Loading…

Real-time big data processing for anomaly detection: A Survey

The advent of connected devices and omnipresence of Internet have paved way for intruders to attack networks, which leads to cyber-attack, financial loss, information theft in healthcare, and cyber war. Hence, network security analytics has become an important area of concern and has gained intensiv...

Full description

Saved in:
Bibliographic Details
Published in:International journal of information management 2019-04, Vol.45, p.289-307
Main Authors: Ariyaluran Habeeb, Riyaz Ahamed, Nasaruddin, Fariza, Gani, Abdullah, Targio Hashem, Ibrahim Abaker, Ahmed, Ejaz, Imran, Muhammad
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c392t-4a92f3f90657e7a71eeeabc0cce5b50219ce7462138c1111c9544d385b773d393
cites cdi_FETCH-LOGICAL-c392t-4a92f3f90657e7a71eeeabc0cce5b50219ce7462138c1111c9544d385b773d393
container_end_page 307
container_issue
container_start_page 289
container_title International journal of information management
container_volume 45
creator Ariyaluran Habeeb, Riyaz Ahamed
Nasaruddin, Fariza
Gani, Abdullah
Targio Hashem, Ibrahim Abaker
Ahmed, Ejaz
Imran, Muhammad
description The advent of connected devices and omnipresence of Internet have paved way for intruders to attack networks, which leads to cyber-attack, financial loss, information theft in healthcare, and cyber war. Hence, network security analytics has become an important area of concern and has gained intensive attention among researchers, off late, specifically in the domain of anomaly detection in network, which is considered crucial for network security. However, preliminary investigations have revealed that the existing approaches to detect anomalies in network are not effective enough, particularly to detect them in real time. The reason for the inefficacy of current approaches is mainly due the amassment of massive volumes of data though the connected devices. Therefore, it is crucial to propose a framework that effectively handles real time big data processing and detect anomalies in networks. In this regard, this paper attempts to address the issue of detecting anomalies in real time. Respectively, this paper has surveyed the state-of-the-art real-time big data processing technologies related to anomaly detection and the vital characteristics of associated machine learning algorithms. This paper begins with the explanation of essential contexts and taxonomy of real-time big data processing, anomalous detection, and machine learning algorithms, followed by the review of big data processing technologies. Finally, the identified research challenges of real-time big data processing in anomaly detection are discussed.
doi_str_mv 10.1016/j.ijinfomgt.2018.08.006
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2210391246</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0268401218301658</els_id><sourcerecordid>2210391246</sourcerecordid><originalsourceid>FETCH-LOGICAL-c392t-4a92f3f90657e7a71eeeabc0cce5b50219ce7462138c1111c9544d385b773d393</originalsourceid><addsrcrecordid>eNqFUMtqwzAQFKWFpmm_oYKe7a4k27ILPYTQFwQKfZyFLK-DTGylklLI31chpdcuA3uZmd0ZQq4Z5AxYdTvkdrBT78Z1zDmwOocEqE7IjNVSZIUEeUpmwKs6K4Dxc3IRwgDAJJR8Ru7fUG-yaEekrV3TTkdNt94ZDMFOa9o7T_XkRr3Z0w4jmmjddEcX9H3nv3F_Sc56vQl49bvn5PPx4WP5nK1en16Wi1VmRMNjVuiG96JvoColSi0ZIurWgDFYtiVw1hiURcWZqA1LY5qyKDpRl62UohONmJObo2967WuHIarB7fyUTirOGYiG8aJKLHlkGe9C8Nirrbej9nvFQB26UoP660odulKQAAfl4qjEFOLbolfBWJwMdtanzKpz9l-PH8oWdX8</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2210391246</pqid></control><display><type>article</type><title>Real-time big data processing for anomaly detection: A Survey</title><source>Library &amp; Information Science Abstracts (LISA)</source><source>ScienceDirect Freedom Collection</source><creator>Ariyaluran Habeeb, Riyaz Ahamed ; Nasaruddin, Fariza ; Gani, Abdullah ; Targio Hashem, Ibrahim Abaker ; Ahmed, Ejaz ; Imran, Muhammad</creator><creatorcontrib>Ariyaluran Habeeb, Riyaz Ahamed ; Nasaruddin, Fariza ; Gani, Abdullah ; Targio Hashem, Ibrahim Abaker ; Ahmed, Ejaz ; Imran, Muhammad</creatorcontrib><description>The advent of connected devices and omnipresence of Internet have paved way for intruders to attack networks, which leads to cyber-attack, financial loss, information theft in healthcare, and cyber war. Hence, network security analytics has become an important area of concern and has gained intensive attention among researchers, off late, specifically in the domain of anomaly detection in network, which is considered crucial for network security. However, preliminary investigations have revealed that the existing approaches to detect anomalies in network are not effective enough, particularly to detect them in real time. The reason for the inefficacy of current approaches is mainly due the amassment of massive volumes of data though the connected devices. Therefore, it is crucial to propose a framework that effectively handles real time big data processing and detect anomalies in networks. In this regard, this paper attempts to address the issue of detecting anomalies in real time. Respectively, this paper has surveyed the state-of-the-art real-time big data processing technologies related to anomaly detection and the vital characteristics of associated machine learning algorithms. This paper begins with the explanation of essential contexts and taxonomy of real-time big data processing, anomalous detection, and machine learning algorithms, followed by the review of big data processing technologies. Finally, the identified research challenges of real-time big data processing in anomaly detection are discussed.</description><identifier>ISSN: 0268-4012</identifier><identifier>EISSN: 1873-4707</identifier><identifier>DOI: 10.1016/j.ijinfomgt.2018.08.006</identifier><language>eng</language><publisher>Kidlington: Elsevier Ltd</publisher><subject>Algorithms ; Anomalies ; Anomaly detection and machine learning algorithms ; Artificial intelligence ; Big Data ; Big data processing ; Cybersecurity ; Data management ; Data processing ; Electronic devices ; Electronic warfare ; Machine learning ; Real time ; Taxonomy ; Theft</subject><ispartof>International journal of information management, 2019-04, Vol.45, p.289-307</ispartof><rights>2018 Elsevier Ltd</rights><rights>Copyright Elsevier Science Ltd. Apr 2019</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c392t-4a92f3f90657e7a71eeeabc0cce5b50219ce7462138c1111c9544d385b773d393</citedby><cites>FETCH-LOGICAL-c392t-4a92f3f90657e7a71eeeabc0cce5b50219ce7462138c1111c9544d385b773d393</cites><orcidid>0000-0002-4388-020X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27903,27904,34114</link.rule.ids></links><search><creatorcontrib>Ariyaluran Habeeb, Riyaz Ahamed</creatorcontrib><creatorcontrib>Nasaruddin, Fariza</creatorcontrib><creatorcontrib>Gani, Abdullah</creatorcontrib><creatorcontrib>Targio Hashem, Ibrahim Abaker</creatorcontrib><creatorcontrib>Ahmed, Ejaz</creatorcontrib><creatorcontrib>Imran, Muhammad</creatorcontrib><title>Real-time big data processing for anomaly detection: A Survey</title><title>International journal of information management</title><description>The advent of connected devices and omnipresence of Internet have paved way for intruders to attack networks, which leads to cyber-attack, financial loss, information theft in healthcare, and cyber war. Hence, network security analytics has become an important area of concern and has gained intensive attention among researchers, off late, specifically in the domain of anomaly detection in network, which is considered crucial for network security. However, preliminary investigations have revealed that the existing approaches to detect anomalies in network are not effective enough, particularly to detect them in real time. The reason for the inefficacy of current approaches is mainly due the amassment of massive volumes of data though the connected devices. Therefore, it is crucial to propose a framework that effectively handles real time big data processing and detect anomalies in networks. In this regard, this paper attempts to address the issue of detecting anomalies in real time. Respectively, this paper has surveyed the state-of-the-art real-time big data processing technologies related to anomaly detection and the vital characteristics of associated machine learning algorithms. This paper begins with the explanation of essential contexts and taxonomy of real-time big data processing, anomalous detection, and machine learning algorithms, followed by the review of big data processing technologies. Finally, the identified research challenges of real-time big data processing in anomaly detection are discussed.</description><subject>Algorithms</subject><subject>Anomalies</subject><subject>Anomaly detection and machine learning algorithms</subject><subject>Artificial intelligence</subject><subject>Big Data</subject><subject>Big data processing</subject><subject>Cybersecurity</subject><subject>Data management</subject><subject>Data processing</subject><subject>Electronic devices</subject><subject>Electronic warfare</subject><subject>Machine learning</subject><subject>Real time</subject><subject>Taxonomy</subject><subject>Theft</subject><issn>0268-4012</issn><issn>1873-4707</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>F2A</sourceid><recordid>eNqFUMtqwzAQFKWFpmm_oYKe7a4k27ILPYTQFwQKfZyFLK-DTGylklLI31chpdcuA3uZmd0ZQq4Z5AxYdTvkdrBT78Z1zDmwOocEqE7IjNVSZIUEeUpmwKs6K4Dxc3IRwgDAJJR8Ru7fUG-yaEekrV3TTkdNt94ZDMFOa9o7T_XkRr3Z0w4jmmjddEcX9H3nv3F_Sc56vQl49bvn5PPx4WP5nK1en16Wi1VmRMNjVuiG96JvoColSi0ZIurWgDFYtiVw1hiURcWZqA1LY5qyKDpRl62UohONmJObo2967WuHIarB7fyUTirOGYiG8aJKLHlkGe9C8Nirrbej9nvFQB26UoP660odulKQAAfl4qjEFOLbolfBWJwMdtanzKpz9l-PH8oWdX8</recordid><startdate>201904</startdate><enddate>201904</enddate><creator>Ariyaluran Habeeb, Riyaz Ahamed</creator><creator>Nasaruddin, Fariza</creator><creator>Gani, Abdullah</creator><creator>Targio Hashem, Ibrahim Abaker</creator><creator>Ahmed, Ejaz</creator><creator>Imran, Muhammad</creator><general>Elsevier Ltd</general><general>Elsevier Science Ltd</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>E3H</scope><scope>F2A</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0002-4388-020X</orcidid></search><sort><creationdate>201904</creationdate><title>Real-time big data processing for anomaly detection: A Survey</title><author>Ariyaluran Habeeb, Riyaz Ahamed ; Nasaruddin, Fariza ; Gani, Abdullah ; Targio Hashem, Ibrahim Abaker ; Ahmed, Ejaz ; Imran, Muhammad</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c392t-4a92f3f90657e7a71eeeabc0cce5b50219ce7462138c1111c9544d385b773d393</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Algorithms</topic><topic>Anomalies</topic><topic>Anomaly detection and machine learning algorithms</topic><topic>Artificial intelligence</topic><topic>Big Data</topic><topic>Big data processing</topic><topic>Cybersecurity</topic><topic>Data management</topic><topic>Data processing</topic><topic>Electronic devices</topic><topic>Electronic warfare</topic><topic>Machine learning</topic><topic>Real time</topic><topic>Taxonomy</topic><topic>Theft</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Ariyaluran Habeeb, Riyaz Ahamed</creatorcontrib><creatorcontrib>Nasaruddin, Fariza</creatorcontrib><creatorcontrib>Gani, Abdullah</creatorcontrib><creatorcontrib>Targio Hashem, Ibrahim Abaker</creatorcontrib><creatorcontrib>Ahmed, Ejaz</creatorcontrib><creatorcontrib>Imran, Muhammad</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>Library &amp; Information Sciences Abstracts (LISA)</collection><collection>Library &amp; Information Science Abstracts (LISA)</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>International journal of information management</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Ariyaluran Habeeb, Riyaz Ahamed</au><au>Nasaruddin, Fariza</au><au>Gani, Abdullah</au><au>Targio Hashem, Ibrahim Abaker</au><au>Ahmed, Ejaz</au><au>Imran, Muhammad</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Real-time big data processing for anomaly detection: A Survey</atitle><jtitle>International journal of information management</jtitle><date>2019-04</date><risdate>2019</risdate><volume>45</volume><spage>289</spage><epage>307</epage><pages>289-307</pages><issn>0268-4012</issn><eissn>1873-4707</eissn><abstract>The advent of connected devices and omnipresence of Internet have paved way for intruders to attack networks, which leads to cyber-attack, financial loss, information theft in healthcare, and cyber war. Hence, network security analytics has become an important area of concern and has gained intensive attention among researchers, off late, specifically in the domain of anomaly detection in network, which is considered crucial for network security. However, preliminary investigations have revealed that the existing approaches to detect anomalies in network are not effective enough, particularly to detect them in real time. The reason for the inefficacy of current approaches is mainly due the amassment of massive volumes of data though the connected devices. Therefore, it is crucial to propose a framework that effectively handles real time big data processing and detect anomalies in networks. In this regard, this paper attempts to address the issue of detecting anomalies in real time. Respectively, this paper has surveyed the state-of-the-art real-time big data processing technologies related to anomaly detection and the vital characteristics of associated machine learning algorithms. This paper begins with the explanation of essential contexts and taxonomy of real-time big data processing, anomalous detection, and machine learning algorithms, followed by the review of big data processing technologies. Finally, the identified research challenges of real-time big data processing in anomaly detection are discussed.</abstract><cop>Kidlington</cop><pub>Elsevier Ltd</pub><doi>10.1016/j.ijinfomgt.2018.08.006</doi><tpages>19</tpages><orcidid>https://orcid.org/0000-0002-4388-020X</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0268-4012
ispartof International journal of information management, 2019-04, Vol.45, p.289-307
issn 0268-4012
1873-4707
language eng
recordid cdi_proquest_journals_2210391246
source Library & Information Science Abstracts (LISA); ScienceDirect Freedom Collection
subjects Algorithms
Anomalies
Anomaly detection and machine learning algorithms
Artificial intelligence
Big Data
Big data processing
Cybersecurity
Data management
Data processing
Electronic devices
Electronic warfare
Machine learning
Real time
Taxonomy
Theft
title Real-time big data processing for anomaly detection: A Survey
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-26T01%3A35%3A10IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Real-time%20big%20data%20processing%20for%20anomaly%20detection:%20A%20Survey&rft.jtitle=International%20journal%20of%20information%20management&rft.au=Ariyaluran%20Habeeb,%20Riyaz%20Ahamed&rft.date=2019-04&rft.volume=45&rft.spage=289&rft.epage=307&rft.pages=289-307&rft.issn=0268-4012&rft.eissn=1873-4707&rft_id=info:doi/10.1016/j.ijinfomgt.2018.08.006&rft_dat=%3Cproquest_cross%3E2210391246%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c392t-4a92f3f90657e7a71eeeabc0cce5b50219ce7462138c1111c9544d385b773d393%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2210391246&rft_id=info:pmid/&rfr_iscdi=true