Published: 2024-12-01
The Application of Artificial Intelligence for Anomaly Detection in Big Data Systems for Decision-Making
DOI: 10.35870/ijsecs.v4i3.3358
Cut Susan Octiva, Dikky Suryadi, Loso Judijanto, Mitranikasih Laia, Dedy Irwan
Article Metrics
- Views 0
- Downloads 0
- Scopus Citations
- Google Scholar
- Crossref Citations
- Semantic Scholar
- DataCite Metrics
-
If the link doesn't work, copy the DOI or article title for manual search (API Maintenance).
Abstract
The development of big data technology has generated huge volumes of diverse data, creating challenges in detecting anomalies that could potentially affect decision-making. This research aims to examine the application of artificial intelligence (AI) in detecting anomalies in big data systems to support faster, more accurate and effective decision-making. The approach used includes the integration of machine learning algorithms, such as classification-based detection, clustering, and deep learning, in identifying abnormal patterns in large datasets. The research method involves real-time dataset-based simulations by measuring the performance of AI models using accuracy, precision, recall, and F1-score metrics. The results show that the application of AI can significantly improve the anomaly detection capability compared to conventional methods, with an average accuracy of 92%.
Keywords
Artificial Intelligence ; Anomalies ; Big Data
Article Metadata
Peer Review Process
This article has undergone a double-blind peer review process to ensure quality and impartiality.
Indexing Information
Discover where this journal is indexed at our indexing page to understand its reach and credibility.
Open Science Badges
This journal supports transparency in research and encourages authors to meet criteria for Open Science Badges by sharing data, materials, or preregistered studies.
How to Cite
Article Information
This article has been peer-reviewed and published in the International Journal Software Engineering and Computer Science (IJSECS). The content is available under the terms of the Creative Commons Attribution 4.0 International License.
-
Issue: Vol. 4 No. 3 (2024)
-
Section: Articles
-
Published: %750 %e, %2024
-
License: CC BY 4.0
-
Copyright: © 2024 Authors
-
DOI: 10.35870/ijsecs.v4i3.3358
AI Research Hub
This article is indexed and available through various AI-powered research tools and citation platforms. Our AI Research Hub ensures that scholarly work is discoverable, accessible, and easily integrated into the global research ecosystem. By leveraging artificial intelligence for indexing, recommendation, and citation analysis, we enhance the visibility and impact of published research.
Loso Judijanto
IPOSS Jakarta Indonesia, South Jakarta City, Special Capital Region of Jakarta, Indonesia
-
Arie, A. P. P. (2024). Transformasi akuntansi di era big data dan teknologi artificial intelligence (AI). Jurnal Cahaya Mandalika, 5(2), 937–943. https://doi.org/10.36312/JCM.V5I2.3279
-
-
-
Syamsu, M., Terisia, V., & Yusuf, D. (2022). Penerapan model infrastruktur artificial intelligence sebagai penggerak industri 4.0. Jurnal Teknologi Informasi (JUTECH), 3(1), 1–14. https://doi.org/10.32546/JUTECH.V3I1.2375
-
Abirami, S., Pethuraj, M., Uthayakumar, M., & Chitra, P. (2024). A systematic survey on big data and artificial intelligence algorithms for intelligent transportation system. Case Studies in Transport Policy, 17, 101247. https://doi.org/10.1016/J.CSTP.2024.101247
-
Reka, S. S., Dragicevic, T., Venugopal, P., Ravi, V., & Rajagopal, M. K. (2024). Big data analytics and artificial intelligence aspects for privacy and security concerns for demand response modelling in smart grid: A futuristic approach. Heliyon, 10(15), e35683. https://doi.org/10.1016/J.HELIYON.2024.E35683
-
Kamyab, H., et al. (2023). The latest innovative avenues for the utilization of artificial intelligence and big data analytics in water resource management. Results in Engineering, 20, 101566. https://doi.org/10.1016/J.RINENG.2023.101566
-
Jiao, Z., Ji, H., Yan, J., & Qi, X. (2023). Application of big data and artificial intelligence in epidemic surveillance and containment. Intelligent Medicine, 3(1), 36–43. https://doi.org/10.1016/J.IMED.2022.10.003
-
Papachristou, N., et al. (2023). Digital transformation of cancer care in the era of big data, artificial intelligence, and data-driven interventions: Navigating the field. Seminars in Oncology Nursing, 39(3), 151433. https://doi.org/10.1016/J.SONCN.2023.151433
-
Lasisi, M., Kolade, K., & Rotimi, O. (2025). Big data. In Encyclopedia of Libraries, Librarianship, and Information Science (pp. 19–25). https://doi.org/10.1016/B978-0-323-95689-5.00269-8
-
Hang, F., Xie, L., Zhang, Z., Guo, W., & Li, H. (2024). Research on the application of network security defense in database security services based on deep learning integrated with big data analytics. International Journal of Intelligent Networks, 5, 101–109. https://doi.org/10.1016/J.IJIN.2024.02.006
-
Habeeb, R., Nasaruddin, F., Gani, A., Hashem, M., Ahmed, E., & Imran, M. (2019). Real-time big data processing for anomaly detection: A survey. International Journal of Information Management, 45, 289-307. https://doi.org/10.1016/j.ijinfomgt.2018.08.006
-
Khlevna, I., & Koval, B. (2022). Development of infrastructure for anomalies detection in big data. Applied Aspects of Information Technology, 5(4), 348-358. https://doi.org/10.15276/aait.05.2022.23
-
Akçay, S., Atapour-Abarghouei, A., & Breckon, T. (2019). GANomaly: Semi-supervised anomaly detection via adversarial training. In Proceedings of the 2019 IEEE Winter Conference on Applications of Computer Vision (pp. 622-637). https://doi.org/10.1007/978-3-030-20893-6_39
-
Lai, Y., Zhang, J., & Liu, Z. (2019). Industrial anomaly detection and attack classification method based on convolutional neural network. Security and Communication Networks, 2019, 1-11. https://doi.org/10.1155/2019/8124254
-
Pang, G., Shen, C., Cao, L., & Hengel, A. (2021). Deep learning for anomaly detection. ACM Computing Surveys, 54(2), 1-38. https://doi.org/10.1145/3439950
-
Munir, M., Siddiqui, S., Dengel, A., & Ahmed, S. (2019). DeepAnt: A deep learning approach for unsupervised anomaly detection in time series. IEEE Access, 7, 1991-2005. https://doi.org/10.1109/access.2018.2886457
-
Kaya, S., Erdem, A., & Gunes, A. (2021). A smart data pre-processing approach to effective management of big health data in IoT edge. Smart Homecare Technology and Telehealth, 8, 9-21. https://doi.org/10.2147/shtt.s313666
-
Kulanuwat, L., Chantrapornchai, C., Maleewong, M., Wongchaisuwat, P., Wimala, S., Sarinnapakorn, K., & Boonya-aroonnet, S. (2021). Anomaly detection using a sliding window technique and data imputation with machine learning for hydrological time series. Water, 13(13), 1862. https://doi.org/10.3390/w13131862
-
Maurya, C. (2022). Anomaly detection in big data. https://doi.org/10.48550/arxiv.2203.01684.

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors who publish with this journal agree to the following terms:
1. Copyright Retention and Open Access License
Authors retain copyright of their work and grant the journal non-exclusive right of first publication under the Creative Commons Attribution 4.0 International License (CC BY 4.0).
This license allows unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
2. Rights Granted Under CC BY 4.0
Under this license, readers are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, including commercial use
- No additional restrictions — the licensor cannot revoke these freedoms as long as license terms are followed
3. Attribution Requirements
All uses must include:
- Proper citation of the original work
- Link to the Creative Commons license
- Indication if changes were made to the original work
- No suggestion that the licensor endorses the user or their use
4. Additional Distribution Rights
Authors may:
- Deposit the published version in institutional repositories
- Share through academic social networks
- Include in books, monographs, or other publications
- Post on personal or institutional websites
Requirement: All additional distributions must maintain the CC BY 4.0 license and proper attribution.
5. Self-Archiving and Pre-Print Sharing
Authors are encouraged to:
- Share pre-prints and post-prints online
- Deposit in subject-specific repositories (e.g., arXiv, bioRxiv)
- Engage in scholarly communication throughout the publication process
6. Open Access Commitment
This journal provides immediate open access to all content, supporting the global exchange of knowledge without financial, legal, or technical barriers.