On the nature and types of anomalies: a review of deviations in data

被引:44
作者
Foorthuis, Ralph [1 ]
机构
[1] HEINEKEN, Digital & Technol, Amsterdam, Netherlands
关键词
Anomalies; Outliers; Deviants; Typology; Anomaly detection; Explainable data science; TIME-SERIES DATA; OUTLIER DETECTION; SUPER-SPREADERS; CLASSIFICATION; ALGORITHMS; SEQUENCES; FRAMEWORK; CRITERION; REJECTION; TUTORIAL;
D O I
10.1007/s41060-021-00265-1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Anomalies are occurrences in a dataset that are in some way unusual and do not fit the general patterns. The concept of the anomaly is typically ill defined and perceived as vague and domain-dependent. Moreover, despite some 250 years of publications on the topic, no comprehensive and concrete overviews of the different types of anomalies have hitherto been published. By means of an extensive literature review this study therefore offers the first theoretically principled and domain-independent typology of data anomalies and presents a full overview of anomaly types and subtypes. To concretely define the concept of the anomaly and its different manifestations, the typology employs five dimensions: data type, cardinality of relationship, anomaly level, data structure, and data distribution. These fundamental and data-centric dimensions naturally yield 3 broad groups, 9 basic types, and 63 subtypes of anomalies. The typology facilitates the evaluation of the functional capabilities of anomaly detection algorithms, contributes to explainable data science, and provides insights into relevant topics such as local versus global anomalies.
引用
收藏
页码:297 / 331
页数:35
相关论文
共 331 条
[1]  
Agarwal S, 1996, PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON VERY LARGE DATA BASES, P506
[2]   An effective and efficient algorithm for high-dimensional outlier detection [J].
Aggarwal, CC ;
Yu, PS .
VLDB JOURNAL, 2005, 14 (02) :211-221
[3]  
Aggarwal CC., 2017, OUTLIER ANAL, V2
[4]   Web outlier mining: Discovering outliers from web datasets [J].
Agyemang, Malik ;
Barker, Ken ;
Alhajj, Reda .
INTELLIGENT DATA ANALYSIS, 2005, 9 (05) :473-486
[5]  
Ahmed F, 2020, AAAI CONF ARTIF INTE, V34, P3154
[6]   A survey of network anomaly detection techniques [J].
Ahmed, Mohiuddin ;
Mahmood, Abdun Naser ;
Hu, Jiankun .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 :19-31
[7]  
Akoglu L., 2009, CMU-C S-09-173 Technical Report
[8]   Graph based anomaly detection and description: a survey [J].
Akoglu, Leman ;
Tong, Hanghang ;
Koutra, Danai .
DATA MINING AND KNOWLEDGE DISCOVERY, 2015, 29 (03) :626-688
[9]   Super-spreading events and contribution to transmission of MERS, SARS, and SARS-CoV-2 (COVID-19) [J].
Al-Tawfiq, J. A. ;
Rodriguez-Morales, A. J. .
JOURNAL OF HOSPITAL INFECTION, 2020, 105 (02) :111-112
[10]  
Allan J., 1998, Proceedings of the 21st Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, P37, DOI 10.1145/290941.290954