A Hybrid Deep Learning Approach for Detecting Anomalies in Real-Time Data Streams

A crucial problem in many fields, such as cyber-security, financial fraud detection, industrial monitoring, and healthcare, is anomaly identification in real-time data streams. Conventional anomaly detection approaches, such machine learning models and statistical techniques, have trouble processing...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International Conference for Emerging Technology (Online) S. 1 - 6
Hauptverfasser: Mishra, Aditya Mohan, Yadav, Daksh, Shakya, Ananmaya, Jayesh, Vagh, Bala, Er. Neetu
Format: Tagungsbericht
Sprache:Englisch
Veröffentlicht: IEEE 23.05.2025
Schlagworte:
ISBN:9798331518738
ISSN:2996-4490
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract A crucial problem in many fields, such as cyber-security, financial fraud detection, industrial monitoring, and healthcare, is anomaly identification in real-time data streams. Conventional anomaly detection approaches, such machine learning models and statistical techniques, have trouble processing high-dimensional data, adjusting to concept drift, and sustaining low-latency performance in real-time settings. In order to overcome these obstacles, this study suggests a scalable and reliable anomaly detection framework that makes use of deep learning methods, specifically Generative Adversarial Networks (GANs) for anomaly generation and detection and autoencoders (AEs) for dimensionality reduction. There are two main parts to the suggested framework. In order to reduce computational complexity while maintaining important data features, an autoencoder-based feature extraction module first learns compact representations of normal data. High reconstruction error data points are marked as possible abnormalities. Second, by training a discriminator to discern between generated and genuine normal samples, and training a generator to replicate normal data distributions, a GAN-based anomaly detection model improves the detection process even more. An anomaly is defined as any real-time data point that substantially differs from the learnt distribution. The system uses model compression methods like quantisation and pruning, distributed processing using Apache Spark and Kafka, and an adaptive learning mechanism to dynamically tackle concept drift in order to maximise scalability and guarantee real-time performance. Experiments on benchmark datasets such as KDD99, UNSW-NB15, and SWaT show that our method achieves low false positive rates, high detection accuracy (AUC-ROC 0.95), and real-time inference speeds (50ms per data point).For real-world applications where prompt anomaly identification is essential, this research offers a scalable, high-performance anomaly detection system. To further improve the detection system's resilience, future research will investigate hybrid deep learning models that combine reinforcement learning and transformers.
AbstractList A crucial problem in many fields, such as cyber-security, financial fraud detection, industrial monitoring, and healthcare, is anomaly identification in real-time data streams. Conventional anomaly detection approaches, such machine learning models and statistical techniques, have trouble processing high-dimensional data, adjusting to concept drift, and sustaining low-latency performance in real-time settings. In order to overcome these obstacles, this study suggests a scalable and reliable anomaly detection framework that makes use of deep learning methods, specifically Generative Adversarial Networks (GANs) for anomaly generation and detection and autoencoders (AEs) for dimensionality reduction. There are two main parts to the suggested framework. In order to reduce computational complexity while maintaining important data features, an autoencoder-based feature extraction module first learns compact representations of normal data. High reconstruction error data points are marked as possible abnormalities. Second, by training a discriminator to discern between generated and genuine normal samples, and training a generator to replicate normal data distributions, a GAN-based anomaly detection model improves the detection process even more. An anomaly is defined as any real-time data point that substantially differs from the learnt distribution. The system uses model compression methods like quantisation and pruning, distributed processing using Apache Spark and Kafka, and an adaptive learning mechanism to dynamically tackle concept drift in order to maximise scalability and guarantee real-time performance. Experiments on benchmark datasets such as KDD99, UNSW-NB15, and SWaT show that our method achieves low false positive rates, high detection accuracy (AUC-ROC 0.95), and real-time inference speeds (50ms per data point).For real-world applications where prompt anomaly identification is essential, this research offers a scalable, high-performance anomaly detection system. To further improve the detection system's resilience, future research will investigate hybrid deep learning models that combine reinforcement learning and transformers.
Author Shakya, Ananmaya
Yadav, Daksh
Bala, Er. Neetu
Mishra, Aditya Mohan
Jayesh, Vagh
Author_xml – sequence: 1
  givenname: Aditya Mohan
  surname: Mishra
  fullname: Mishra, Aditya Mohan
  email: adityammishra1110@gmail.com
  organization: Chandigarh University,Dept. of Computer Science
– sequence: 2
  givenname: Daksh
  surname: Yadav
  fullname: Yadav, Daksh
  email: dakshyadav0987@gmail.com
  organization: Chandigarh University,Dept. of Computer Science
– sequence: 3
  givenname: Ananmaya
  surname: Shakya
  fullname: Shakya, Ananmaya
  email: ananmayashakya@gmail.com
  organization: Chandigarh University,Dept. of Computer Science
– sequence: 4
  givenname: Vagh
  surname: Jayesh
  fullname: Jayesh, Vagh
  email: jayeshvagh955@gmail.com
  organization: Chandigarh University,Dept. of Computer Science
– sequence: 5
  givenname: Er. Neetu
  surname: Bala
  fullname: Bala, Er. Neetu
  email: neetubala211@gmail.in
  organization: Chandigarh University,Dept. of Computer Science
BookMark eNpVkMlOwzAURc0kUUr-gIV_IMVT7LxllBZaKQIB2Vd28gJGmeRk078nYliwuVc6R7qLe0Mu-6FHQihnG84Z3B-e8l2plTJ8I5hIFsgVY0KfkQgMpFLyhKdG8HOyEgA6VgrYxT8n02sSTdMnY0wKJg0XK_KS0f3JBV_TLeJIC7Sh9_07zcYxDLb6oM0QFjVjNX_jfuhs63GivqevaNu49B3SrZ0tfZsD2m66JVeNbSeMfntNyoddme_j4vnxkGdF7EHOcVULk6BUkGqnFTqmEZrK1YkDV-klwCijQKAygNKCQ9CCi7SWae2cauSa3P3MekQ8jsF3NpyOf6fIL85sVV4
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/INCET64471.2025.11140026
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE/IET Electronic Library
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9798331518721
9798331531034
EISSN 2996-4490
EndPage 6
ExternalDocumentID 11140026
Genre orig-research
GroupedDBID 6IE
6IF
6IL
6IN
ABLEC
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
OCL
RIE
RIL
ID FETCH-LOGICAL-i93t-cd275e34986b64eb06e9fcbd5b9bc6b9b9747492e479e3a9be962128d38dbb4f3
IEDL.DBID RIE
ISBN 9798331518738
IngestDate Wed Sep 10 07:40:44 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i93t-cd275e34986b64eb06e9fcbd5b9bc6b9b9747492e479e3a9be962128d38dbb4f3
PageCount 6
ParticipantIDs ieee_primary_11140026
PublicationCentury 2000
PublicationDate 2025-May-23
PublicationDateYYYYMMDD 2025-05-23
PublicationDate_xml – month: 05
  year: 2025
  text: 2025-May-23
  day: 23
PublicationDecade 2020
PublicationTitle International Conference for Emerging Technology (Online)
PublicationTitleAbbrev INCET
PublicationYear 2025
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0003203712
Score 1.9094332
Snippet A crucial problem in many fields, such as cyber-security, financial fraud detection, industrial monitoring, and healthcare, is anomaly identification in...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Adaptive Thresholding
Anomaly detection
Autoen-coders
Concept drift
Cybersecurity
Deep learning
Dimensionality reduction
Feature extraction
Fraud
Fraud Detection
Generative adversarial networks
Generative Adversarial Networks (GANs)
Low latency communication
Low-Latency Processing
Real-time systems
Scalable Anomaly Detection
Self-Supervised Learning
Training
Title A Hybrid Deep Learning Approach for Detecting Anomalies in Real-Time Data Streams
URI https://ieeexplore.ieee.org/document/11140026
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09b8IwELUK6tCprUrVb3noaghx4o8RlSK6IFoxsCE7PlcMBAQBqf--PhOoOnToElmOYkVn2e_O5_eOkOfEgxQ2LKTcgGJhwyuYNVoxL4A7L4w21sViE3I0UtOpHtdk9ciFAYB4-Qza2Iy5fLcstnhU1gnrMsOgoUEaUoo9Wet4oMJTVJ-Len1SK84DlCnJ1eH2TqI7b1jtJeC_xLgwzduH4X4VVom4Mjj_5x9dkNYPQ4-Oj9hzSU6gvCLvPTr8QgYW7QOsaC2d-kl7tW44DQ5qeIVpg9hdLhfBC4cNnZf0IziMDPkgtG8qQzFZbRabFpkMXicvQ1aXTGBzzStWuFTmwDOthBUZ2ESA9oV1udW2EOGB0UOmU8ikBm60BS0CdinHlbM28_yaNMtlCTeE5rLouvCVD3tC1jXOeI3SbakyKrHC-lvSQnPMVntRjNnBEnd_9N-TMzQ6Jt5T_kCa1XoLj-S02FXzzfopTuU3ZaKc2w
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NTwIxEG0UTfSkRozf9uB1Ydnu9uNIRAMRCRoO3Ei7nRoOLAQWE_-9nbpgPHjw0jTdbNO0aWem0_ceIfexA8GN30iZBhn5Ay-PjFYychyYdVwrbWwQmxCDgRyP1bACqwcsDACEx2fQwGrI5dt5vsarsqbflykGDbtkD6WzKrjW9kqFJcg_Fxj7hJKMeWMmBZOb9zuxavZQ78V7AAIjwyRrbDr8Ja0SLMvT0T_HdEzqPxg9OtxanxOyA8UpeW3T7idisGgHYEEr8tR32q6Yw6l3Uf0nTByE5mI-8344rOi0oG_eZYwQEUI7utQU09V6tqqT0dPj6KEbVaIJ0VSxMsptIjJgqZLc8BRMzEG53NjMKJNzX2D8kKoEUqGAaWVAcW-9pGXSGpM6dkZqxbyAc0Izkbes_8v5UyFtaaudQvK2RGoZG27cBanjdEwW37QYk81MXP7RfkcOuqOX_qTfGzxfkUNcAEzDJ-ya1MrlGm7Ifv5RTlfL27CsX8a0oCQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=International+Conference+for+Emerging+Technology+%28Online%29&rft.atitle=A+Hybrid+Deep+Learning+Approach+for+Detecting+Anomalies+in+Real-Time+Data+Streams&rft.au=Mishra%2C+Aditya+Mohan&rft.au=Yadav%2C+Daksh&rft.au=Shakya%2C+Ananmaya&rft.au=Jayesh%2C+Vagh&rft.date=2025-05-23&rft.pub=IEEE&rft.isbn=9798331518738&rft.eissn=2996-4490&rft.spage=1&rft.epage=6&rft_id=info:doi/10.1109%2FINCET64471.2025.11140026&rft.externalDocID=11140026
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9798331518738/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9798331518738/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9798331518738/sc.gif&client=summon&freeimage=true