Enhancing one-class support vector machines for unsupervised anomaly detection

Support Vector Machines (SVMs) have been one of the most successful machine learning techniques for the past decade. For anomaly detection, also a semi-supervised variant, the one-class SVM, exists. Here, only normal data is required for training before anomalies can be detected. In theory, the one-class SVM could also be used in an unsupervised anomaly detection setup, where no prior training is conducted. Unfortunately, it turns out that a one-class SVM is sensitive to outliers in the data. In this work, we apply two modifications in order to make one-class SVMs more suitable for unsupervised anomaly detection: Robust one-class SVMs and eta one-class SVMs. The key idea of both modifications is, that outliers should contribute less to the decision boundary as normal instances. Experiments performed on datasets from UCI machine learning repository show that our modifications are very promising: Comparing with other standard unsupervised anomaly detection algorithms, the enhanced one-class SVMs are superior on two out of four datasets. In particular, the proposed eta one-class SVM has shown the most promising results.

[1]  Uriel J. Carrasquilla Benchmarking Algorithms for Detecting Anomalies in Large Datasets , 2010 .

[2]  Yufeng Liu,et al.  Robust Truncated Hinge Loss Support Vector Machines , 2007 .

[3]  Bernhard Schölkopf,et al.  Support Vector Method for Novelty Detection , 1999, NIPS.

[4]  Jirí Benes,et al.  On neural networks , 1990, Kybernetika.

[5]  Xi-chuan Zhou,et al.  Integrating outlier filtering in large margin training , 2011, Journal of Zhejiang University SCIENCE C.

[6]  Robert P. W. Duin,et al.  Support vector domain description , 1999, Pattern Recognit. Lett..

[7]  Vladimir Vapnik,et al.  Statistical learning theory , 1998 .

[8]  Massimiliano Pontil,et al.  Support Vector Machines for 3D Object Recognition , 1998, IEEE Trans. Pattern Anal. Mach. Intell..

[9]  Ralf Herbrich,et al.  Adaptive margin support vector machines for classification , 1999 .

[10]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[11]  Bernhard Schölkopf,et al.  Estimating the Support of a High-Dimensional Distribution , 2001, Neural Computation.

[12]  Boleslaw K. Szymanski,et al.  Some Properties of the Gaussian Kernel for One Class Learning , 2007, ICANN.

[13]  Hongxing He,et al.  Outlier Detection Using Replicator Neural Networks , 2002, DaWaK.

[14]  Gajendra P. S. Raghava,et al.  Machine learning techniques in disease forecasting: a case study on rice blast prediction , 2006, BMC Bioinformatics.

[15]  Thomas M. Breuel,et al.  Anomaly detection by combining decision trees and parametric densities , 2008, 2008 19th International Conference on Pattern Recognition.

[16]  Wenjian Wang,et al.  Determination of the spread parameter in the Gaussian kernel for classification and regression , 2003, Neurocomputing.

[17]  M. Kendall Rank Correlation Methods , 1949 .

[18]  P. Laskov,et al.  Intrusion Detection in Unlabeled Data with Quarter-sphere Support Vector Machines , 2004, Prax. Inf.verarb. Kommun..

[19]  Wenjie Hu,et al.  Robust Anomaly Detection Using Support Vector Machines , 2003 .

[20]  Andrew H. Sung,et al.  Intrusion detection using neural networks and support vector machines , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).

[21]  Faisal Shafait,et al.  Distortion Measurement for Automatic Document Verification , 2011, 2011 International Conference on Document Analysis and Recognition.

[22]  Clara Pizzuti,et al.  Fast Outlier Detection in High Dimensional Spaces , 2002, PKDD.

[23]  Chih-Jen Lin,et al.  Working Set Selection Using Second Order Information for Training Support Vector Machines , 2005, J. Mach. Learn. Res..

[24]  Koby Crammer,et al.  Robust Support Vector Machine Training via Convex Outlier Ablation , 2006, AAAI.

[25]  Sridhar Ramaswamy,et al.  Efficient algorithms for mining outliers from large data sets , 2000, SIGMOD '00.

[26]  Zengyou He,et al.  A Unified Subspace Outlier Ensemble Framework for Outlier Detection , 2005, WAIM.

[27]  Sudipto Guha,et al.  ROCK: a robust clustering algorithm for categorical attributes , 1999, Proceedings 15th International Conference on Data Engineering (Cat. No.99CB36337).

[28]  Jesús S. Aguilar-Ruiz,et al.  SNN: A Supervised Clustering Algorithm , 2001, IEA/AIE.

[29]  Zengyou He,et al.  Discovering cluster-based local outliers , 2003, Pattern Recognit. Lett..

[30]  Hans-Peter Kriegel,et al.  LoOP: local outlier probabilities , 2009, CIKM.

[31]  Federico Girosi,et al.  An improved training algorithm for support vector machines , 1997, Neural Networks for Signal Processing VII. Proceedings of the 1997 IEEE Signal Processing Society Workshop.

[32]  Eamonn J. Keogh,et al.  Approximations to magic: finding unusual medical time series , 2005, 18th IEEE Symposium on Computer-Based Medical Systems (CBMS'05).

[33]  Nello Cristianini,et al.  An Introduction to Support Vector Machines and Other Kernel-based Learning Methods , 2000 .

[34]  M. Amer,et al.  Nearest-Neighbor and Clustering based Anomaly Detection Algorithms for RapidMiner , 2012 .

[35]  Qing Song,et al.  An accelerated decomposition algorithm for robust support vector Machines , 2004, IEEE Transactions on Circuits and Systems II: Express Briefs.

[36]  Yi Liu,et al.  Minimum Enclosing and Maximum Excluding Machine for Pattern Description and Discrimination , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[37]  Boleslaw K. Szymanski,et al.  FUZZY ROC CURVES FOR THE 1 CLASS SVM: APPLICATION TO INTRUSION DETECTION , 2005 .

[38]  Alan L. Yuille,et al.  The Concave-Convex Procedure (CCCP) , 2001, NIPS.

[39]  Christopher M. Bishop,et al.  Pattern Recognition and Machine Learning (Information Science and Statistics) , 2006 .

[40]  Mark Goadrich,et al.  The relationship between Precision-Recall and ROC curves , 2006, ICML.

[41]  Ramakrishnan Srikant,et al.  Mining sequential patterns , 1995, Proceedings of the Eleventh International Conference on Data Engineering.

[42]  Christos Faloutsos,et al.  LOCI: fast outlier detection using the local correlation integral , 2003, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405).

[43]  William M. Campbell,et al.  Phonetic Speaker Recognition with Support Vector Machines , 2003, NIPS.

[44]  Jian Tang,et al.  Enhancing Effectiveness of Outlier Detections for Low Density Patterns , 2002, PAKDD.

[45]  V. Vapnik Pattern recognition using generalized portrait method , 1963 .

[46]  Hans-Peter Kriegel,et al.  A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.

[47]  Yoram Singer,et al.  Leveraging the margin more carefully , 2004, ICML.

[48]  H. Hotelling Relations Between Two Sets of Variates , 1936 .

[49]  Mubarak Shah,et al.  Learning object motion patterns for anomaly detection and improved object detection , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.

[50]  Tong Zhang,et al.  Analysis of Multi-stage Convex Relaxation for Sparse Regularization , 2010, J. Mach. Learn. Res..

[51]  Anthony K. H. Tung,et al.  Ranking Outliers Using Symmetric Neighborhood Relationship , 2006, PAKDD.

[52]  Ingo Mierswa,et al.  YALE: rapid prototyping for complex data mining tasks , 2006, KDD '06.

[53]  Wenjie Hu,et al.  Robust support vector machine with bullet hole image classification , 2002 .

[54]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[55]  Leonid Portnoy,et al.  Intrusion detection with unlabeled data using clustering , 2000 .

[56]  Andreas Dengel,et al.  Histogram-based Outlier Score (HBOS): A fast Unsupervised Anomaly Detection Algorithm , 2012 .

[57]  Charu C. Aggarwal,et al.  Outlier ensembles: position paper , 2013, SKDD.

[58]  Hans-Peter Kriegel,et al.  LOF: identifying density-based local outliers , 2000, SIGMOD 2000.

[59]  Charu C. Aggarwal,et al.  Outlier Analysis , 2013, Springer New York.

[60]  Boleslaw K. Szymanski,et al.  The unbalanced classification problem: detecting breaches in security , 2006 .