Sequential Feature Explanations for Anomaly Detection

被引:27
作者
Siddiqui, Md Amran [1 ]
Fern, Alan [1 ]
Dietterich, Thomas G. [1 ]
Wong, Weng-Keen [1 ]
机构
[1] Oregon State Univ, Sch EECS, Kelley Engn Ctr 1148, Corvallis, OR 97331 USA
关键词
Anomaly detection; anomaly explanation; anomaly interpretation; explanation evaluation; CLASSIFICATIONS;
D O I
10.1145/3230666
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In many applications, an anomaly detection system presents the most anomalous data instance to a human analyst, who then must determine whether the instance is truly of interest (e.g., a threat in a security setting). Unfortunately, most anomaly detectors provide no explanation about why an instance was considered anomalous, leaving the analyst with no guidance about where to begin the investigation. To address this issue, we study the problems of computing and evaluating sequential feature explanations (SFEs) for anomaly detectors. An SFE of an anomaly is a sequence of features, which are presented to the analyst one at a time (in order) until the information contained in the highlighted features is enough for the analyst to make a confident judgement about the anomaly. Since analyst effort is related to the amount of information that they consider in an investigation, an explanation's quality is related to the number of features that must be revealed to attain confidence. In this article, we first formulate the problem of optimizing SFEs for a particular density-based anomaly detector. We then present both greedy algorithms and an optimal algorithm, based on branch-and-bound search, for optimizing SFEs. Finally, we provide a large scale quantitative evaluation of these algorithms using a novel framework for evaluating explanations. The results show that our algorithms are quite effective and that our best greedy algorithm is competitive with optimal solutions.
引用
收藏
页数:22
相关论文
共 15 条
[1]  
[Anonymous], 2006, PATTERN RECOGN
[2]  
Baehrens D, 2010, J MACH LEARN RES, V11, P1803
[3]  
Dang XH, 2014, PROC INT CONF DATA, P88, DOI 10.1109/ICDE.2014.6816642
[4]  
Deng H.T., 2013, GUIDED RANDOM FOREST
[5]   Mining outlying aspects on numeric data [J].
Duan, Lei ;
Tang, Guanting ;
Pei, Jian ;
Bailey, James ;
Campbell, Akiko ;
Tang, Changjie .
DATA MINING AND KNOWLEDGE DISCOVERY, 2015, 29 (05) :1116-1151
[6]  
Emmott A. F., 2013, P ACM SIGKDD WORKSH, P16, DOI [10.1145/2500853.2500858, DOI 10.1145/2500853.2500858]
[7]  
Fernández-Delgado M, 2014, J MACH LEARN RES, V15, P3133
[8]  
Hettich Seth, 1999, THE UCI KDD ARCH
[9]  
Krause A, 2014, TRACTABILITY, P71
[10]   Explaining outliers by subspace separability [J].
Micenkova, Barbora ;
Dang, Xuan-Hong ;
Assent, Ira ;
Ng, Raymond T. .
2013 IEEE 13TH INTERNATIONAL CONFERENCE ON DATA MINING (ICDM), 2013, :518-527