Design and Development of AD-CGAN: Conditional Generative Adversarial Networks for Anomaly Detection

被引:11
作者
Ezeme, Okwudili M. [1 ]
Mahmoud, Qusay H. [1 ]
Azim, Akramul [1 ]
机构
[1] Ontario Tech Univ, Dept Elect Comp & Software Engn, Oshawa, ON L1G 0C5, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Anomaly detection; Machine learning; Hidden Markov models; Generative adversarial networks; Gallium nitride; Data models; Context modeling; transfer learning; deep learning; generative adversarial networks; NEURAL-NETWORK;
D O I
10.1109/ACCESS.2020.3025530
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Whether in the realm of software or hardware, datasets representing the state of systems are mostly imbalanced. This imbalance is because these systems' reliability requirements make the occurrence of an anomaly a rare phenomenon. Hence, most datasets on anomaly detection have a relatively small percentage that captures the anomaly. Recently, generative adversarial networks (GAN) have shown promising results in image generation tasks. Therefore, in this research work, we build on conditional GANs (CGAN) to generate plausible distributions of a given profile to solve the challenge of data imbalance in anomaly detection tasks and present a novel framework for anomaly detection. Firstly, we learn the pattern of the minority class data samples using a single class CGAN. Secondly, we use the knowledge base of the single class CGAN to generate samples that augment the minority class samples so that a binary class CGAN can train on the typical and malicious profiles with a balanced dataset. This approach inherently eliminates the bias imposed on algorithms from the dataset and results in a robust framework with improved generalization. Thirdly, the binary class CGAN generates a knowledge base that we use to construct the cluster-based anomaly detector. During testing, we do not use the single class CGAN, thereby providing us with a lean and efficient algorithm for anomaly detection that can do anomaly detection on semi-supervised and non-parametric multivariate data. We test the framework on logs and image-based anomaly detection datasets with class imbalance. We compare the performance of AD-CGAN with GAN-derived and non-GAN-derived state of the art algorithms on benchmark datasets. AD-CGAN outperforms most of the algorithms in the standard metrics of Precision, Recall, and F-1 Score. Where AD-CGAN does not perform better in the parameters used, it has the advantage of being lightweight. Therefore, it can be deployed for both online and offline anomaly detection tasks since it does not use an input sample inversion strategy.
引用
收藏
页码:177667 / 177681
页数:15
相关论文
共 38 条
[1]  
[Anonymous], 2016, ARXIV160507717
[2]   On the evaluation of unsupervised outlier detection: measures, datasets, and an empirical study [J].
Campos, Guilherme O. ;
Zimek, Arthur ;
Sander, Jorg ;
Campello, Ricardo J. G. B. ;
Micenkova, Barbora ;
Schubert, Erich ;
Assent, Ira ;
Houle, Michael E. .
DATA MINING AND KNOWLEDGE DISCOVERY, 2016, 30 (04) :891-927
[3]   Rewiring of jasmonate and phytochrome B signalling uncouples plant growth-defense tradeoffs [J].
Campos, Marcelo L. ;
Yoshida, Yuki ;
Major, Ian T. ;
Ferreira, Dalton de Oliveira ;
Weraduwage, Sarathi M. ;
Froehlich, John E. ;
Johnson, Brendan F. ;
Kramer, David M. ;
Jander, Georg ;
Sharkey, Thomas D. ;
Howe, Gregg A. .
NATURE COMMUNICATIONS, 2016, 7
[4]  
Chalapathy R, 2019, ARXIV190103407
[5]  
Chen X, 2016, ADV NEUR IN, V29
[6]   DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning [J].
Du, Min ;
Li, Feifei ;
Zheng, Guineng ;
Srikumar, Vivek .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1285-1298
[7]   An Imputation-based Augmented Anomaly Detection from Large Traces of Operating System Events [J].
Ezeme, Mellitus ;
Azim, Akramul ;
Mahmoud, Qusay H. .
BDCAT'17: PROCEEDINGS OF THE FOURTH IEEE/ACM INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING, APPLICATIONS AND TECHNOLOGIES, 2017, :43-52
[8]   DReAM: Deep Recursive Attentive Model for Anomaly Detection in Kernel Events [J].
Ezeme, Mellitus O. ;
Mahmoud, Qusay H. ;
Azim, Akramul .
IEEE ACCESS, 2019, 7 :18860-18870
[9]   Hierarchical Attention-Based Anomaly Detection Model for Embedded Operating Systems [J].
Ezeme, Mellitus O. ;
Mahmoud, Qusay H. ;
Azim, Akramul .
2018 IEEE 24TH INTERNATIONAL CONFERENCE ON EMBEDDED AND REAL-TIME COMPUTING SYSTEMS AND APPLICATIONS (RTCSA), 2018, :225-231
[10]   A Framework for Anomaly Detection in Time-Driven and Event-Driven Processes Using Kernel Traces [J].
Ezeme, Okwudili M. ;
Mahmoud, Qusay ;
Azim, Akramul .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2022, 34 (01) :1-14