Anomaly Detection
Anomaly detection is the process of identifying data points, events, or behaviors that differ significantly from an established or expected pattern. It is used to surface rare or suspicious occurrences within a dataset or system. In security contexts, it typically serves as a signal that something unusual may warrant further investigation.
Anomaly detection is an analytical technique for identifying observations, events, or data points that deviate from expected baselines, norms, or learned behavioral patterns. It operates by establishing a model of normal behavior, whether statistical, rule-based, or machine learning-derived, and flagging instances that fall outside acceptable bounds of that model. In application security and software supply chain contexts, anomaly detection may be applied to network traffic, API call sequences, build pipeline telemetry, user behavior, or runtime system activity. The technique is subject to known false positive behavior when legitimate but infrequent activity resembles anomalous patterns, and to false negative behavior when adversarial activity is crafted to remain within learned norms. Its scope is bounded by the quality and representativeness of the baseline data used for training or configuration, and it typically requires runtime or deployment context to detect behavioral anomalies, as static analysis alone cannot surface deviations in execution patterns.
Why it matters
In application security and software supply chain contexts, anomaly detection matters because many attacks do not match known signatures or previously cataloged exploit patterns. Threats such as insider abuse, compromised build pipelines, and novel API misuse may leave no static indicator of compromise, meaning signature-based controls will not catch them. Anomaly detection provides a complementary layer by surfacing behaviors that fall outside established norms, giving security teams an opportunity to investigate before damage is confirmed.
The technique is particularly relevant as software supply chains grow more complex. A compromised dependency, a tampered build artifact, or an unexpected network call from a CI/CD runner may each appear as a subtle deviation from normal pipeline telemetry rather than an obvious attack. Without behavioral baselines and anomaly detection logic applied at runtime, these deviations can go unnoticed until downstream impact is observed. The SolarWinds supply chain compromise is a well-documented example of an incident where attacker behavior was designed to blend into normal operational patterns, illustrating the challenge that anomaly detection must address.
At the same time, practitioners should recognize that anomaly detection introduces operational costs in the form of false positives. Legitimate but infrequent activity, such as a quarterly batch job or a new deployment region, can trigger alerts that consume analyst time and erode confidence in the system if not managed carefully. Effective anomaly detection requires ongoing baseline maintenance, tuning, and integration with broader security workflows rather than one-time configuration.
Who it's relevant to
Inside Anomaly Detection
Common questions
Answers to the questions practitioners most commonly ask about Anomaly Detection.