D. Mane, S. Sangve, Gopal Upadhye, Sahil Kandhare, Saurabh Mohole, Sanket Sonar, Satej Tupare
{"title":"使用机器学习检测异常:综合调查","authors":"D. Mane, S. Sangve, Gopal Upadhye, Sahil Kandhare, Saurabh Mohole, Sanket Sonar, Satej Tupare","doi":"10.46338/ijetae1122_15","DOIUrl":null,"url":null,"abstract":"Anomaly detection is an important element in the domain of security. As a result, we undertook a literature review on ML algorithms that identify abnormalities. In this paper, we are presenting a review of the 101 research articles describing ML techniques for anomaly detection published between 2015 - 2022.The goal of this paper is to review research papers that have used machine learning to develop anomaly detection algorithmThe forms of anomaly detection examined in this study include system log anomaly detection, network anomaly detection, cloud-based anomaly detection, and anomaly detection in the medical profession. After assessing the selected research articles, we present more than 10 applications of anomaly detection. Also, we have shared a range of datasets used in anomaly detection research, in addition to revealing 30+ new ML models employed in anomaly detection. We have discovered 55 new datasets for anomaly detection. We've noticed that the majority of researchers utilize real-life datasets and an unsupervised learning technique to detect anomalies. Many ML methods may be applied in this subject, so we present a summary of all work done in the previous six years. Keywords Intrusion detection, Artificial intelligence, Anomaly detection, security, Machine learning.","PeriodicalId":169403,"journal":{"name":"International Journal of Emerging Technology and Advanced Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Detection of Anomaly using Machine Learning: A Comprehensive Survey\",\"authors\":\"D. Mane, S. Sangve, Gopal Upadhye, Sahil Kandhare, Saurabh Mohole, Sanket Sonar, Satej Tupare\",\"doi\":\"10.46338/ijetae1122_15\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Anomaly detection is an important element in the domain of security. As a result, we undertook a literature review on ML algorithms that identify abnormalities. In this paper, we are presenting a review of the 101 research articles describing ML techniques for anomaly detection published between 2015 - 2022.The goal of this paper is to review research papers that have used machine learning to develop anomaly detection algorithmThe forms of anomaly detection examined in this study include system log anomaly detection, network anomaly detection, cloud-based anomaly detection, and anomaly detection in the medical profession. After assessing the selected research articles, we present more than 10 applications of anomaly detection. Also, we have shared a range of datasets used in anomaly detection research, in addition to revealing 30+ new ML models employed in anomaly detection. We have discovered 55 new datasets for anomaly detection. We've noticed that the majority of researchers utilize real-life datasets and an unsupervised learning technique to detect anomalies. Many ML methods may be applied in this subject, so we present a summary of all work done in the previous six years. Keywords Intrusion detection, Artificial intelligence, Anomaly detection, security, Machine learning.\",\"PeriodicalId\":169403,\"journal\":{\"name\":\"International Journal of Emerging Technology and Advanced Engineering\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Emerging Technology and Advanced Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.46338/ijetae1122_15\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Emerging Technology and Advanced Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.46338/ijetae1122_15","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Detection of Anomaly using Machine Learning: A Comprehensive Survey
Anomaly detection is an important element in the domain of security. As a result, we undertook a literature review on ML algorithms that identify abnormalities. In this paper, we are presenting a review of the 101 research articles describing ML techniques for anomaly detection published between 2015 - 2022.The goal of this paper is to review research papers that have used machine learning to develop anomaly detection algorithmThe forms of anomaly detection examined in this study include system log anomaly detection, network anomaly detection, cloud-based anomaly detection, and anomaly detection in the medical profession. After assessing the selected research articles, we present more than 10 applications of anomaly detection. Also, we have shared a range of datasets used in anomaly detection research, in addition to revealing 30+ new ML models employed in anomaly detection. We have discovered 55 new datasets for anomaly detection. We've noticed that the majority of researchers utilize real-life datasets and an unsupervised learning technique to detect anomalies. Many ML methods may be applied in this subject, so we present a summary of all work done in the previous six years. Keywords Intrusion detection, Artificial intelligence, Anomaly detection, security, Machine learning.