This document provides a thorough overview of the evolving field of detecting anomalous behavior. It explores the driving forces behind sme identification, encompassing both theoretical and practical aspects. The review delves into various methods used for sme detection, spanning from rule-based methods to advanced algorithms. It also discusses the