Dynamic Anomaly Detection in Resource-Constrained Environments: Harnessing Robust Random Cut Forests for Resilient Cybernetic Defense
DOI:
https://doi.org/10.31449/inf.v48i23.6862Abstract
Investigating non-parametric anomalies and analyzing the influence of external factors on data integrity, uncovering hidden patterns amid dynamic fluctuations. This paper ex amines anomaly detection in resource-constrained environments using robust random cut forests. Begin with a detailed exploration of resilient random cut data structures for ana lyzing incoming data streams in Internet of Things environment. The methodology used in this paper is to evaluate using diverse datasets, including real-time Arduino data and publicly available sources, to assess algorithmic performance across different scenarios. This research contributes to the theoretical foundations of anomaly detection, stressing the need for adaptive approaches in evolving data landscapes. By employing robust random cut forests, the challenges posed by continuous data streams are addressed, en suring accurate identification of trends and anomalies over time. In summary, this study provides a comprehensive examination of anomaly detection in dynamic data streams, presenting a novel methodology grounded in resilient random partitioning forests. The integration of theoretical insights, updating strategies, and empirical experimentation lays the groundwork for future advancements in dynamic anomaly detection under re source constraints.References
Maklin, Cory. “Isolation Forest.” 2021.
https://medium.com/@corymaklin/
isolation-forest-799fceacdda4.
Liu, Fei Tony, Ting, Kai Ming, and Zhou,
Zhi-Hua. “Isolation-based anomaly detec
tion.” ACM Transactions on Knowledge
Discovery from Data (TKDD), vol. 6, no. 1,
pp. 1–39, 2012. ACM New York, NY, USA.
Emmott, Andrew, Das, Shubhomoy,
Dietterich, Thomas, Fern, Alan, and
Wong, Weng-Keen. “A meta-analysis of
the anomaly detection problem.” arXiv
preprint arXiv:1503.01158, 2015.
Tan, Swee Chuan, Ting, Kai Ming, and
Liu, Tony Fei. “Fast anomaly detection for
streaming data.” In Twenty-second Interna
tional Joint Conference on Artificial Intel
ligence, 2011. Citeseer
Hariri, Sahand, Kind, Matias Carrasco, and
Brunner, Robert J. “Extended isolation for
est.” IEEE Transactions on Knowledge and
Data Engineering, vol. 33, no. 4, pp. 1479
, 2019. IEEE.
Primartha, Rifkie and Tama, Bayu Adhi.
“Anomaly detection using random forest:
A performance revisited.” In 2017 Inter
national Conference on Data and Soft
ware Engineering (ICoDSE), pp. 1–6, 2017.
IEEE.
Liu, Fei Tony, Ting, Kai Ming, and Zhou,
Zhi-Hua. “Isolation forest.” In 2008 Eighth
IEEE International Conference on Data
Mining, pp. 413–422, 2008. IEEE.
Amazon Web Services. “Amazon Sage
Maker Random Cut Forest.” 2022. https:
//docs.aws.amazon.com/sagemaker/
latest/dg/randomcutforest.html.
Nguyen, Thanh, Rattanatamrong, Pairat,
Phai, Viet-Dung, and Shi, Qinghan. “Hi
erarchical Ensemble Learning Using Pre
trained Feature Extractors for Network In
trusion Detection.” IEEE Transactions on
Systems, Man, and Cybernetics: Systems,
vol. 51, no. 4, pp. 2406–2417, 2021. DOI:
1109/TSMC.2020.3034602.
Hawkins, Douglas M. Identification of Outliers. Springer, 1980. vol. 11, pp. 1–2, Berlin, Germany.
Canadian Institute for Cybersecurity (CIC). “CIC-IoT Dataset.” 2023.iotdataset-2023.html. Accessed on: July 8, 2024.
Stratosphere IPS. “IoT-23 Dataset.” 2022.
https://www.stratosphereips.org/
datasets-iot23. Accessed on: July 8,
https://www.unb.ca/cic/datasets
Downloads
Published
How to Cite
Issue
Section
License
I assign to Informatica, An International Journal of Computing and Informatics ("Journal") the copyright in the manuscript identified above and any additional material (figures, tables, illustrations, software or other information intended for publication) submitted as part of or as a supplement to the manuscript ("Paper") in all forms and media throughout the world, in all languages, for the full term of copyright, effective when and if the article is accepted for publication. This transfer includes the right to reproduce and/or to distribute the Paper to other journals or digital libraries in electronic and online forms and systems.
I understand that I retain the rights to use the pre-prints, off-prints, accepted manuscript and published journal Paper for personal use, scholarly purposes and internal institutional use.
In certain cases, I can ask for retaining the publishing rights of the Paper. The Journal can permit or deny the request for publishing rights, to which I fully agree.
I declare that the submitted Paper is original, has been written by the stated authors and has not been published elsewhere nor is currently being considered for publication by any other journal and will not be submitted for such review while under review by this Journal. The Paper contains no material that violates proprietary rights of any other person or entity. I have obtained written permission from copyright owners for any excerpts from copyrighted works that are included and have credited the sources in my article. I have informed the co-author(s) of the terms of this publishing agreement.
Copyright © Slovenian Society Informatika