Comparison Study Among Various Anomaly Detection Techniques

Abstract

Many approaches are implemented for the detection of anomalies on the system. Anomalies based approaches are considered as efficient from that user intention based approach is preferred for the implementation of anomaly detection. Now a days variety of anomaly detection techniques are available because of this it is very difficult to compare the advantages and disadvantages of these methods .To know this ,different anomaly detection are reviewed and make a detailed study in this. This paper contains a comparison study of different anomaly detection techniques and identification of their merits and demerits.

Authors and Affiliations

DEVIKA U K, Mrs. DIVYA SUNNY

Keywords

Related Articles

Method To Enhance The Capacity Of Embedding Data In Jpeg Images

A novel method of reversible data hiding is proposed here. The technique relies on data hiding in encrypted JPEG images is used. As we know that encryption is an effective method of privacy protection .All previous m...

Video Frame Retrieval Using Effective Query Processing

Video frame retrieval from a long video sequence is atypical known problem to many of us. In this work we have discussed a graph transformation and matching approach to the problem. We introduce a query algorithm to...

Performance Analysis Of Vedic Multiplier Using Reversible Logic In Spartan 6

A system's performance is generally determined by the performance of the multiplier, because the multiplier is generally the slowest element in the system. Multipliers are key components of many high performance syst...

Quality Of Service And Load Balancing For Data Center In Cloud

Cloud frameworks are not quite the same as normal dispersed frameworks. Above all else, they are branded by an extremely big numeral of resources that can distance different administrative domains. Presentation evalua...

An Approach To Control Congestion And Improve Performance Of TCP Vegas In Ad Hoc Network

Computers and the Internet play a essential role in people’s life. Internet users and network application increases day by day and hence large amount of network is important but bandwidth is limited. As network requi...

Download PDF file
  • EP ID EP27891
  • DOI -
  • Views 257
  • Downloads 0

How To Cite

DEVIKA U K, Mrs. DIVYA SUNNY (2014). Comparison Study Among Various Anomaly Detection Techniques. International Journal of Research in Computer and Communication Technology, 3(3), -. https://europub.co.uk/articles/-A-27891