Real-time big data processing for anomaly detection : a survey
- Ariyaluran Habeeb, Riyaz, Nasaruddin, Fariza, Gani, Abdullah, Targio Hashem, Ibrahim, Ahmed, Ejaz, Imran, Muhammad
- Authors: Ariyaluran Habeeb, Riyaz , Nasaruddin, Fariza , Gani, Abdullah , Targio Hashem, Ibrahim , Ahmed, Ejaz , Imran, Muhammad
- Date: 2019
- Type: Text , Journal article , Review
- Relation: International Journal of Information Management Vol. 45, no. (2019), p. 289-307
- Full Text:
- Reviewed:
- Description: The advent of connected devices and omnipresence of Internet have paved way for intruders to attack networks, which leads to cyber-attack, financial loss, information theft in healthcare, and cyber war. Hence, network security analytics has become an important area of concern and has gained intensive attention among researchers, off late, specifically in the domain of anomaly detection in network, which is considered crucial for network security. However, preliminary investigations have revealed that the existing approaches to detect anomalies in network are not effective enough, particularly to detect them in real time. The reason for the inefficacy of current approaches is mainly due the amassment of massive volumes of data though the connected devices. Therefore, it is crucial to propose a framework that effectively handles real time big data processing and detect anomalies in networks. In this regard, this paper attempts to address the issue of detecting anomalies in real time. Respectively, this paper has surveyed the state-of-the-art real-time big data processing technologies related to anomaly detection and the vital characteristics of associated machine learning algorithms. This paper begins with the explanation of essential contexts and taxonomy of real-time big data processing, anomalous detection, and machine learning algorithms, followed by the review of big data processing technologies. Finally, the identified research challenges of real-time big data processing in anomaly detection are discussed. © 2018 Elsevier Ltd
- Authors: Ariyaluran Habeeb, Riyaz , Nasaruddin, Fariza , Gani, Abdullah , Targio Hashem, Ibrahim , Ahmed, Ejaz , Imran, Muhammad
- Date: 2019
- Type: Text , Journal article , Review
- Relation: International Journal of Information Management Vol. 45, no. (2019), p. 289-307
- Full Text:
- Reviewed:
- Description: The advent of connected devices and omnipresence of Internet have paved way for intruders to attack networks, which leads to cyber-attack, financial loss, information theft in healthcare, and cyber war. Hence, network security analytics has become an important area of concern and has gained intensive attention among researchers, off late, specifically in the domain of anomaly detection in network, which is considered crucial for network security. However, preliminary investigations have revealed that the existing approaches to detect anomalies in network are not effective enough, particularly to detect them in real time. The reason for the inefficacy of current approaches is mainly due the amassment of massive volumes of data though the connected devices. Therefore, it is crucial to propose a framework that effectively handles real time big data processing and detect anomalies in networks. In this regard, this paper attempts to address the issue of detecting anomalies in real time. Respectively, this paper has surveyed the state-of-the-art real-time big data processing technologies related to anomaly detection and the vital characteristics of associated machine learning algorithms. This paper begins with the explanation of essential contexts and taxonomy of real-time big data processing, anomalous detection, and machine learning algorithms, followed by the review of big data processing technologies. Finally, the identified research challenges of real-time big data processing in anomaly detection are discussed. © 2018 Elsevier Ltd
Establishing effective communications in disaster affected areas and artificial intelligence based detection using social media platform
- Raza, Mohsin, Awais, Muhammad, Ali, Kamran, Aslam, Nauman, Paranthaman, Vishnu, Imran, Muhammad, Ali, Farman
- Authors: Raza, Mohsin , Awais, Muhammad , Ali, Kamran , Aslam, Nauman , Paranthaman, Vishnu , Imran, Muhammad , Ali, Farman
- Date: 2020
- Type: Text , Journal article
- Relation: Future Generation Computer Systems Vol. 112, no. (2020), p. 1057-1069
- Full Text:
- Reviewed:
- Description: Floods, earthquakes, storm surges and other natural disasters severely affect the communication infrastructure and thus compromise the effectiveness of communications dependent rescue and warning services. In this paper, a user centric approach is proposed to establish communications in disaster affected and communication outage areas. The proposed scheme forms ad hoc clusters to facilitate emergency communications and connect end-users/ User Equipment (UE) to the core network. A novel cluster formation with single and multi-hop communication framework is proposed. The overall throughput in the formed clusters is maximized using convex optimization. In addition, an intelligent system is designed to label different clusters and their localities into affected and non-affected areas. As a proof of concept, the labeling is achieved on flooding dataset where region specific social media information is used in proposed machine learning techniques to classify the disaster-prone areas as flooded or unflooded. The suitable results of the proposed machine learning schemes suggest its use along with proposed clustering techniques to revive communications in disaster affected areas and to classify the impact of disaster for different locations in disaster-prone areas. © 2020 Elsevier B.V.
- Authors: Raza, Mohsin , Awais, Muhammad , Ali, Kamran , Aslam, Nauman , Paranthaman, Vishnu , Imran, Muhammad , Ali, Farman
- Date: 2020
- Type: Text , Journal article
- Relation: Future Generation Computer Systems Vol. 112, no. (2020), p. 1057-1069
- Full Text:
- Reviewed:
- Description: Floods, earthquakes, storm surges and other natural disasters severely affect the communication infrastructure and thus compromise the effectiveness of communications dependent rescue and warning services. In this paper, a user centric approach is proposed to establish communications in disaster affected and communication outage areas. The proposed scheme forms ad hoc clusters to facilitate emergency communications and connect end-users/ User Equipment (UE) to the core network. A novel cluster formation with single and multi-hop communication framework is proposed. The overall throughput in the formed clusters is maximized using convex optimization. In addition, an intelligent system is designed to label different clusters and their localities into affected and non-affected areas. As a proof of concept, the labeling is achieved on flooding dataset where region specific social media information is used in proposed machine learning techniques to classify the disaster-prone areas as flooded or unflooded. The suitable results of the proposed machine learning schemes suggest its use along with proposed clustering techniques to revive communications in disaster affected areas and to classify the impact of disaster for different locations in disaster-prone areas. © 2020 Elsevier B.V.
- «
- ‹
- 1
- ›
- »