Anomaly Detection Algorithms in Cybersecurity

Anomaly Detection Algorithms in Cybersecurity

Manthan S. Manavadaria (Charotar University of Science and Technology, India), T. Aditya Sai Srinivas (Jayaprakash Narayan College of Engineering, India), Shaik Khaleel Ahamed (Methodist College of Engineering and Technology, India), M. Amshavalli (Erode Sengunthar Engineering College, India), Akabarsaheb Babulal Nadaf (Bharati Vidyapeeth University (Deemed), India), and V. Bhoopathy (Sree Rama Engineering College, India)
Copyright: © 2025 |Pages: 22
DOI: 10.4018/979-8-3693-7540-2.ch013
OnDemand:
(Individual Chapters)
Forthcoming
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In Anomaly Detection Algorithms in Cybersecurity, this chapter go over the fundamentals of the algorithms and techniques used to spot cyber threats. These methods include statistical, machine learning, deep learning, and clustering. In order to find statistical outliers, traditional anomaly detection employs Gaussian Mixture Models, which model the system's normal behavior. In order to improve their anomaly detection abilities, SVM and RF learn on tagged datasets. Using autoencoders for complicated and multidimensional data sets, deep learning has stabilized anomaly detection. K-Means and DBSCAN are two alternatives that can cluster data points and find outliers. This chapter takes a look at the algorithms and how they're utilized for identifying insider threats, fraud, malware, and network intrusions. In order to improve cybersecurity anomaly detection methods and safeguard against a wide variety of digital threats, this chapter takes a look at existing algorithms and methodology, analyzes their uses, problems, and potential future developments.
Chapter Preview

Complete Chapter List

Search this Book:
Reset