2020 Fourth International Conference on I-Smac (IoT in Social, Mobile, Analytics and Cloud) (I-Smac) 2020
DOI: 10.1109/i-smac49090.2020.9243329
|View full text |Cite
|
Sign up to set email alerts
|

Overview of Anomaly Detection techniques in Machine Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(24 citation statements)
references
References 52 publications
0
24
0
Order By: Relevance
“…The recall is also very high (it is actually perfect for cryptomining execution detection), while the FPR has a relatively low value of 0.014 for both of the evaluated attacks. For benchmarking, we compared our two-step method with a variety of classical one-step algorithms widely used for anomaly and novelty detection in general [42], [87]- [90], and for IoT attack detection in particular [19], [91]. Two of these algorithms are the building blocks of CADeSH (namely, AE and k-means clustering, which we used to implement F ilter m 1 and F ilter m 2 , respectively).…”
Section: Overall Results and Benchmarkingmentioning
confidence: 99%
“…The recall is also very high (it is actually perfect for cryptomining execution detection), while the FPR has a relatively low value of 0.014 for both of the evaluated attacks. For benchmarking, we compared our two-step method with a variety of classical one-step algorithms widely used for anomaly and novelty detection in general [42], [87]- [90], and for IoT attack detection in particular [19], [91]. Two of these algorithms are the building blocks of CADeSH (namely, AE and k-means clustering, which we used to implement F ilter m 1 and F ilter m 2 , respectively).…”
Section: Overall Results and Benchmarkingmentioning
confidence: 99%
“…Application Focus [6] cloud computing IDS [5] computer networks IDS [24] malicious actor space and information networks [2] IIoT GNNs [23] attention-based AD - [4] attention-based AD - [1] non-IoT graph-based AD deep learning [3] general AD -…”
Section: Referencementioning
confidence: 99%
“…There are contradictory conclusions made on the effectiveness of the resembling technique for solving the class imbalance issue. Supervised machine learning techniques failed to detect unseen or new types of anomalies while unsupervised machine learning techniques tend to classify noises as anomalies [21], [22]. Thus, two variations of hybrid models which combine both the supervised and unsupervised techniques are proposed so that it can exceed the performance of conventional machine learning techniques in anomaly detection.…”
Section: Literature Reviewmentioning
confidence: 99%