A procedure for anomaly detection and analysis

被引:15
|
作者
Koren, Oded [1 ]
Koren, Michal [1 ]
Peretz, Or [1 ]
机构
[1] Shenkar Engn Design Art, Sch Ind Engn & Management, Anne Frank 12, Ramat Gan, Israel
关键词
Anomaly detection; AutoML; Isolation forest; Local outlier factor; SVM; INTRUSION DETECTION; OUTLIER DETECTION;
D O I
10.1016/j.engappai.2022.105503
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Anomaly detection is often used to identify and remove outliers in datasets. However, detecting and analyzing the pattern of outliers can contribute to future business decisions or increase the accuracy of a learning algorithm. Selecting the applicable outlier detection method for a dataset requires human intervention and analysis due to the challenge of choosing an efficient technique suitable for all types of attributes. This work presents a procedure for anomaly detection and analysis. The procedure is feature-wise (i.e., processes each feature independently), uses T different anomaly detection techniques (for T > 1), and estimates the best technique using predefined thresholds. It is a generic method that does not depend on the model type and can be applied to supervised and unsupervised learning. In addition, this method does not impute or remove the outliers, as they should be adapted according to the dataset or business requirements. The significant advantage of this method is the ability to use different techniques to detect anomalies since it is applied per feature and not per record, as in traditional anomaly detection methods. Furthermore, the method uses a new measure, Noise Ratio (NR), which describes the level of agreement between our method's result and traditional anomaly detection techniques. The results showed that all the compared techniques identified non-anomalous features with consistent results between the various algorithms. In the proposed method, NR found up to 20% of the non-anomalous values marked as outliers and improved up to 10% in finding outliers in datasets compared to traditional anomaly detection algorithms.
引用
收藏
页数:8
相关论文
共 50 条
  • [31] Inductive conformal anomaly detection for sequential detection of anomalous sub-trajectories
    Laxhammar, Rikard
    Falkman, Goran
    ANNALS OF MATHEMATICS AND ARTIFICIAL INTELLIGENCE, 2015, 74 (1-2) : 67 - 94
  • [32] A framework for anomaly detection and classification in Multiple IoT scenarios
    Cauteruccio, Francesco
    Cinelli, Luca
    Corradini, Enrico
    Terracina, Giorgio
    Ursino, Domenico
    Virgili, Luca
    Savaglio, Claudio
    Liotta, Antonio
    Fortino, Giancarlo
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 114 : 322 - 335
  • [33] A Novel Hybrid Anomaly Based Intrusion Detection Method
    Qazanfari, Kazem
    Mirpouryan, Minoo Sadat
    Gharaee, Hossein
    2012 SIXTH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2012, : 942 - 947
  • [34] Anomaly Detection Technique Robust to Units and Scales of Measurement
    Aryal, Sunil
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PAKDD 2018, PT I, 2018, 10937 : 589 - 601
  • [35] Efficient Algorithms for Local Density Based Anomaly Detection
    Sinha, Ankita
    Jana, Prasanta K.
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY (ICDCIT 2018), 2018, 10722 : 336 - 342
  • [36] Comparing Threshold Selection Methods for Network Anomaly Detection
    Komadina, Adrian
    Martinic, Mislav
    Gros, Stjepan
    Mihajlovic, Zeljka
    IEEE ACCESS, 2024, 12 : 124943 - 124973
  • [37] Anomaly detection in Industrial Control Systems using Logical Analysis of Data
    Das, Tanmoy Kanti
    Adepu, Sridhar
    Zhou, Jianying
    COMPUTERS & SECURITY, 2020, 96
  • [38] Anomaly intrusion detection method for vehicular networks based on survival analysis
    Han, Mee Lan
    Kwak, Byung Il
    Kim, Huy Kang
    VEHICULAR COMMUNICATIONS, 2018, 14 : 52 - 63
  • [39] A distributed approach to network anomaly detection based on independent component analysis
    Palmieri, Francesco
    Fiore, Ugo
    Castiglione, Aniello
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2014, 26 (05): : 1113 - 1129
  • [40] Anomaly Detection in Connected and Autonomous Vehicles: A Survey, Analysis, and Research Challenges
    Baccari, Sihem
    Hadded, Mohamed
    Ghazzai, Hakim
    Touati, Haifa
    Elhadef, Mourad
    IEEE ACCESS, 2024, 12 : 19250 - 19276