• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

DMCA

Anomaly Detection: A Survey (2007)

Cached

  • Download as a PDF

Download Links

  • [www.cs.umn.edu]
  • [www.dtc.umn.edu]
  • [www.dtc.umn.edu]
  • [cucis.ece.northwestern.edu]
  • [www.vs.inf.ethz.ch]
  • [www-users.cs.umn.edu]

  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Varun Chandola , Arindam Banerjee , Vipin Kumar
Citations:538 - 5 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@MISC{Chandola07anomalydetection:,
    author = {Varun Chandola and Arindam Banerjee and Vipin Kumar},
    title = {Anomaly Detection: A Survey},
    year = {2007}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

Anomaly detection is an important problem that has been researched within diverse research areas and application domains. Many anomaly detection techniques have been specifically developed for certain application domains, while others are more generic. This survey tries to provide a structured and comprehensive overview of the research on anomaly detection. We have grouped existing techniques into different categories based on the underlying approach adopted by each technique. For each category we have identified key assumptions, which are used by the techniques to differentiate between normal and anomalous behavior. When applying a given technique to a particular domain, these assumptions can be used as guidelines to assess the effectiveness of the technique in that domain. For each category, we provide a basic anomaly detection technique, and then show how the different existing techniques in that category are variants of the basic technique. This template provides an easier and succinct understanding of the techniques belonging to each category. Further, for each category, we identify the advantages and disadvantages of the techniques in that category. We also provide a discussion on the computational complexity of the techniques since it is an important issue in real application domains. We hope that this survey will provide a better understanding of the di®erent directions in which research has been done on this topic, and how techniques developed in one area can be applied in domains for which they were not intended to begin with.

Keyphrases

anomaly detection    di erent direction    real application domain    certain application domain    basic technique    succinct understanding    basic anomaly detection technique    application domain    important issue    particular domain    underlying approach    computational complexity    key assumption    important problem    anomalous behavior    many anomaly detection technique    comprehensive overview    diverse research area    different category   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University