Loading…
Real-time big data processing for anomaly detection: A Survey
The advent of connected devices and omnipresence of Internet have paved way for intruders to attack networks, which leads to cyber-attack, financial loss, information theft in healthcare, and cyber war. Hence, network security analytics has become an important area of concern and has gained intensiv...
Saved in:
Published in: | International journal of information management 2019-04, Vol.45, p.289-307 |
---|---|
Main Authors: | , , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c392t-4a92f3f90657e7a71eeeabc0cce5b50219ce7462138c1111c9544d385b773d393 |
---|---|
cites | cdi_FETCH-LOGICAL-c392t-4a92f3f90657e7a71eeeabc0cce5b50219ce7462138c1111c9544d385b773d393 |
container_end_page | 307 |
container_issue | |
container_start_page | 289 |
container_title | International journal of information management |
container_volume | 45 |
creator | Ariyaluran Habeeb, Riyaz Ahamed Nasaruddin, Fariza Gani, Abdullah Targio Hashem, Ibrahim Abaker Ahmed, Ejaz Imran, Muhammad |
description | The advent of connected devices and omnipresence of Internet have paved way for intruders to attack networks, which leads to cyber-attack, financial loss, information theft in healthcare, and cyber war. Hence, network security analytics has become an important area of concern and has gained intensive attention among researchers, off late, specifically in the domain of anomaly detection in network, which is considered crucial for network security. However, preliminary investigations have revealed that the existing approaches to detect anomalies in network are not effective enough, particularly to detect them in real time. The reason for the inefficacy of current approaches is mainly due the amassment of massive volumes of data though the connected devices. Therefore, it is crucial to propose a framework that effectively handles real time big data processing and detect anomalies in networks. In this regard, this paper attempts to address the issue of detecting anomalies in real time. Respectively, this paper has surveyed the state-of-the-art real-time big data processing technologies related to anomaly detection and the vital characteristics of associated machine learning algorithms. This paper begins with the explanation of essential contexts and taxonomy of real-time big data processing, anomalous detection, and machine learning algorithms, followed by the review of big data processing technologies. Finally, the identified research challenges of real-time big data processing in anomaly detection are discussed. |
doi_str_mv | 10.1016/j.ijinfomgt.2018.08.006 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2210391246</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0268401218301658</els_id><sourcerecordid>2210391246</sourcerecordid><originalsourceid>FETCH-LOGICAL-c392t-4a92f3f90657e7a71eeeabc0cce5b50219ce7462138c1111c9544d385b773d393</originalsourceid><addsrcrecordid>eNqFUMtqwzAQFKWFpmm_oYKe7a4k27ILPYTQFwQKfZyFLK-DTGylklLI31chpdcuA3uZmd0ZQq4Z5AxYdTvkdrBT78Z1zDmwOocEqE7IjNVSZIUEeUpmwKs6K4Dxc3IRwgDAJJR8Ru7fUG-yaEekrV3TTkdNt94ZDMFOa9o7T_XkRr3Z0w4jmmjddEcX9H3nv3F_Sc56vQl49bvn5PPx4WP5nK1en16Wi1VmRMNjVuiG96JvoColSi0ZIurWgDFYtiVw1hiURcWZqA1LY5qyKDpRl62UohONmJObo2967WuHIarB7fyUTirOGYiG8aJKLHlkGe9C8Nirrbej9nvFQB26UoP660odulKQAAfl4qjEFOLbolfBWJwMdtanzKpz9l-PH8oWdX8</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2210391246</pqid></control><display><type>article</type><title>Real-time big data processing for anomaly detection: A Survey</title><source>Library & Information Science Abstracts (LISA)</source><source>ScienceDirect Freedom Collection</source><creator>Ariyaluran Habeeb, Riyaz Ahamed ; Nasaruddin, Fariza ; Gani, Abdullah ; Targio Hashem, Ibrahim Abaker ; Ahmed, Ejaz ; Imran, Muhammad</creator><creatorcontrib>Ariyaluran Habeeb, Riyaz Ahamed ; Nasaruddin, Fariza ; Gani, Abdullah ; Targio Hashem, Ibrahim Abaker ; Ahmed, Ejaz ; Imran, Muhammad</creatorcontrib><description>The advent of connected devices and omnipresence of Internet have paved way for intruders to attack networks, which leads to cyber-attack, financial loss, information theft in healthcare, and cyber war. Hence, network security analytics has become an important area of concern and has gained intensive attention among researchers, off late, specifically in the domain of anomaly detection in network, which is considered crucial for network security. However, preliminary investigations have revealed that the existing approaches to detect anomalies in network are not effective enough, particularly to detect them in real time. The reason for the inefficacy of current approaches is mainly due the amassment of massive volumes of data though the connected devices. Therefore, it is crucial to propose a framework that effectively handles real time big data processing and detect anomalies in networks. In this regard, this paper attempts to address the issue of detecting anomalies in real time. Respectively, this paper has surveyed the state-of-the-art real-time big data processing technologies related to anomaly detection and the vital characteristics of associated machine learning algorithms. This paper begins with the explanation of essential contexts and taxonomy of real-time big data processing, anomalous detection, and machine learning algorithms, followed by the review of big data processing technologies. Finally, the identified research challenges of real-time big data processing in anomaly detection are discussed.</description><identifier>ISSN: 0268-4012</identifier><identifier>EISSN: 1873-4707</identifier><identifier>DOI: 10.1016/j.ijinfomgt.2018.08.006</identifier><language>eng</language><publisher>Kidlington: Elsevier Ltd</publisher><subject>Algorithms ; Anomalies ; Anomaly detection and machine learning algorithms ; Artificial intelligence ; Big Data ; Big data processing ; Cybersecurity ; Data management ; Data processing ; Electronic devices ; Electronic warfare ; Machine learning ; Real time ; Taxonomy ; Theft</subject><ispartof>International journal of information management, 2019-04, Vol.45, p.289-307</ispartof><rights>2018 Elsevier Ltd</rights><rights>Copyright Elsevier Science Ltd. Apr 2019</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c392t-4a92f3f90657e7a71eeeabc0cce5b50219ce7462138c1111c9544d385b773d393</citedby><cites>FETCH-LOGICAL-c392t-4a92f3f90657e7a71eeeabc0cce5b50219ce7462138c1111c9544d385b773d393</cites><orcidid>0000-0002-4388-020X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27903,27904,34114</link.rule.ids></links><search><creatorcontrib>Ariyaluran Habeeb, Riyaz Ahamed</creatorcontrib><creatorcontrib>Nasaruddin, Fariza</creatorcontrib><creatorcontrib>Gani, Abdullah</creatorcontrib><creatorcontrib>Targio Hashem, Ibrahim Abaker</creatorcontrib><creatorcontrib>Ahmed, Ejaz</creatorcontrib><creatorcontrib>Imran, Muhammad</creatorcontrib><title>Real-time big data processing for anomaly detection: A Survey</title><title>International journal of information management</title><description>The advent of connected devices and omnipresence of Internet have paved way for intruders to attack networks, which leads to cyber-attack, financial loss, information theft in healthcare, and cyber war. Hence, network security analytics has become an important area of concern and has gained intensive attention among researchers, off late, specifically in the domain of anomaly detection in network, which is considered crucial for network security. However, preliminary investigations have revealed that the existing approaches to detect anomalies in network are not effective enough, particularly to detect them in real time. The reason for the inefficacy of current approaches is mainly due the amassment of massive volumes of data though the connected devices. Therefore, it is crucial to propose a framework that effectively handles real time big data processing and detect anomalies in networks. In this regard, this paper attempts to address the issue of detecting anomalies in real time. Respectively, this paper has surveyed the state-of-the-art real-time big data processing technologies related to anomaly detection and the vital characteristics of associated machine learning algorithms. This paper begins with the explanation of essential contexts and taxonomy of real-time big data processing, anomalous detection, and machine learning algorithms, followed by the review of big data processing technologies. Finally, the identified research challenges of real-time big data processing in anomaly detection are discussed.</description><subject>Algorithms</subject><subject>Anomalies</subject><subject>Anomaly detection and machine learning algorithms</subject><subject>Artificial intelligence</subject><subject>Big Data</subject><subject>Big data processing</subject><subject>Cybersecurity</subject><subject>Data management</subject><subject>Data processing</subject><subject>Electronic devices</subject><subject>Electronic warfare</subject><subject>Machine learning</subject><subject>Real time</subject><subject>Taxonomy</subject><subject>Theft</subject><issn>0268-4012</issn><issn>1873-4707</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>F2A</sourceid><recordid>eNqFUMtqwzAQFKWFpmm_oYKe7a4k27ILPYTQFwQKfZyFLK-DTGylklLI31chpdcuA3uZmd0ZQq4Z5AxYdTvkdrBT78Z1zDmwOocEqE7IjNVSZIUEeUpmwKs6K4Dxc3IRwgDAJJR8Ru7fUG-yaEekrV3TTkdNt94ZDMFOa9o7T_XkRr3Z0w4jmmjddEcX9H3nv3F_Sc56vQl49bvn5PPx4WP5nK1en16Wi1VmRMNjVuiG96JvoColSi0ZIurWgDFYtiVw1hiURcWZqA1LY5qyKDpRl62UohONmJObo2967WuHIarB7fyUTirOGYiG8aJKLHlkGe9C8Nirrbej9nvFQB26UoP660odulKQAAfl4qjEFOLbolfBWJwMdtanzKpz9l-PH8oWdX8</recordid><startdate>201904</startdate><enddate>201904</enddate><creator>Ariyaluran Habeeb, Riyaz Ahamed</creator><creator>Nasaruddin, Fariza</creator><creator>Gani, Abdullah</creator><creator>Targio Hashem, Ibrahim Abaker</creator><creator>Ahmed, Ejaz</creator><creator>Imran, Muhammad</creator><general>Elsevier Ltd</general><general>Elsevier Science Ltd</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>E3H</scope><scope>F2A</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0002-4388-020X</orcidid></search><sort><creationdate>201904</creationdate><title>Real-time big data processing for anomaly detection: A Survey</title><author>Ariyaluran Habeeb, Riyaz Ahamed ; Nasaruddin, Fariza ; Gani, Abdullah ; Targio Hashem, Ibrahim Abaker ; Ahmed, Ejaz ; Imran, Muhammad</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c392t-4a92f3f90657e7a71eeeabc0cce5b50219ce7462138c1111c9544d385b773d393</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Algorithms</topic><topic>Anomalies</topic><topic>Anomaly detection and machine learning algorithms</topic><topic>Artificial intelligence</topic><topic>Big Data</topic><topic>Big data processing</topic><topic>Cybersecurity</topic><topic>Data management</topic><topic>Data processing</topic><topic>Electronic devices</topic><topic>Electronic warfare</topic><topic>Machine learning</topic><topic>Real time</topic><topic>Taxonomy</topic><topic>Theft</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Ariyaluran Habeeb, Riyaz Ahamed</creatorcontrib><creatorcontrib>Nasaruddin, Fariza</creatorcontrib><creatorcontrib>Gani, Abdullah</creatorcontrib><creatorcontrib>Targio Hashem, Ibrahim Abaker</creatorcontrib><creatorcontrib>Ahmed, Ejaz</creatorcontrib><creatorcontrib>Imran, Muhammad</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>Library & Information Sciences Abstracts (LISA)</collection><collection>Library & Information Science Abstracts (LISA)</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>International journal of information management</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Ariyaluran Habeeb, Riyaz Ahamed</au><au>Nasaruddin, Fariza</au><au>Gani, Abdullah</au><au>Targio Hashem, Ibrahim Abaker</au><au>Ahmed, Ejaz</au><au>Imran, Muhammad</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Real-time big data processing for anomaly detection: A Survey</atitle><jtitle>International journal of information management</jtitle><date>2019-04</date><risdate>2019</risdate><volume>45</volume><spage>289</spage><epage>307</epage><pages>289-307</pages><issn>0268-4012</issn><eissn>1873-4707</eissn><abstract>The advent of connected devices and omnipresence of Internet have paved way for intruders to attack networks, which leads to cyber-attack, financial loss, information theft in healthcare, and cyber war. Hence, network security analytics has become an important area of concern and has gained intensive attention among researchers, off late, specifically in the domain of anomaly detection in network, which is considered crucial for network security. However, preliminary investigations have revealed that the existing approaches to detect anomalies in network are not effective enough, particularly to detect them in real time. The reason for the inefficacy of current approaches is mainly due the amassment of massive volumes of data though the connected devices. Therefore, it is crucial to propose a framework that effectively handles real time big data processing and detect anomalies in networks. In this regard, this paper attempts to address the issue of detecting anomalies in real time. Respectively, this paper has surveyed the state-of-the-art real-time big data processing technologies related to anomaly detection and the vital characteristics of associated machine learning algorithms. This paper begins with the explanation of essential contexts and taxonomy of real-time big data processing, anomalous detection, and machine learning algorithms, followed by the review of big data processing technologies. Finally, the identified research challenges of real-time big data processing in anomaly detection are discussed.</abstract><cop>Kidlington</cop><pub>Elsevier Ltd</pub><doi>10.1016/j.ijinfomgt.2018.08.006</doi><tpages>19</tpages><orcidid>https://orcid.org/0000-0002-4388-020X</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0268-4012 |
ispartof | International journal of information management, 2019-04, Vol.45, p.289-307 |
issn | 0268-4012 1873-4707 |
language | eng |
recordid | cdi_proquest_journals_2210391246 |
source | Library & Information Science Abstracts (LISA); ScienceDirect Freedom Collection |
subjects | Algorithms Anomalies Anomaly detection and machine learning algorithms Artificial intelligence Big Data Big data processing Cybersecurity Data management Data processing Electronic devices Electronic warfare Machine learning Real time Taxonomy Theft |
title | Real-time big data processing for anomaly detection: A Survey |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-26T01%3A35%3A10IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Real-time%20big%20data%20processing%20for%20anomaly%20detection:%20A%20Survey&rft.jtitle=International%20journal%20of%20information%20management&rft.au=Ariyaluran%20Habeeb,%20Riyaz%20Ahamed&rft.date=2019-04&rft.volume=45&rft.spage=289&rft.epage=307&rft.pages=289-307&rft.issn=0268-4012&rft.eissn=1873-4707&rft_id=info:doi/10.1016/j.ijinfomgt.2018.08.006&rft_dat=%3Cproquest_cross%3E2210391246%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c392t-4a92f3f90657e7a71eeeabc0cce5b50219ce7462138c1111c9544d385b773d393%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2210391246&rft_id=info:pmid/&rfr_iscdi=true |