Extra-adaptive robust online subspace tracker for anomaly detection from streaming networks

Anomaly detection in time-evolving networks has many applications, for instance, traffic analysis in transportation networks and intrusion detection in computer networks. One group of popular metho ...

[1]  Bart Vandereycken,et al.  Low-rank tensor completion by Riemannian optimization , 2014 .

[2]  Hiroyuki Kasai,et al.  Online low-rank tensor subspace tracking from incomplete data by CP decomposition using recursive least squares , 2016, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[3]  Marc Teboulle,et al.  A Fast Iterative Shrinkage-Thresholding Algorithm for Linear Inverse Problems , 2009, SIAM J. Imaging Sci..

[4]  Sajid Javed,et al.  Robust Subspace Learning: Robust PCA, Robust Subspace Tracking, and Robust Subspace Recovery , 2017, IEEE Signal Processing Magazine.

[5]  Mahsa Salehi,et al.  A Survey on Anomaly detection in Evolving Data: [with Application to Forest Fire Risk Prediction] , 2018, SKDD.

[6]  Steve Harenberg,et al.  Anomaly detection in dynamic networks: a survey , 2015 .

[7]  Yi Ma,et al.  Robust principal component analysis? , 2009, JACM.

[8]  Yang Wang,et al.  An Improved Robust Principal Component Analysis Model for Anomalies Detection of Subway Passenger Flow , 2018 .

[9]  João Gama,et al.  Event detection from traffic tensors: A hybrid model , 2016, Neurocomputing.

[10]  Hisashi Kashima,et al.  Eigenspace-based anomaly detection in computer systems , 2004, KDD.

[11]  Tamara G. Kolda,et al.  Tensor Decompositions and Applications , 2009, SIAM Rev..

[12]  Christos Faloutsos,et al.  MalSpot: Multi2 Malicious Network Behavior Patterns Analysis , 2014, PAKDD.

[13]  Baolin Yin,et al.  Structural analysis of network traffic matrix via relaxed principal component pursuit , 2011, Comput. Networks.

[14]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[15]  Hiroyuki Kasai,et al.  Fast online low-rank tensor subspace tracking by CP decomposition using recursive least squares from incomplete observations , 2017, Neurocomputing.

[16]  Shuicheng Yan,et al.  Online Robust PCA via Stochastic Optimization , 2013, NIPS.

[17]  Yu-Ru Lin,et al.  Anomaly detection in spatiotemporal data via regularized non-negative tensor analysis , 2018, Data Mining and Knowledge Discovery.

[18]  Wolfgang Kellerer,et al.  Anomaly Detection and Identification in Large-scale Networks based on Online Time-structured Traffic Tensor Tracking , 2016 .

[19]  Philip S. Yu,et al.  Incremental tensor analysis: Theory and applications , 2008, TKDD.

[20]  Soon Ki Jung,et al.  Online Stochastic Tensor Decomposition for Background Subtraction in Multispectral Video Sequences , 2015, 2015 IEEE International Conference on Computer Vision Workshop (ICCVW).

[21]  Ciro Cattuto,et al.  Detecting Anomalies in Time-Varying Networks Using Tensor Decomposition , 2015, 2015 IEEE International Conference on Data Mining Workshop (ICDMW).

[22]  Ming Xu,et al.  Anomaly Detection in Road Networks Using Sliding-Window Tensor Factorization , 2018, IEEE Transactions on Intelligent Transportation Systems.

[23]  Lei Shi,et al.  STenSr: Spatio-temporal tensor streams for anomaly detection and pattern discovery , 2015, Knowledge and Information Systems.

[24]  Hui Tian,et al.  PCA-Based Network Traffic Anomaly Detection , 2016 .

[25]  Stephen P. Boyd,et al.  Distributed Optimization and Statistical Learning via the Alternating Direction Method of Multipliers , 2011, Found. Trends Mach. Learn..

[26]  Youxian Sun,et al.  Robust Principal Component Pursuit for Fault Detection in a Blast Furnace Process , 2018 .

[27]  Andrews Sobral,et al.  Robust Low-Rank and Sparse Decomposition for Moving Object Detection: from Matrices to Tensors. (Détection d'objets mobiles dans des vidéos par décomposition en rang faible et parcimonieuse: de matrices à tenseurs) , 2017 .

[28]  A. Robert Calderbank,et al.  PETRELS: Parallel Subspace Estimation and Tracking by Recursive Least Squares From Partial Observations , 2012, IEEE Transactions on Signal Processing.

[29]  Danai Koutra,et al.  Graph based anomaly detection and description: a survey , 2014, Data Mining and Knowledge Discovery.

[30]  Morteza Mardani,et al.  Dynamic Anomalography: Tracking Network Anomalies Via Sparsity and Low Rank , 2012, IEEE Journal of Selected Topics in Signal Processing.

[31]  Charu C. Aggarwal,et al.  On Anomalous Hotspot Discovery in Graph Streams , 2013, 2013 IEEE 13th International Conference on Data Mining.

[32]  Morteza Mardani,et al.  Subspace Learning and Imputation for Streaming Big Data Matrices and Tensors , 2014, IEEE Transactions on Signal Processing.

[33]  Hadi Fanaee-T,et al.  Tensor-based anomaly detection: An interdisciplinary survey , 2016, Knowl. Based Syst..

[34]  Charu C. Aggarwal,et al.  Temporally Factorized Network Modeling for Evolutionary Network Analysis , 2017, WSDM.

[35]  Ching-Yung Lin,et al.  A Survey on Social Media Anomaly Detection , 2016, SIGKDD Explor..

[36]  Alessio Merlo,et al.  Anomaly Detection in Computer Networks: A State-of-the-Art Review , 2014, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[37]  Ya-lun Chou,et al.  Statistical analysis, with business and economic applications , 1975 .