Full Text:  <477>

CLC number: 

On-line Access: 2024-12-30

Received: 2024-06-01

Revision Accepted: 2024-11-18

Crosschecked: 0000-00-00

Cited: 0

Clicked: 286

Citations:  Bibtex RefMan EndNote GB/T7714

-   Go to

Article info.
Open peer comments

Frontiers of Information Technology & Electronic Engineering 

Accepted manuscript available online (unedited version)


Deep anomaly detection of temporal heterogeneous data in AIOps: a survey?


Author(s):  Jiayi GU, Zhongnan MA, Hao ZHOU, Yan SU, Miaoru ZHANG, Ke YU, Xiaofei WU

Affiliation(s):  School of Artificial Intelligence, Beijing University of Posts and Telecommunications, Beijing 100876, China

Corresponding email(s):  hypatia@bupt.edu.cn, zhongnanma@bupt.edu.cn, yuke@bupt.edu.cn

Key Words:  Anomaly detection; AIOps; Large language models; Communications networks


Share this article to: More <<< Previous Paper|Next Paper >>>

Jiayi GU, Zhongnan MA, Hao ZHOU, Yan SU, Miaoru ZHANG, Ke YU, Xiaofei WU. Deep anomaly detection of temporal heterogeneous data in AIOps: a survey?[J]. Frontiers of Information Technology & Electronic Engineering,in press.https://doi.org/10.1631/FITEE.2400467

@article{title="Deep anomaly detection of temporal heterogeneous data in AIOps: a survey?",
author="Jiayi GU, Zhongnan MA, Hao ZHOU, Yan SU, Miaoru ZHANG, Ke YU, Xiaofei WU",
journal="Frontiers of Information Technology & Electronic Engineering",
year="in press",
publisher="Zhejiang University Press & Springer",
doi="https://doi.org/10.1631/FITEE.2400467"
}

%0 Journal Article
%T Deep anomaly detection of temporal heterogeneous data in AIOps: a survey?
%A Jiayi GU
%A Zhongnan MA
%A Hao ZHOU
%A Yan SU
%A Miaoru ZHANG
%A Ke YU
%A Xiaofei WU
%J Frontiers of Information Technology & Electronic Engineering
%P
%@ 2095-9184
%D in press
%I Zhejiang University Press & Springer
doi="https://doi.org/10.1631/FITEE.2400467"

TY - JOUR
T1 - Deep anomaly detection of temporal heterogeneous data in AIOps: a survey?
A1 - Jiayi GU
A1 - Zhongnan MA
A1 - Hao ZHOU
A1 - Yan SU
A1 - Miaoru ZHANG
A1 - Ke YU
A1 - Xiaofei WU
J0 - Frontiers of Information Technology & Electronic Engineering
SP -
EP -
%@ 2095-9184
Y1 - in press
PB - Zhejiang University Press & Springer
ER -
doi="https://doi.org/10.1631/FITEE.2400467"


Abstract: 
The advancement of 5G mobile communication and internet of things (IoT) has facilitated the development of intelligent applications, but has also rendered these networks increasingly complex and vulnerable to various targeted attacks. Numerous anomaly detection models, particularly those utilizing deep learning technologies, have been proposed to monitor and identify network anomalous events. However, the implementation of these models poses challenges for network operators lacking expert knowledge of these black-box systems. In this study, we present a comprehensive review of current anomaly detection models and methods in the field of communication networks. We categorize these models into four methodological groups based on their underlying principles and structures, with particular emphasis on the role of recent promising large language models (LLMs) in the field of anomaly detection. Additionally, we provide a detailed discussion of the models in the following four application areas: network traffic monitoring, networking system log analysis, cloud and edge service provisioning, and IoT security. Based on these application requirements, we examine the current challenges and offer insights into future research directions, including robustness, explainability, and the integration of LLMs for anomaly detection.

Darkslateblue:Affiliate; Royal Blue:Author; Turquoise:Article

Reference

Open peer comments: Debate/Discuss/Question/Opinion

<1>

Please provide your name, email address and a comment





Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE