Loading

A Review of Anomaly Detection Machine Learning and Deep Learning Techniques
Rimjhim Rathore1, Pratik Gite2

1Rimjhim Rathore, Student, Department of Computer Science, IES, IPS Academy Indore (M.P.), India.

2Dr. Pratik Gite, Assistant Professor, Department of Computer Science, IES, IPS Academy Indore (M.P.), India.    

Manuscript received on 26 June 2025 | First Revised Manuscript received on 12 July 2025 | Second Revised Manuscript received on 22 July 2025 | Manuscript Accepted on 15 August 2025 | Manuscript published on 30 August 2025 | PP: 9-14 | Volume-13 Issue-9, August 2025 | Retrieval Number: 100.1/ijese.E25280410522 | DOI: 10.35940/ijese.E2528.13090825

Open Access | Editorial and Publishing Policies | Cite | Zenodo | OJS | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In general, an anomaly may be defined as a variance or departure from what is expected or normal. According to historical records, the term “anomaly” was derived from the Greek word “anomalia,” which translates as “uneven” or “irregular.” Many examples of such abnormalities or deviations from normalcy have occurred in our everyday lives, and we have all seen them. For example, when a condition monitoring system detects any value or parameter of the machine that falls outside the minimum value limit to the maximum value limit, it beeps an alert. Similarly, when credit card fraud is detected, it notifies both the bank and the customer immediately. Currently, the most challenging problem is determining how to identify irregularities in data streams. An example of a data stream is a continuous stream of data that is continuously formed from any source and is referred to as streaming data (also known as streaming information). Finding anomalies in such a significant amount of data will be a time-consuming and challenging endeavour. In this paper, we will delve into the details of data streams and anomaly detection in data streams, examining a substantial number of papers and articles published on the topic in recent years.

Keywords: Anomaly, Anomaly Detection, Intrusion Detection, Outlier, Supervised, Unsupervised.
Scope of the Article: Computer Science and Applications