• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Li Xiaocan, Xie Kun, Zhang Dafang, Xie Gaogang. Survey of Network Anomaly Detection Based on Low-Rank Decomposition[J]. Journal of Computer Research and Development, 2022, 59(7): 1589-1609. DOI: 10.7544/issn1000-1239.20210503
Citation: Li Xiaocan, Xie Kun, Zhang Dafang, Xie Gaogang. Survey of Network Anomaly Detection Based on Low-Rank Decomposition[J]. Journal of Computer Research and Development, 2022, 59(7): 1589-1609. DOI: 10.7544/issn1000-1239.20210503

Survey of Network Anomaly Detection Based on Low-Rank Decomposition

Funds: This work was supported by the National Natural Science Foundation of China for Distinguished Young Scholars (62025201), the China National Postdoctoral Program for Innovative Talents (BX20200120), the China Postdoctoral Science Foundation (2020M682556), the National Natural Science Foundation of China (62102138, 61976087), and the Hunan Provincial Natural Science Foundation of China (2021JJ40115).
More Information
  • Published Date: June 30, 2022
  • Network anomaly detection is essential for network management and network security. Over the years, a large number of domestic and foreign documents have proposed a series of network anomaly detection methods, most of which focus on the analysis, detection and warning of data packets and independent time series data streams. This kind of method only uses the temporal correlation between network data and it is difficult to detect new types of network anomalies, locate and eliminate abnormal data. In order to solve the above problems, some literatures integrate multiple time series data streams and study network anomaly detection methods based on low-rank decomposition. These methods make full use of the spatio-temporal correlation between network data, and they could locate the location of abnormal data without supervision, and eliminate the abnormal data at the same time, so as to restore the normal data of the network. We firstly analyze the anomaly detection methods based on low-rank decomposition. The methods are divided into four categories according to its different constraints on normal data and abnormal data, and the basic ideas, advantages and disadvantages of each method are introduced. Then, the challenges of existing anomaly detection methods based on low-rank decomposition are analyzed. Finally, the possible future development trends are predicted.
  • Related Articles

    [1]Sun Hao, Han Zhongyi, Wang Fan, Yin Yilong. Backward Pseudo-Label and Optimal Transport for Unsupervised Domain Adaptation[J]. Journal of Computer Research and Development, 2023, 60(8): 1696-1710. DOI: 10.7544/issn1000-1239.202330163
    [2]Zhou Xiaohui, Wang Yijie, Xu Hongzuo, Liu Mingyu. Fusion Learning Based Unsupervised Anomaly Detection for Multi-Dimensional Time Series[J]. Journal of Computer Research and Development, 2023, 60(3): 496-508. DOI: 10.7544/issn1000-1239.202220490
    [3]Chen Liwen, Ye Feng, Huang Tianqiang, Huang Liqing, Weng Bin, Xu Chao, Hu Jie. An Unsupervised Person Re-Identification Method Based on Intra-/Inter-Camera Merger[J]. Journal of Computer Research and Development, 2023, 60(2): 415-425. DOI: 10.7544/issn1000-1239.202110732
    [4]Cai Derun, Li Hongyan. A Metric Learning Based Unsupervised Domain Adaptation Method with Its Application on Mortality Prediction[J]. Journal of Computer Research and Development, 2022, 59(3): 674-682. DOI: 10.7544/issn1000-1239.20200693
    [5]Huang Xunhua, Zhang Fengbin, Fan Haoyi, Xi Liang. Multimodal Adversarial Learning Based Unsupervised Time Series Anomaly Detection[J]. Journal of Computer Research and Development, 2021, 58(8): 1655-1667. DOI: 10.7544/issn1000-1239.2021.20201037
    [6]Feng Yun, Liu Baoxu, Zhang Jinli, Wang Xutong, Liu Chaoge, Shen Mingzhe, Liu Qixu. An Unsupervised Method for Timely Exfiltration Attack Discovery[J]. Journal of Computer Research and Development, 2021, 58(5): 995-1005. DOI: 10.7544/issn1000-1239.2021.20200902
    [7]Liu Yanfang, Li Wenbin, Gao Yang. Adaptive Neighborhood Embedding Based Unsupervised Feature Selection[J]. Journal of Computer Research and Development, 2020, 57(8): 1639-1649. DOI: 10.7544/issn1000-1239.2020.20200219
    [8]Zhang Hao, Wu Jianxin. A Survey on Unsupervised Image Retrieval Using Deep Features[J]. Journal of Computer Research and Development, 2018, 55(9): 1829-1842. DOI: 10.7544/issn1000-1239.2018.20180058
    [9]Liang Peng, Li Shaofa, Wang Cheng. A New Unsupervised Foreground Object Detection Method[J]. Journal of Computer Research and Development, 2012, 49(8): 1721-1729.
    [10]Xu Junling, Zhou Yuming, Chen Lin, Xu Baowen. An Unsupervised Feature Selection Approach Based on Mutual Information[J]. Journal of Computer Research and Development, 2012, 49(2): 372-382.
  • Cited by

    Periodical cited type(5)

    1. 傅冰飞,陈同林,许枫,朱麟,李斌,薛向阳. 基于背景-前景组成式建模的电路板异常检测. 计算机研究与发展. 2025(01): 144-159 . 本站查看
    2. 孙留存,于龙,刘斌. 基于人工智能的电力巡检机器人网络故障自动化检测系统. 自动化与仪表. 2025(02): 63-65+72 .
    3. 薛泼. 发电厂智能化视频监控终端网络入侵检测研究. 电气技术与经济. 2025(02): 341-344 .
    4. 廖吟秋,王亚春. 基于cusum算法的电商直播信号异常波动特征建模. 自动化与仪器仪表. 2023(06): 54-57+62 .
    5. 杨亚琦,李博雄,杨东霞,刘燕. 基于信息熵的异常数据判别方法. 科学技术创新. 2023(24): 194-199 .

    Other cited types(7)

Catalog

    Article views (452) PDF downloads (222) Cited by(12)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return