Inductive conformal anomaly detection for sequential detection of anomalous sub-trajectories

Detection of anomalous trajectories is an important problem for which many algorithms based on learning of normal trajectory patterns have been proposed. Yet, these algorithms are typically designed for offline anomaly detection in databases and are insensitive to local sub-trajectory anomalies. Generally, previous anomaly detection algorithms often require tuning of many parameters, including ad-hoc anomaly thresholds, which may result in overfitting and high alarm rates. The main contributions of this paper are two-fold: The first is the proposal and analysis of the Inductive Conformal Anomaly Detector (ICAD), which is a general and parameter-light anomaly detection algorithm that has well-calibrated alarm rate. ICAD is a generalisation of the previously proposed Conformal Anomaly Detector (CAD) based on the concept of Inductive Conformal Predictors. The main advantage of ICAD compared to CAD is the improved computational efficiency. The only design parameter of ICAD is the Non-Conformity Measure (NCM). The second contribution of this paper concerns the proposal and investigation of the Sub-Sequence Local Outlier (SSLO) NCM, which is designed for sequential detection of anomalous sub-trajectories in the framework of ICAD. SSLO-NCM is based on Local Outlier Factor (LOF) and is therefore sensitive to local sub-trajectory anomalies. The results from the empirical investigations on an unlabelled set of vessel trajectories illustrate the most anomalous trajectories detected for different parameter values of SSLO-NCM, and confirm that the empirical alarm rate is indeed well-calibrated.

[1]  A. Gammerman,et al.  Evolutionary Conformal Prediction for Breast Cancer Diagnosis , 2009, 2009 9th International Conference on Information Technology and Applications in Biomedicine.

[2]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[3]  Harris Papadopoulos,et al.  Conformal Prediction with Neural Networks , 2007 .

[4]  Lars Niklasson,et al.  Finding behavioural anomalies in public areas using video surveillance data , 2008, 2008 11th International Conference on Information Fusion.

[5]  Stefan Axelsson,et al.  The base-rate fallacy and the difficulty of intrusion detection , 2000, TSEC.

[6]  Li Wei,et al.  Compression-based data mining of sequential data , 2007, Data Mining and Knowledge Discovery.

[7]  Eamonn J. Keogh,et al.  HOT SAX: efficiently finding the most unusual time series subsequence , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).

[8]  Ilia Nouretdinov,et al.  Prediction with Confidence Based on a Random Forest Classifier , 2010, AIAI.

[9]  W. Gasarch,et al.  The Book Review Column 1 Coverage Untyped Systems Simple Types Recursive Types Higher-order Systems General Impression 3 Organization, and Contents of the Book , 2022 .

[10]  Eamonn J. Keogh,et al.  Disk aware discord discovery: finding unusual time series in terabyte sized datasets , 2007, Seventh IEEE International Conference on Data Mining (ICDM 2007).

[11]  Maria Riveiro,et al.  Visual analytics for maritime anomaly detection , 2011 .

[12]  Alexander Gammerman,et al.  Hedging predictions in machine learning , 2006, ArXiv.

[13]  Göran Falkman,et al.  Online Detection of Anomalous Sub-trajectories: A Sliding Window Approach Based on Conformal Anomaly Detection and Local Outlier Factor , 2012, AIAI.

[14]  Douglas M. Hawkins Identification of Outliers , 1980, Monographs on Applied Probability and Statistics.

[15]  Sameer Singh,et al.  Novelty detection: a review - part 1: statistical approaches , 2003, Signal Process..

[16]  Harris Papadopoulos,et al.  Inductive Conformal Prediction: Theory and Application to Neural Networks , 2008 .

[17]  Göran Falkman,et al.  Sequential Conformal Anomaly Detection in trajectories based on Hausdorff distance , 2011, 14th International Conference on Information Fusion.

[18]  Nikolaos Papanikolopoulos,et al.  Clustering of Vehicle Trajectories , 2010, IEEE Transactions on Intelligent Transportation Systems.

[19]  Lars Niklasson,et al.  Approaches for detecting behavioural anomalies in public areas using video surveillance data , 2008, Security + Defence.

[20]  H. Cai,et al.  An Affine Invariant Region Detector Using the 4th Differential Invariant , 2007 .

[21]  Aleksandar Lazarevic,et al.  Outlier Detection with Kernel Density Functions , 2007, MLDM.

[22]  Robert B. Fisher,et al.  Semi-supervised Learning for Anomalous Trajectory Detection , 2008, BMVC.

[23]  Felix Naumann,et al.  Data fusion , 2009, CSUR.

[24]  Shehzad Khalid,et al.  Classifying spatiotemporal object trajectories using unsupervised learning in the coefficient feature space , 2006, Multimedia Systems.

[25]  Vladimir Vovk,et al.  A tutorial on conformal prediction , 2007, J. Mach. Learn. Res..

[26]  Bernhard Schölkopf,et al.  Support Vector Method for Novelty Detection , 1999, NIPS.

[27]  Gian Luca Foresti,et al.  Trajectory-Based Anomalous Event Detection , 2008, IEEE Transactions on Circuits and Systems for Video Technology.

[28]  Hans-Peter Kriegel,et al.  LOF: identifying density-based local outliers , 2000, SIGMOD '00.

[29]  Jae-Gil Lee,et al.  Trajectory Outlier Detection: A Partition-and-Detect Framework , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[30]  Eleazar Eskin,et al.  Anomaly Detection over Noisy Data using Learned Probability Distributions , 2000, ICML.

[31]  Mohan M. Trivedi,et al.  A Survey of Vision-Based Trajectory Learning and Analysis for Surveillance , 2008, IEEE Transactions on Circuits and Systems for Video Technology.

[32]  Venkatesh Saligrama,et al.  Anomaly Detection with Score functions based on Nearest Neighbor Graphs , 2009, NIPS.