A procedure for anomaly detection and analysis

被引:15
|
作者
Koren, Oded [1 ]
Koren, Michal [1 ]
Peretz, Or [1 ]
机构
[1] Shenkar Engn Design Art, Sch Ind Engn & Management, Anne Frank 12, Ramat Gan, Israel
关键词
Anomaly detection; AutoML; Isolation forest; Local outlier factor; SVM; INTRUSION DETECTION; OUTLIER DETECTION;
D O I
10.1016/j.engappai.2022.105503
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Anomaly detection is often used to identify and remove outliers in datasets. However, detecting and analyzing the pattern of outliers can contribute to future business decisions or increase the accuracy of a learning algorithm. Selecting the applicable outlier detection method for a dataset requires human intervention and analysis due to the challenge of choosing an efficient technique suitable for all types of attributes. This work presents a procedure for anomaly detection and analysis. The procedure is feature-wise (i.e., processes each feature independently), uses T different anomaly detection techniques (for T > 1), and estimates the best technique using predefined thresholds. It is a generic method that does not depend on the model type and can be applied to supervised and unsupervised learning. In addition, this method does not impute or remove the outliers, as they should be adapted according to the dataset or business requirements. The significant advantage of this method is the ability to use different techniques to detect anomalies since it is applied per feature and not per record, as in traditional anomaly detection methods. Furthermore, the method uses a new measure, Noise Ratio (NR), which describes the level of agreement between our method's result and traditional anomaly detection techniques. The results showed that all the compared techniques identified non-anomalous features with consistent results between the various algorithms. In the proposed method, NR found up to 20% of the non-anomalous values marked as outliers and improved up to 10% in finding outliers in datasets compared to traditional anomaly detection algorithms.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Difficulties and Challenges of Anomaly Detection in Smart Cities: A Laboratory Analysis
    Garcia-Font, Victor
    Garrigues, Carles
    Rifa-Pous, Helena
    SENSORS, 2018, 18 (10)
  • [2] Factor analysis based anomaly detection
    Wu, NN
    Zhang, J
    IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 108 - 115
  • [3] Anomaly Detection: A Survey
    Chandola, Varun
    Banerjee, Arindam
    Kumar, Vipin
    ACM COMPUTING SURVEYS, 2009, 41 (03)
  • [4] An Ensemble Approach for Fake Base Station Detection using Temporal Graph Analysis and Anomaly Detection
    Sun, Sheng
    Abualhaol, Ibrahum
    Poitau, Gwenael
    Esswie, Ali
    Repeta, Morris
    2024 WIRELESS TELECOMMUNICATIONS SYMPOSIUM, WTS, 2024,
  • [5] A Revised Isolation Forest procedure for Anomaly Detection with High Number of Data Points
    Marcelli, Elisa
    Barbariol, Tommaso
    Savarino, Vincenzo
    Beghi, Alessandro
    Susto, Gian Antonio
    2022 23RD IEEE LATIN-AMERICAN TEST SYMPOSIUM (LATS 2022), 2022,
  • [6] Factor analysis of mixed data for anomaly detection
    Davidow, Matthew
    Matteson, David S.
    STATISTICAL ANALYSIS AND DATA MINING, 2022, 15 (04) : 480 - 493
  • [7] Network anomaly detection based on probabilistic analysis
    Park, JinSoo
    Choi, Dong Hag
    Jeon, You-Boo
    Nam, Yunyoung
    Hong, Min
    Park, Doo-Soon
    SOFT COMPUTING, 2018, 22 (20) : 6621 - 6627
  • [8] Network Anomaly Detection Based on Wavelet Analysis
    Wei Lu
    Ali A. Ghorbani
    EURASIP Journal on Advances in Signal Processing, 2009
  • [9] Anomaly Detection Based on Convex Analysis: A Survey
    Wang, Tong
    Cai, Mengsi
    Ouyang, Xiao
    Cao, Ziqiang
    Cai, Tie
    Tan, Xu
    Lu, Xin
    FRONTIERS IN PHYSICS, 2022, 10
  • [10] A survey of network anomaly detection techniques
    Ahmed, Mohiuddin
    Mahmood, Abdun Naser
    Hu, Jiankun
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 : 19 - 31