Dynamic Anomaly Detection in Resource-Constrained Environments: Harnessing Robust Random Cut Forests for Resilient Cybernetic Defense
Abstract
Investigating non-parametric anomalies and analyzing the influence of external factors on data integrity, uncovering hidden patterns amid dynamic fluctuations. This paper ex amines anomaly detection in resource-constrained environments using robust random cut forests. Begin with a detailed exploration of resilient random cut data structures for ana lyzing incoming data streams in Internet of Things environment. The methodology used in this paper is to evaluate using diverse datasets, including real-time Arduino data and publicly available sources, to assess algorithmic performance across different scenarios. This research contributes to the theoretical foundations of anomaly detection, stressing the need for adaptive approaches in evolving data landscapes. By employing robust random cut forests, the challenges posed by continuous data streams are addressed, en suring accurate identification of trends and anomalies over time. In summary, this study provides a comprehensive examination of anomaly detection in dynamic data streams, presenting a novel methodology grounded in resilient random partitioning forests. The integration of theoretical insights, updating strategies, and empirical experimentation lays the groundwork for future advancements in dynamic anomaly detection under re source constraints.References
Maklin, Cory. “Isolation Forest.” 2021.
https://medium.com/@corymaklin/
isolation-forest-799fceacdda4.
Liu, Fei Tony, Ting, Kai Ming, and Zhou,
Zhi-Hua. “Isolation-based anomaly detec
tion.” ACM Transactions on Knowledge
Discovery from Data (TKDD), vol. 6, no. 1,
pp. 1–39, 2012. ACM New York, NY, USA.
Emmott, Andrew, Das, Shubhomoy,
Dietterich, Thomas, Fern, Alan, and
Wong, Weng-Keen. “A meta-analysis of
the anomaly detection problem.” arXiv
preprint arXiv:1503.01158, 2015.
Tan, Swee Chuan, Ting, Kai Ming, and
Liu, Tony Fei. “Fast anomaly detection for
streaming data.” In Twenty-second Interna
tional Joint Conference on Artificial Intel
ligence, 2011. Citeseer
Hariri, Sahand, Kind, Matias Carrasco, and
Brunner, Robert J. “Extended isolation for
est.” IEEE Transactions on Knowledge and
Data Engineering, vol. 33, no. 4, pp. 1479
, 2019. IEEE.
Primartha, Rifkie and Tama, Bayu Adhi.
“Anomaly detection using random forest:
A performance revisited.” In 2017 Inter
national Conference on Data and Soft
ware Engineering (ICoDSE), pp. 1–6, 2017.
IEEE.
Liu, Fei Tony, Ting, Kai Ming, and Zhou,
Zhi-Hua. “Isolation forest.” In 2008 Eighth
IEEE International Conference on Data
Mining, pp. 413–422, 2008. IEEE.
Amazon Web Services. “Amazon Sage
Maker Random Cut Forest.” 2022. https:
//docs.aws.amazon.com/sagemaker/
latest/dg/randomcutforest.html.
Nguyen, Thanh, Rattanatamrong, Pairat,
Phai, Viet-Dung, and Shi, Qinghan. “Hi
erarchical Ensemble Learning Using Pre
trained Feature Extractors for Network In
trusion Detection.” IEEE Transactions on
Systems, Man, and Cybernetics: Systems,
vol. 51, no. 4, pp. 2406–2417, 2021. DOI:
1109/TSMC.2020.3034602.
Hawkins, Douglas M. Identification of Outliers. Springer, 1980. vol. 11, pp. 1–2, Berlin, Germany.
Canadian Institute for Cybersecurity (CIC). “CIC-IoT Dataset.” 2023.iotdataset-2023.html. Accessed on: July 8, 2024.
Stratosphere IPS. “IoT-23 Dataset.” 2022.
https://www.stratosphereips.org/
datasets-iot23. Accessed on: July 8,
https://www.unb.ca/cic/datasets
DOI:
https://doi.org/10.31449/inf.v48i23.6862Downloads
Published
How to Cite
Issue
Section
License
Authors retain copyright in their work. By submitting to and publishing with Informatica, authors grant the publisher (Slovene Society Informatika) the non-exclusive right to publish, reproduce, and distribute the article and to identify itself as the original publisher.
All articles are published under the Creative Commons Attribution license CC BY 3.0. Under this license, others may share and adapt the work for any purpose, provided appropriate credit is given and changes (if any) are indicated.
Authors may deposit and share the submitted version, accepted manuscript, and published version, provided the original publication in Informatica is properly cited.







