Detection of Thin Boundaries between Different Types of Anomalies in Outlier Detection Using Enhanced Neural Networks

ABSTRACT Outlier detection has received special attention in various fields, mainly for those dealing with machine learning and artificial intelligence. As strong outliers, anomalies are divided into point, contextual and collective outliers. The most important challenges in outlier detection include the thin boundary between the remote points and natural area, the tendency of new data and noise to mimic the real data, unlabeled datasets and different definitions for outliers in different applications. Considering the stated challenges, we defined new types of anomalies called Collective Normal Anomaly and Collective Point Anomaly in order to improve a much better detection of the thin boundary between different types of anomalies. Basic domain-independent methods are introduced to detect these defined anomalies in both unsupervised and supervised datasets. The Multi-Layer Perceptron Neural Network is enhanced using the Genetic Algorithm to detect new defined anomalies with a higher precision so as to ensure a test error less than that be calculated for the conventional Multi-Layer Perceptron Neural Network. Experimental results on benchmark datasets indicated reduced error of anomaly detection process in comparison to baselines.

[1]  Anup K. Ghosh,et al.  Detecting anomalous and unknown intrusions against programs , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).

[2]  Craig E. Wills,et al.  Adaptive resource management , 1995, MASCOTS '95. Proceedings of the Third International Workshop on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems.

[3]  Lei Zhang,et al.  Abnormal Detection Research Based on Outlier Mining , 2018, 2018 11th International Conference on Intelligent Computation Technology and Automation (ICICTA).

[4]  Michael J. Pont,et al.  Improving the performance of radial basis function classifiers in condition monitoring and fault diagnosis applications where 'unknown' faults may occur , 2002, Pattern Recognit. Lett..

[5]  Xiaojie Li,et al.  Outlier Detection Based on the Data Structure , 2018, 2018 International Joint Conference on Neural Networks (IJCNN).

[6]  Abolfazl Toroghi Haghighat,et al.  Adaptive Resource Management and Provisioning in the Cloud Computing: A Survey of Definitions, Standards and Research Roadmaps , 2017, KSII Trans. Internet Inf. Syst..

[7]  Arthur Zimek,et al.  On the evaluation of unsupervised outlier detection: measures, datasets, and an empirical study , 2016, Data Mining and Knowledge Discovery.

[8]  Yu-Ru Lin,et al.  Anomaly detection in spatiotemporal data via regularized non-negative tensor analysis , 2018, Data Mining and Knowledge Discovery.

[9]  Gregory F Cooper,et al.  Conditional outlier detection for clinical alerting. , 2010, AMIA ... Annual Symposium proceedings. AMIA Symposium.

[10]  Rahul Sharma,et al.  Parallel Implementation of Niblack’s Binarization Approach on CUDA , 2011 .

[11]  Amin Keshavarzi,et al.  Analysis and Prediction of Crimes by Clustering and Classification , 2015 .

[12]  Mehran Mohsenzadeh,et al.  Recognition of Data Records in Semi-structured Web-Pages Using Ontology and chi2 Statistical Distribution , 2008, ADMA.

[13]  Malik Yousef,et al.  One-Class SVMs for Document Classification , 2002, J. Mach. Learn. Res..

[14]  Ji Zhang,et al.  Towards outlier detection for high-dimensional data streams using projected outlier analysis strategy , 2009 .

[15]  Oliver Schulte,et al.  Model-Based Outlier Detection for Object-Relational Data , 2015, 2015 IEEE Symposium Series on Computational Intelligence.

[16]  Chang-Tien Lu,et al.  Spatial Outlier Detection: A Graph-Based Approach , 2007, 19th IEEE International Conference on Tools with Artificial Intelligence(ICTAI 2007).

[17]  Charu C. Aggarwal,et al.  Outlier Detection for Temporal Data , 2014, Outlier Detection for Temporal Data.

[18]  P. Hanson,et al.  Spastic paretic hemifacial contracture related to multiple sclerosis: a rare and under-recognized entity , 2017, Acta Neurologica Belgica.

[19]  Charu C. Aggarwal,et al.  Outlier Analysis , 2013, Springer New York.

[20]  M. F. Augusteijn,et al.  Neural network classification and novelty detection , 2002 .

[21]  Amin Keshavarzi,et al.  Efficient cluster head selection using Naïve Bayes classifier for wireless sensor networks , 2017, Wirel. Networks.

[22]  Frank Klawonn,et al.  A Novel Approach to Noise Clustering for Outlier Detection , 2006, Soft Comput..

[23]  Ian Davidson,et al.  Discovering Contexts and Contextual Outliers Using Random Walks in Graphs , 2009, 2009 Ninth IEEE International Conference on Data Mining.

[24]  Manoj Singh,et al.  Outlier detection using divide-and-conquer strategy in density based clustering , 2016, 2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE).

[25]  Ray J. Frank,et al.  The detection of fraud in mobile phone networks , 1996 .

[26]  Thomas G. Dietterich,et al.  Improving the Performance of Radial Basis Function Networks by Learning Center Locations , 1991, NIPS.

[27]  Shawn Ostermann,et al.  Detecting Anomalous Network Traffic with Self-organizing Maps , 2003, RAID.

[28]  Shivam Agarwal,et al.  Data Mining: Data Mining Concepts and Techniques , 2013, 2013 International Conference on Machine Intelligence and Research Advancement.

[29]  Don R. Hush,et al.  A Classification Framework for Anomaly Detection , 2005, J. Mach. Learn. Res..

[30]  Jarvis D. Haupt,et al.  Identifying Outliers in Large Matrices via Randomized Adaptive Compressive Sampling , 2014, IEEE Transactions on Signal Processing.

[31]  Colin Campbell,et al.  A Linear Programming Approach to Novelty Detection , 2000, NIPS.

[32]  Mohiuddin Ahmed,et al.  Network traffic analysis based on collective anomaly detection , 2014, 2014 9th IEEE Conference on Industrial Electronics and Applications.

[33]  Volker Tresp,et al.  Fraud detection in communication networks using neural and probabilistic methods , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).

[34]  Yue Zhao,et al.  XGBOD: Improving Supervised Outlier Detection with Unsupervised Representation Learning , 2018, 2018 International Joint Conference on Neural Networks (IJCNN).

[35]  Taylor Boyd,et al.  Outliers in data envelopment analysis , 2016 .

[36]  Lefteris Angelis,et al.  Towards an Integrated Platform for Big Data Analysis , 2020, ArXiv.

[37]  Ji Zhang,et al.  Detecting global outliers from large distributed databases , 2012, 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery.

[38]  Su Yang,et al.  Anomaly Detection on Collective Moving Patterns: A Hidden Markov Model Based Solution , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.

[39]  Tapani Raiko,et al.  Semi-supervised detection of collective anomalies with an application in high energy particle physics , 2012, The 2012 International Joint Conference on Neural Networks (IJCNN).

[40]  Durvasula V. L. N. Somayajulu,et al.  Privacy Preserving Outlier Detection Using Hierarchical Clustering Methods , 2010, 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops.

[41]  James Theiler,et al.  Resampling approach for anomaly detection in multispectral images , 2003, SPIE Defense + Commercial Sensing.

[42]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[43]  Leman Akoglu,et al.  Explaining anomalies in groups with characterizing subspace rules , 2017, Data Mining and Knowledge Discovery.

[44]  Mohamed Limam,et al.  A Three-Stage Process to Detect Outliers and False Positives Generated by Intrusion Detection Systems , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.

[45]  Akihiro Yamamoto,et al.  Outlier detection using binary decision diagrams , 2017, Data Mining and Knowledge Discovery.

[46]  Takehisa Yairi,et al.  An approach to spacecraft anomaly detection problem using kernel feature space , 2005, KDD '05.

[47]  Diane J. Cook,et al.  Graph-based anomaly detection , 2003, KDD '03.

[48]  Sanjay Ranka,et al.  Conditional Anomaly Detection , 2007, IEEE Transactions on Knowledge and Data Engineering.

[49]  Abolfazl Toroghi Haghighat,et al.  Enhanced time-aware QoS prediction in multi-cloud: a hybrid k-medoids and lazy learning approach (QoPC) , 2019, Computing.

[50]  Victoria J. Hodge,et al.  A Survey of Outlier Detection Methodologies , 2004, Artificial Intelligence Review.

[51]  Sungzoon Cho,et al.  Machine learning-based anomaly detection via integration of manufacturing, inspection and after-sales service data , 2017, Ind. Manag. Data Syst..

[52]  Sameer Singh,et al.  An approach to novelty detection applied to the classification of image regions , 2004, IEEE Transactions on Knowledge and Data Engineering.

[53]  Charles R. Farrar,et al.  Novelty detection under changing environmental conditions , 2001, SPIE Smart Structures and Materials + Nondestructive Evaluation and Health Monitoring.

[54]  Harsh Sadawarti,et al.  Comparative Analysis of Outlier Detection Techniques , 2014 .

[55]  Douglas L. Reilly,et al.  Credit card fraud detection with a neural-network , 1994, 1994 Proceedings of the Twenty-Seventh Hawaii International Conference on System Sciences.

[56]  J. Hollmen,et al.  Residual generation and visualization for understanding novel process conditions , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).

[57]  Bernd Freisleben,et al.  CARDWATCH: a neural network based database mining system for credit card fraud detection , 1997, Proceedings of the IEEE/IAFE 1997 Computational Intelligence for Financial Engineering (CIFEr).

[58]  D. Hand,et al.  Unsupervised Profiling Methods for Fraud Detection , 2002 .

[59]  Li Jun,et al.  HIDE: a Hierarchical Network Intrusion Detection System Using Statistical Preprocessing and Neural Network Classification , 2001 .

[60]  A. Pujari An Efficient Clustering Algorithm for Outlier Detection , 2020 .