CLC number:
On-line Access: 2024-12-30
Received: 2024-06-01
Revision Accepted: 2024-11-18
Crosschecked: 0000-00-00
Cited: 0
Clicked: 49
Jiayi GU, Zhongnan MA, Hao ZHOU, Yan SU, Miaoru ZHANG, Ke YU, Xiaofei WU. Deep anomaly detection of temporal heterogeneous data in AIOps: a survey?[J]. Frontiers of Information Technology & Electronic Engineering, 1998, -1(-1): .
@article{title="Deep anomaly detection of temporal heterogeneous data in AIOps: a survey?",
author="Jiayi GU, Zhongnan MA, Hao ZHOU, Yan SU, Miaoru ZHANG, Ke YU, Xiaofei WU",
journal="Frontiers of Information Technology & Electronic Engineering",
volume="-1",
number="-1",
pages="",
year="1998",
publisher="Zhejiang University Press & Springer",
doi="10.1631/FITEE.2400467"
}
%0 Journal Article
%T Deep anomaly detection of temporal heterogeneous data in AIOps: a survey?
%A Jiayi GU
%A Zhongnan MA
%A Hao ZHOU
%A Yan SU
%A Miaoru ZHANG
%A Ke YU
%A Xiaofei WU
%J Journal of Zhejiang University SCIENCE C
%V -1
%N -1
%P
%@ 2095-9184
%D 1998
%I Zhejiang University Press & Springer
%DOI 10.1631/FITEE.2400467
TY - JOUR
T1 - Deep anomaly detection of temporal heterogeneous data in AIOps: a survey?
A1 - Jiayi GU
A1 - Zhongnan MA
A1 - Hao ZHOU
A1 - Yan SU
A1 - Miaoru ZHANG
A1 - Ke YU
A1 - Xiaofei WU
J0 - Journal of Zhejiang University Science C
VL - -1
IS - -1
SP -
EP -
%@ 2095-9184
Y1 - 1998
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/FITEE.2400467
Abstract: The advancement of 5G mobile communication and internet of things (IoT) has facilitated the development of intelligent applications, but has also rendered these networks increasingly complex and vulnerable to various targeted attacks. Numerous anomaly detection models, particularly those utilizing deep learning technologies, have been proposed to monitor and identify network anomalous events. However, the implementation of these models poses challenges for network operators lacking expert knowledge of these black-box systems. In this study, we present a comprehensive review of current anomaly detection models and methods in the field of communication networks. We categorize these models into four methodological groups based on their underlying principles and structures, with particular emphasis on the role of recent promising large language models (LLMs) in the field of anomaly detection. Additionally, we provide a detailed discussion of the models in the following four application areas: network traffic monitoring, networking system log analysis, cloud and edge service provisioning, and IoT security. Based on these application requirements, we examine the current challenges and offer insights into future research directions, including robustness, explainability, and the integration of LLMs for anomaly detection.
Open peer comments: Debate/Discuss/Question/Opinion
<1>