Data-driven anomaly detection using OCSVM with Boundary optimzation

被引:9
作者
Guo, Kai [1 ]
Liu, Datong [1 ]
Peng, Yu [1 ]
Peng, Xiyuan [1 ]
机构
[1] Harbin Inst Technol, Dept Automat Test & Control, Harbin, Heilongjiang, Peoples R China
来源
2018 PROGNOSTICS AND SYSTEM HEALTH MANAGEMENT CONFERENCE (PHM-CHONGQING 2018) | 2018年
基金
中国国家自然科学基金;
关键词
data-driven anomaly detection; one-class support vector machine (OCSVM); clustering-based and LOF outlier detection method (CLOF);
D O I
10.1109/PHM-Chongqing.2018.00048
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With large amount of industrial data available, data-driven anomaly detection methods have been widely used for ensuring industrial safety and preventing economic losses. Among them, one-class support vector machine (OCSVM) is an effective unsupervised method for detecting abnormal points by establishing a decision boundary in the kernel space and has obtained much attention in the research field in recent years. Through solving the convex quadratic programming problem, OCSVM obtains a classifier with maximum distance to the origin and satisfying maximum quantity of training samples, without utilizing anomaly data points. However, the outliers in the training set, which are more likely to be selected as support vectors, will lead to the degradation in the performance of OCSVM. Because the outliers are away from the center of the dataset and cannot represent the real characteristics for the data. To address this drawback, the clustering-based and LOF outlier detection method (CLOF), which has high computational efficiency and modeling accuracy, is adopted for eliminating the outliers and optimizing the final acquired boundary of OCSVM. Experimental results on shuttle flight data have illustrated the superior performance of the proposed approach.
引用
收藏
页码:244 / 248
页数:5
相关论文
共 20 条
[1]  
[Anonymous], 2013, P ACM SIGKDD WORKSH
[2]  
Guo QD, 2016, GEOSCIENCES, V6, P4
[3]  
Hayton P, 2001, ADV NEUR IN, V13, P946
[4]   A novel hybrid intrusion detection method integrating anomaly detection with misuse detection [J].
Kim, Gisung ;
Lee, Seungmin ;
Kim, Sehun .
EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (04) :1690-1700
[5]   Anomaly Detection in Video Surveillance via Gaussian Process [J].
Li, Nannan ;
Wu, Xinyu ;
Guo, Huiwen ;
Xu, Dan ;
Ou, Yongsheng ;
Chen, Yen-Lun .
INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2015, 29 (06)
[6]   Black Hole Traffic Anomaly Detections in Wireless Sensor Network [J].
Lin, Tu-Liang ;
Chang, Hong-Yi .
INTERNATIONAL JOURNAL OF GRID AND HIGH PERFORMANCE COMPUTING, 2015, 7 (01) :42-51
[7]   Principal component analysis of technosols ecological properties [J].
Maslikova, K. P. .
UKRAINIAN JOURNAL OF ECOLOGY, 2018, 8 (02) :105-112
[8]   Parsimonious Gaussian mixture models [J].
McNicholas, Paul David ;
Murphy, Thomas Brendan .
STATISTICS AND COMPUTING, 2008, 18 (03) :285-296
[9]  
Miao DD, 2015, CHINA COMMUN, V12, P64, DOI 10.1109/CC.2015.7275260
[10]   Anomaly detection based on uncertainty fusion for univariate monitoring series [J].
Pang, Jingyue ;
Liu, Datong ;
Peng, Yu ;
Peng, Xiyuan .
MEASUREMENT, 2017, 95 :280-292