Authors:
- Presents new algorithms for static and time series datasets
- Introduces new ensemble methods for improved anomaly detection
- Covers rank-based anomaly detection algorithms
- Discusses the pros and cons of various approaches used for anomaly detection
Part of the book series: Terrorism, Security, and Computation (TESECO)
Buy it now
Buying options
Tax calculation will be finalised at checkout
Other ways to access
This is a preview of subscription content, log in via an institution to check for access.
Table of contents (9 chapters)
-
Front Matter
-
Algorithms
-
Front Matter
-
-
Back Matter
About this book
This book provides a readable and elegant presentation of the principles of anomaly detection,providing an easy introduction for newcomers to the field. A large number of algorithms are succinctly described, along with a presentation of their strengths and weaknesses.
The authors also cover algorithms that address different kinds of problems of interest with single and multiple time series data and multi-dimensional data. New ensemble anomaly detection algorithms are described, utilizing the benefits provided by diverse algorithms, each of which work well on some kinds of data.
With advancements in technology and the extensive use of the internet as a medium for communications and commerce, there has been a tremendous increase in the threats faced by individuals and organizations from attackers and criminal entities. Variations in the observable behaviors of individuals (from others and from their own past behaviors) have been found to be useful in predicting potential problems of various kinds. Hence computer scientists and statisticians have been conducting research on automatically identifying anomalies in large datasets.
This book will primarily target practitioners and researchers who are newcomers to the area of modern anomaly detection techniques. Advanced-level students in computer science will also find this book helpful with their studies.
Reviews
“This book presents the interesting topic of anomaly detection for a very broad audience. … The presentation is really useful: for each technique, some motivation is given, including real-life situations, a comprehensible formalization, and pros and cons, which gives readers an idea of how useful the technique will be in practice. … Probably the most important contribution of the book is its citations and references for further reading, which may help casual readers better understand each technique … .” (Santiago Escobar, Computing Reviews, January, 2019)
Authors and Affiliations
-
Department of Electrical Engineering and Computer Science, Syracuse University, Syracuse, USA
Kishan G. Mehrotra, Chilukuri K. Mohan, HuaMing Huang
Bibliographic Information
Book Title: Anomaly Detection Principles and Algorithms
Authors: Kishan G. Mehrotra, Chilukuri K. Mohan, HuaMing Huang
Series Title: Terrorism, Security, and Computation
DOI: https://doi.org/10.1007/978-3-319-67526-8
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing AG 2017
Hardcover ISBN: 978-3-319-67524-4Published: 25 January 2018
Softcover ISBN: 978-3-319-88445-5Published: 06 June 2019
eBook ISBN: 978-3-319-67526-8Published: 18 November 2017
Series ISSN: 2197-8778
Series E-ISSN: 2197-8786
Edition Number: 1
Number of Pages: XXII, 217
Number of Illustrations: 11 b/w illustrations, 55 illustrations in colour
Topics: Data Mining and Knowledge Discovery, Pattern Recognition, Security