Sequential Adversarial Anomaly Detection for One-Class Event Data

We consider the sequential anomaly detection problem in the one-class setting when only the anomalous sequences are available and propose an adversarial sequential detector by solving a minimax problem to find an optimal detector against the worst-case sequences from a generator. The generator captures the dependence in sequential events using the marked point process model. The detector sequentially evaluates the likelihood of a test sequence and compares it with a time-varying threshold, also learned from data through the minimax problem. We demonstrate our proposed method’s good performance using numerical experiments on simulations and proprietary large-scale credit card fraud data sets. The proposed method can generally apply to detecting anomalous sequences. Funding: This work is partially supported by the National Science Foundation [Grants CAREER CCF-1650913, DMS-1938106, and DMS-1830210] and grant support from Macy’s Technology. Supplemental Material: The online appendix is available at https://doi.org/10.1287/ijds.2023.0026 .

[1]  Xiuyuan Cheng,et al.  Neural Spectral Marked Point Processes , 2021, ICLR.

[2]  Shuang Li,et al.  Imitation Learning of Neural Spatio-Temporal Point Processes , 2021, IEEE Transactions on Knowledge and Data Engineering.

[3]  Yasin Yilmaz,et al.  Any-Shot Sequential Anomaly Detection in Surveillance Videos , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[4]  Yao Xie,et al.  Deep Fourier Kernel for Self-Attentive Point Processes , 2020, AISTATS.

[5]  Shixiang Zhu,et al.  Adversarial Anomaly Detection for Marked Spatio-Temporal Streaming Data , 2019, ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[6]  Min-hwan Oh,et al.  Sequential Anomaly Detection using Inverse Reinforcement Learning , 2019, KDD.

[7]  Shixiang Zhu,et al.  Spatial-Temporal-Textual Point Processes for Crime Linkage Detection , 2019, 1902.00440.

[8]  Le Song,et al.  Learning Temporal Point Processes via Reinforcement Learning , 2018, NeurIPS.

[9]  Alexander Binder,et al.  Deep One-Class Classification , 2018, ICML.

[10]  Yao Xie,et al.  Crime Event Embedding with Unsupervised Feature Selection , 2018, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[11]  Utkarsh Upadhyay,et al.  Deep Reinforcement Learning of Marked Temporal Point Processes , 2018, NeurIPS.

[12]  Truong Thu Huong,et al.  Real Time Data-Driven Approaches for Credit Card Fraud Detection , 2018, ICEBA 2018.

[13]  Sanjay Chawla,et al.  Anomaly Detection using One-Class Neural Networks , 2018, ArXiv.

[14]  Yao Xie,et al.  Crime Incidents Embedding Using Restricted Boltzmann Machines , 2017, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[15]  Alex Reinhart,et al.  A Review of Self-Exciting Spatio-Temporal Point Processes and Their Applications , 2017, Statistical Science.

[16]  Shenghua Gao,et al.  Remembering history with convolutional LSTM for anomaly detection , 2017, 2017 IEEE International Conference on Multimedia and Expo (ICME).

[17]  Le Song,et al.  Wasserstein Learning of Deep Generative Point Process Models , 2017, NIPS.

[18]  Sanjay Chawla,et al.  Robust, Deep and Inductive Anomaly Detection , 2017, ECML/PKDD.

[19]  Shuang Li,et al.  Detecting Changes in Dynamic Events Over Networks , 2017, IEEE Transactions on Signal and Information Processing over Networks.

[20]  Hongyuan Zha,et al.  Modeling the Intensity Function of Point Process Via Recurrent Neural Networks , 2017, AAAI.

[21]  M. Pushpa,et al.  Analysis on credit card fraud identification techniques based on KNN and outlier detection , 2017, 2017 Third International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB).

[22]  Jason Eisner,et al.  The Neural Hawkes Process: A Neurally Self-Modulating Multivariate Point Process , 2016, NIPS.

[23]  F. Lillo,et al.  Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. , 2016, Physical Review E.

[24]  Utkarsh Upadhyay,et al.  Recurrent Marked Temporal Point Processes: Embedding Event History to Vector , 2016, KDD.

[25]  Lovekesh Vig,et al.  LSTM-based Encoder-Decoder for Multi-sensor Anomaly Detection , 2016, ArXiv.

[26]  Lance Sherry,et al.  Anomaly detection in aircraft data using Recurrent Neural Networks (RNN) , 2016, 2016 Integrated Communications Navigation and Surveillance (ICNS).

[27]  Yoshua Bengio,et al.  A Recurrent Latent Variable Model for Sequential Data , 2015, NIPS.

[28]  Tong Wang,et al.  Finding Patterns with a Rotten Core: Data Mining for Crime Series with Cores , 2015, Big Data.

[29]  Ian J. Goodfellow,et al.  On distinguishability criteria for estimating generative models , 2014, ICLR.

[30]  Alexander J. Smola,et al.  Efficient mini-batch training for stochastic optimization , 2014, KDD.

[31]  Aaron C. Courville,et al.  Generative Adversarial Nets , 2014, NIPS.

[32]  Sabine Van Huffel,et al.  Detecting rare events using extreme value statistics applied to epileptic convulsions in children , 2014, Artif. Intell. Medicine.

[33]  Ameet Talwalkar,et al.  Foundations of Machine Learning , 2012, Adaptive computation and machine learning.

[34]  Vipin Kumar,et al.  Anomaly Detection for Discrete Sequences: A Survey , 2012, IEEE Transactions on Knowledge and Data Engineering.

[35]  Bernhard Schölkopf,et al.  A Kernel Two-Sample Test , 2012, J. Mach. Learn. Res..

[36]  David A. Clifton,et al.  Novelty Detection with Multivariate Extreme Value Statistics , 2011, J. Signal Process. Syst..

[37]  Lăcrămioara Bălan,et al.  Credit card Fraud , 2011, Plant Molecular Biology Reporter.

[38]  Y. Sahin,et al.  Detecting credit card fraud by ANN and logistic regression , 2011, 2011 International Symposium on Innovations in Intelligent Systems and Applications.

[39]  Xin Xu,et al.  Sequential anomaly detection based on temporal-difference learning: Principles, models and case studies , 2010, Appl. Soft Comput..

[40]  Anind K. Dey,et al.  Maximum Entropy Inverse Reinforcement Learning , 2008, AAAI.

[41]  Jianmin Jiang,et al.  One class support vector machine for anomaly detection in the communication network performance data , 2007 .

[42]  Robert E. Schapire,et al.  A Game-Theoretic Approach to Apprenticeship Learning , 2007, NIPS.

[43]  Benjamin Recht,et al.  Random Features for Large-Scale Kernel Machines , 2007, NIPS.

[44]  Chang-Tien Lu,et al.  Survey of fraud detection techniques , 2004, IEEE International Conference on Networking, Sensing and Control, 2004.

[45]  Pieter Abbeel,et al.  Apprenticeship learning via inverse reinforcement learning , 2004, ICML.

[46]  David J. Hand,et al.  Statistical fraud detection: A review , 2002 .

[47]  J. Corcoran Modelling Extremal Events for Insurance and Finance , 2002 .

[48]  Hans-Peter Kriegel,et al.  LOF: identifying density-based local outliers , 2000, SIGMOD '00.

[49]  Yoshua Bengio,et al.  Convolutional networks for images, speech, and time series , 1998 .

[50]  S. Hochreiter,et al.  Long Short-Term Memory , 1997, Neural Computation.

[51]  D. Siegmund Sequential Analysis: Tests and Confidence Intervals , 1985 .

[52]  A. Hawkes Spectra of some self-exciting and mutually exciting point processes , 1971 .

[53]  W. Rudin,et al.  Fourier Analysis on Groups. , 1965 .

[54]  E. S. Page CONTINUOUS INSPECTION SCHEMES , 1954 .

[55]  Ming-Wei Chang,et al.  BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding , 2019, NAACL.

[56]  Yibo Wang,et al.  Leveraging deep learning with LDA-based text analytics to detect automobile insurance fraud , 2018, Decis. Support Syst..

[57]  Abhinav Srivastava,et al.  Credit Card Fraud Detection Using Hidden Markov Model , 2008, IEEE Transactions on Dependable and Secure Computing.

[58]  D. Hand,et al.  Unsupervised Profiling Methods for Fraud Detection , 2002 .

[59]  George Karypis,et al.  A Comparison of Document Clustering Techniques , 2000 .

[60]  Andrew Y. Ng,et al.  Pharmacokinetics of a novel formulation of ivermectin after administration to goats , 2000, ICML.

[61]  Douglas L. Reilly,et al.  Credit card fraud detection with a neural-network , 1994, 1994 Proceedings of the Twenty-Seventh Hawaii International Conference on System Sciences.