Knowledge-based anomaly detection: Survey, challenges, and future directions

被引:3
|
作者
Khan, Abdul Qadir [1 ,2 ]
El Jaouhari, Saad [1 ]
Tamani, Nouredine [1 ]
Mroueh, Lina [1 ]
机构
[1] Inst Super Elect Paris Isep, 10 rue Vanves, F-92130 Issy les moulineaux, France
[2] Sorbonne Univ, Paris, France
关键词
Anomaly detection; Knowledge base systems; Rule-based systems; Fuzzy logic; Machine learning; Survey; NETWORK INTRUSION DETECTION; FEATURE-SELECTION; DETECTION SYSTEMS; FUZZY-LOGIC; IDENTIFICATION; ACQUISITION; COMPLEXITY; ONTOLOGY; ATTACKS; DESIGN;
D O I
10.1016/j.engappai.2024.108996
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the rapidly increasing number of Internet-connected objects, a huge amount of data is created, stored, and shared. Depending on the use case, this data is visualized, cleaned, checked, visualized, and processed for various purposes. However, this data may encounter many problems such as inaccuracy, duplication, absence, etc. Such issues can be regarded as anomalies that deviate from a referential point, which can be caused by malicious attackers, abnormal behavior of systems, and a failure of devices, transmission channels, or data processing units. Anomaly detection is still one of the most important issues in cybersecurity, especially when it comes to system monitoring, automated forensics, and post-mortem analysis, which require anomaly detection mechanisms. In the literature, different approaches have been developed to detect anomalies, which can be classified as statistic-based, semantic-based, clustering-based, classification-based, and deep learning-based, depending on the algorithms used. This survey focuses on knowledge-based approaches, a sub-category of semantic-based approaches, as opposed to statistical/learning approaches. We provide a detailed comparison of the recent work in knowledge-based subcategories, namely, rule-based, score-based, and hybrid. We described the components of a knowledge-based system and the steps required to process raw data for anomaly detection. Furthermore, we have collected for each approach, when available, information about its semantic expressiveness, computational complexity, and application domain. Finally, we identify the challenges and discuss some future research directions in knowledge-based anomaly detection. Identifying such approaches and challenges can help cybersecurity engineers design better models that meet their application requirements.
引用
收藏
页数:21
相关论文
共 50 条
  • [31] A Survey of Multiobjective Evolutionary Algorithms Based on Decomposition: Variants, Challenges and Future Directions
    Xu, Qian
    Xu, Zhanqi
    Ma, Tao
    IEEE ACCESS, 2020, 8 : 41588 - 41614
  • [32] Epigenetics of Addiction: Current Knowledge, Challenges, and Future Directions
    Cecil, Charlotte A. M.
    Walton, Esther
    Viding, Essi
    JOURNAL OF STUDIES ON ALCOHOL AND DRUGS, 2016, 77 (05) : 688 - 691
  • [33] The past and future of knowledge-based growth
    Holger Strulik
    Klaus Prettner
    Alexia Prskawetz
    Journal of Economic Growth, 2013, 18 : 411 - 437
  • [34] Knowledge-Based Recommendation Systems: A Survey
    Bouraga, Sarah
    Jureta, Ivan
    Faulkner, Stephane
    Herssens, Caroline
    INTERNATIONAL JOURNAL OF INTELLIGENT INFORMATION TECHNOLOGIES, 2014, 10 (02) : 1 - 19
  • [35] Unleashing the power of SDN and GNN for network anomaly detection: State-of-the-art, challenges, and future directions
    Dhadhania, Archan
    Bhatia, Jitendra
    Mehta, Rachana
    Tanwar, Sudeep
    Sharma, Ravi
    Verma, Amit
    SECURITY AND PRIVACY, 2024, 7 (01)
  • [36] The past and future of knowledge-based growth
    Strulik, Holger
    Prettner, Klaus
    Prskawetz, Alexia
    JOURNAL OF ECONOMIC GROWTH, 2013, 18 (04) : 411 - 437
  • [37] Challenges and future directions of secure federated learning: a survey
    ZHANG Kaiyue
    SONG Xuan
    ZHANG Chenhan
    YU Shui
    Frontiers of Computer Science, 2022, 16 (05)
  • [38] Challenges and future directions of secure federated learning: a survey
    Kaiyue Zhang
    Xuan Song
    Chenhan Zhang
    Shui Yu
    Frontiers of Computer Science, 2022, 16
  • [39] Challenges and future directions of secure federated learning: a survey
    Zhang, Kaiyue
    Song, Xuan
    Zhang, Chenhan
    Yu, Shui
    FRONTIERS OF COMPUTER SCIENCE, 2022, 16 (05)
  • [40] A Survey on Federated Unlearning: Challenges, Methods, and Future Directions
    Liu, Ziyao
    Jiang, Yu
    Shen, Jiyuan
    Peng, Minyi
    Lam, Kwok-Yan
    Yuan, Xingliang
    Liu, Xiaoning
    ACM COMPUTING SURVEYS, 2025, 57 (01)