Anomaly Detection in Big Data based on Clustering

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Behavior-based anomaly detection on big data

Recently, cyber-targeted attacks such as APT (Advanced Persistent Threat) are rapidly growing as a social and national threat. It is an intelligent cyber-attack that infiltrates the target organization and enterprise clandestinely using various methods and causes considerable damage by making a final attack after long-term and through preparations. These attacks are threatening cyber worlds suc...

متن کامل

Big Trajectory Data Analysis for Clustering and Anomaly Detection

We’ve been developing a sensor that can acquire positional data. Recently, a position-based big data creation is easy task and trajectory analysis is the highest priority for ”position-based service”. Traffic congestion, marketing mining, and pattern analysis are the one of the examples in trajectory analysis field. In this paper, we propose the trajectory analysis approach for clustering and a...

متن کامل

Unsupervised Network Anomaly Detection in Real-Time on Big Data

Network anomaly detection relies on intrusion detection systems based on knowledge databases. However, building this knowledge may take time as it requires manual inspection of experts. Actual detection systems are unable to deal with 0-day attack or new user's behavior and in consequence they may fail in correctly detecting intrusions. Unsupervised network anomaly detectors overcome this issue...

متن کامل

Anomaly Detection for Industrial Big Data

As the Industrial Internet of Things (IIoTa) grows, systems are increasingly being monitored by arrays of sensors returning time-series data at ever-increasing ‘volume, velocity and variety’b (i.e. Industrial Big Datac). An obvious use for these data is real-time systems condition monitoring and prognostic time to failure analysis (remaining useful life, RUL). (e.g. See white papers by Senseye....

متن کامل

Anomaly Detection In Cellular Network Data Using Big Data Analytics

Anomaly detection is a key component in which perturbations from a normal behavior suggests a misconfigured/mismatched data in related systems. In this paper, we present a call detail record based anomaly detection method (CADM) that analyzes the users’s calling activities and detects the abnormal behavior of user movements in a real cellular network. CADM is capable of detecting the location o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Statistics, Optimization & Information Computing

سال: 2017

ISSN: 2310-5070,2311-004X

DOI: 10.19139/soic.v5i4.365