Anomaly Detection in Big Data based on Clustering
نویسندگان
چکیده
منابع مشابه
Behavior-based anomaly detection on big data
Recently, cyber-targeted attacks such as APT (Advanced Persistent Threat) are rapidly growing as a social and national threat. It is an intelligent cyber-attack that infiltrates the target organization and enterprise clandestinely using various methods and causes considerable damage by making a final attack after long-term and through preparations. These attacks are threatening cyber worlds suc...
متن کاملBig Trajectory Data Analysis for Clustering and Anomaly Detection
We’ve been developing a sensor that can acquire positional data. Recently, a position-based big data creation is easy task and trajectory analysis is the highest priority for ”position-based service”. Traffic congestion, marketing mining, and pattern analysis are the one of the examples in trajectory analysis field. In this paper, we propose the trajectory analysis approach for clustering and a...
متن کاملUnsupervised Network Anomaly Detection in Real-Time on Big Data
Network anomaly detection relies on intrusion detection systems based on knowledge databases. However, building this knowledge may take time as it requires manual inspection of experts. Actual detection systems are unable to deal with 0-day attack or new user's behavior and in consequence they may fail in correctly detecting intrusions. Unsupervised network anomaly detectors overcome this issue...
متن کاملAnomaly Detection for Industrial Big Data
As the Industrial Internet of Things (IIoTa) grows, systems are increasingly being monitored by arrays of sensors returning time-series data at ever-increasing ‘volume, velocity and variety’b (i.e. Industrial Big Datac). An obvious use for these data is real-time systems condition monitoring and prognostic time to failure analysis (remaining useful life, RUL). (e.g. See white papers by Senseye....
متن کاملAnomaly Detection In Cellular Network Data Using Big Data Analytics
Anomaly detection is a key component in which perturbations from a normal behavior suggests a misconfigured/mismatched data in related systems. In this paper, we present a call detail record based anomaly detection method (CADM) that analyzes the users’s calling activities and detects the abnormal behavior of user movements in a real cellular network. CADM is capable of detecting the location o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Statistics, Optimization & Information Computing
سال: 2017
ISSN: 2310-5070,2311-004X
DOI: 10.19139/soic.v5i4.365