbing Yu,et al.  A survey of anomaly intrusion detection techniques , 2012 .

[262]  Mohamed Farouk,et al.  A framework for efficient network anomaly intrusion detection with features selection , 2018, 2018 9th International Conference on Information and Communication Systems (ICICS).

[263]  Zhibo Pang,et al.  Anomaly detection based on machine learning in IoT-based vertical plant wall for indoor climate control , 2020, Building and Environment.

[264]  Saeed Amizadeh,et al.  Generic and Scalable Framework for Automated Time-series Anomaly Detection , 2015, KDD.

[265]  Dipika Narsingyani,et al.  Optimizing false positive in anomaly based intrusion detection using Genetic algorithm , 2015, 2015 IEEE 3rd International Conference on MOOCs, Innovation and Technology in Education (MITE).

[266]  Marc Sebban,et al.  Efficient Top Rank Optimization with Gradient Boosting for Supervised Anomaly Detection , 2017, ECML/PKDD.

[267]  James Zhang,et al.  Anomaly detection in wide area network meshes using two machine learning algorithms , 2019, Future Gener. Comput. Syst..

[268]  Xiaoqiang Lu,et al.  Learning deep event models for crowd anomaly detection , 2017, Neurocomputing.

[269]  C. A. Kumar,et al.  An analysis of supervised tree based classifiers for intrusion detection system , 2013, 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering.

[270]  Jiankun Hu,et al.  An efficient hidden Markov model training scheme for anomaly intrusion detection of server applications based on system calls , 2004, Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955).

[271]  Wei Cong,et al.  Anomaly intrusion detection based on PLS feature extraction and core vector machine , 2013, Knowl. Based Syst..

[272]  Chou-Yuan Lee,et al.  An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection , 2012, Appl. Soft Comput..

[273]  Haixun Wang,et al.  Online Anomaly Prediction for Robust Cluster Systems , 2009, 2009 IEEE 25th International Conference on Data Engineering.

[274]  Xia Wang,et al.  Cross-Layer Based Anomaly Detection in Wireless Mesh Networks , 2009, 2009 Ninth Annual International Symposium on Applications and the Internet.

[275]  Kyriakos Stefanidis,et al.  An HMM-Based Anomaly Detection Approach for SCADA Systems , 2016, WISTP.

[276]  Feifei Li,et al.  DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning , 2017, CCS.

[277]  Wei Li,et al.  Using Naive Bayes with AdaBoost to Enhance Network Anomaly Intrusion Detection , 2010, 2010 Third International Conference on Intelligent Networks and Intelligent Systems.

[278]  Jianli Gu,et al.  Machine learning and transport simulations for groundwater anomaly detection , 2020, J. Comput. Appl. Math..

[279]  Fei Wang,et al.  A Model Based on Hybrid Support Vector Machine and Self-Organizing Map for Anomaly Detection , 2010, 2010 International Conference on Communications and Mobile Computing.

[280]  B. Paramasivan,et al.  Anomaly detection in wireless sensor network using machine learning algorithm , 2020, Comput. Commun..

[281]  Toby P. Breckon,et al.  GANomaly: Semi-Supervised Anomaly Detection via Adversarial Training , 2018, ACCV.

[282]  Hiroki Takakura,et al.  Toward a more practical unsupervised anomaly detection system , 2013, Inf. Sci..

[283]  Aboul Ella Hassanien,et al.  Genetic algorithm with different feature selection techniques for anomaly detectors generation , 2013, 2013 Federated Conference on Computer Science and Information Systems.

[284]  Wail S. Elkilani,et al.  A hybrid approach for efficient anomaly detection using metaheuristic methods , 2014, Journal of advanced research.

[285]  Mansour Sheikhan,et al.  Flow-based anomaly detection in high-speed links using modified GSA-optimized neural network , 2012, Neural Computing and Applications.

[286]  Miad Faezipour,et al.  Deep and Machine Learning Approaches for Anomaly-Based Intrusion Detection of Imbalanced Network Traffic , 2019, IEEE Sensors Letters.

[287]  Pedro Casas,et al.  Ensemble-learning Approaches for Network Security and Anomaly Detection , 2017, Big-DAMA@SIGCOMM.

[288]  Félix J. García Clemente,et al.  A Self-Adaptive Deep Learning-Based System for Anomaly Detection in 5G Networks , 2018, IEEE Access.

[289]  Donald F. Towsley,et al.  Detecting anomalies in network traffic using maximum entropy estimation , 2005, IMC '05.

[290]  Sanjay Chawla,et al.  Group Anomaly Detection using Deep Generative Models , 2018, ECML/PKDD.

[291]  R. Nagaraj,et al.  Anomaly Detection via Online Oversampling Principal Component Analysis , 2014 .

[292]  Pengju Liu,et al.  Network Traffic Anomaly Detection Based on Information Gain and Deep Learning , 2019, ICISDM.

[293]  Xiaohui Gu,et al.  UBL: unsupervised behavior learning for predicting performance anomalies in virtualized cloud systems , 2012, ICAC '12.

[294]  Gary B. Wills,et al.  Unsupervised Clustering Approach for Network Anomaly Detection , 2012, NDT.

[295]  Simone Calderara,et al.  Detecting anomalies in people's trajectories using spectral graph analysis , 2011, Comput. Vis. Image Underst..

[296]  Bo Du,et al.  A Robust Nonlinear Hyperspectral Anomaly Detection Approach , 2014, IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing.

[297]  Ruy Luiz Milidiú,et al.  Data stream anomaly detection through principal subspace tracking , 2010, SAC '10.

[298]  Plamen Angelov,et al.  Anomaly detection based on eccentricity analysis , 2014, 2014 IEEE Symposium on Evolving and Autonomous Learning Systems (EALS).

[299]  Gao Yan,et al.  Network Anomaly Traffic Detection Method Based on Support Vector Machine , 2016, 2016 International Conference on Smart City and Systems Engineering (ICSCSE).

[300]  Joni da Silva Fraga,et al.  Octopus-IIDS: An anomaly based intelligent intrusion detection system , 2010, The IEEE symposium on Computers and Communications.

[301]  Dhruba Kumar Bhattacharyya,et al.  Anomaly based intrusion detection using meta ensemble classifier , 2012, SIN '12.

[302]  Pedro Casas,et al.  Network security and anomaly detection with Big-DAMA, a big data analytics framework , 2017, 2017 IEEE 6th International Conference on Cloud Networking (CloudNet).

[303]  Tanja Zseby,et al.  Analysis of network traffic features for anomaly detection , 2014, Machine Learning.

[304]  Md. Rafiqul Islam,et al.  A survey of anomaly detection techniques in financial domain , 2016, Future Gener. Comput. Syst..

[305]  Abdallah Shami,et al.  Bayesian Optimization with Machine Learning Algorithms Towards Anomaly Detection , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).

[306]  T. V. Lakshman,et al.  Unsupervised machine learning for network-centric anomaly detection in IoT , 2019, Big-DAMA@CoNEXT.

[307]  Ali Bou Nassif,et al.  Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection , 2019, Comput. Networks.