SlideShare uma empresa Scribd logo
1 de 35
Baixar para ler offline
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Monitoring User-System
Interactions through Graph-Based
Intrinsic Dynamics Analysis
S´ebastien Heymann, B´en´edicte Le Grand
Emails: Sebastien.Heymann@lip6.fr, Benedicte.Le-Grand@univ-paris1.fr
May 30, 2013
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Monitoring user-system
interactions
What type of user-system interactions?
• user-invoked services in information systems
• social networks
• ...
What kind of monitoring?
• discovery
• conformance
• model improvement
Our ultimate goal: automatic and real-time anomaly detection.
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
2/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Studied social network
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
3/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Github interaction: code commit
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
4/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Github interaction: bug report
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
5/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Collected Dataset
👤  👤   👤
📸  📸  📸 📸  📸  📸
  
  
❞ ❞ 🎔
Interactions examples
commit code / merge
repositories.
open / close bug reports.
❞comment on bug reports.
🎔edit the repository wiki.
”who contributes to which source code repository”
• 336 000 users and repositories monitored during 4 months.
• 2.2 million interactions recorded sequentially with timestamps.
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
6/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Log trace sample
User, user, repository, event, timestamp
lukearmstrong, fuel, core, IssuesEvent, 1341420003
Try-Git, clarkeash, try git, CreateEvent, 1341420006
uGoMobi, jquery, jquery-mobile, IssuesEvent, 1341420009
jexp, neo4j, java-rest-binding, IssueCommentEvent, 1341420011
HosipLan, nette, nette, PullRequestEvent, 1341420152
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
7/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Bipartite graph
👤  👤   👤
📸  📸  📸 📸  📸  📸
: users
⊥: repositories
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
8/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Links appear over time
👤
📸
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
9/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Links appear over time
👤 👤
📸 📸
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
9/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Links appear over time
👤 👤
📸 📸 📸
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
9/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Links appear over time
👤 👤
📸 📸 📸 📸
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
9/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Links appear over time
👤 👤
📸 📸 📸 📸
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
9/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Links appear over time
👤 👤👤
📸 📸 📸 📸 📸
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
9/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Links appear over time
👤 👤👤
📸 📸 📸 📸 📸 📸
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
9/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Links appear over time
👤 👤👤
📸 📸 📸 📸 📸 📸
Detection of statistically abnormal links dynamics?
Model of links dynamics?
Link prediction?
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
9/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Methodology
1 Order links by timestamp.
2 Define a sliding window of width w (time unit?).
3 Extract the bipartite graph from each window at interval i.
4 Compute an appropriate property on each graph.
5 Analyze the time series.
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
10/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Example
Date
Nbnodes
500
1000
1500
11 March 13 April 31 May 18 July
weekly patternNumber of nodes
Date
Nbnodes
400
600
800
1000
1200
1400
1600
15 April 22 April
day-night pattern
zoom
w =1 hour, i = 5 minutes.
Question: don’t temporal patterns hide information?
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
11/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Notions of time
Extrinsic time (real time)
Time measured in units such as seconds.
Good at revealing exogenous phenomena, e.g. day-night patterns.
Intrinsic time (related to graph dynamics)
Time measured in units such as the transition of two states in the
graph.
Better at revealing endogenous phenomena independently from the
graph dynamics?
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
12/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Window width: high resolution
Time (nb links)
Nbnodes
200
400
600
800
1000
1200
500000 1000000 1500000 2000000
Number of nodes
w = 1000 links, i = 100 links.
:) Additional observation
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
13/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Window width: lower resolution
Number of nodes
Time (nb links)
Nbnodes
15000
20000
25000
30000
500000 1000000 1500000 2000000
w = 50, 000 links, i = 1000 links.
:) No need for high resolution
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
14/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Event validation
Visualization of the sub-graph: connected nodes are closer,
disconnected nodes are more distant.
In the sub-graph of
8,370 nodes and
10,000 links at the
time of the event,
one node has a high
number of links:
Try-Git interacts with
4,127 users (over
5,000).
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
15/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
http://try.github.io
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
16/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Towards automatic anomaly
detection
Need for more elaborate properties, like:
Internal links
Their removal does not change the projection of the graph for a
given set of nodes, either or ⊥.
👤
👤
👤👤 👤👤
📸 📸 📸 📸 📸 📸
G G’ = G - (red link) G’T
= GT
👤 👤👤
📸 📸 📸 📸 📸 📸
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
17/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Results
Ratio of -internal links
Time (nb links)
Ratiooftop−internallinks
0.5
0.6
0.7
0.8
0.9
1.0
0 500000 1000000 1500000 2000000 2300000
not outlier potential outlier outlier unknown
A
B C
D
E
F
G
H I
J
K
w = 10, 000 links, i = 1000 links.
Color = outlier class using the automatic Outskewer method*.
* S. Heymann, M.Latapy and C. Magnien. Outskewer: Using Skewness to Spot
Outliers in Samples and Time Series, IEEE ASONAM 2012
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
18/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Conclusion
Contributions
• Graph-based methodology to monitor user-system interactions
• Intrinsic time unit avoids exogeneous patterns impact
• Smaller windows not necessarily optimal
• Checked relevance of detected events
Applicable in other contexts
• Client-server architectures
• Processes-messages graphs
• File-provider graphs
• User-invoked services in information systems
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
19/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Future work
• Which property for anomaly detection?
• Models of interaction dynamics
• Link prediction
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
20/28
Questions?
Monitoring User-System Interactions through
Graph-Based Intrinsic Dynamics Analysis
<sebastien.heymann@lip6.fr>
Thank You!
Monitoring User-System Interactions through
Graph-Based Intrinsic Dynamics Analysis
<sebastien.heymann@lip6.fr>
Backup Slides
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Statistically significant anomalies
General definition
Values which deviate remarkably from the remainder of values
(Grubbs, 1969)
Outskewer method*:
Our definition
Extremal value which skews a distribution of values.
* Heymann, Latapy and Magnien. Outskewer: Using Skewness to Spot Outliers in Samples and Time Series, IEEE
ASONAM 2012
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
24/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Skewness coefficient
γ = n
(n−1)(n−2) x∈X
x−mean
standard deviation
3
density
x
density
xγ < 0
γ > 0
Example of skewed distributions.
It is sensitive to extremal values (min/max) far from the mean !
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
25/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Automatic anomaly detection
Outskewer classifies each value as:
qqqqqqqqqqqqq
qqqqqqqqqqq
2000
status
q not outlier
potential outlier
outlier
or ’unknown’ for heterogeneous distributions of values.
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
26/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Event detection in time series
On a sliding window of size w, each value of X is classified w
times.
The final class of a value is the one that appears the most.
time
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
27/28
l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i
Why Outskewer?
• claims no strong hypothesis on data
• 1 parameter: the time window width
• ignores regime changes (shifts in normality)
• can be implemented on-line.
S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013
28/28

Mais conteúdo relacionado

Semelhante a Monitoring User-System Interactions through Graph-Based Intrinsic Dynamics Analysis

BDTC2015-新加坡管理大学-朱飞达
BDTC2015-新加坡管理大学-朱飞达BDTC2015-新加坡管理大学-朱飞达
BDTC2015-新加坡管理大学-朱飞达Jerry Wen
 
IEEE 2014 JAVA DATA MINING PROJECTS Discovering emerging topics in social str...
IEEE 2014 JAVA DATA MINING PROJECTS Discovering emerging topics in social str...IEEE 2014 JAVA DATA MINING PROJECTS Discovering emerging topics in social str...
IEEE 2014 JAVA DATA MINING PROJECTS Discovering emerging topics in social str...IEEEFINALYEARSTUDENTPROJECTS
 
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...IEEEFINALYEARSTUDENTPROJECT
 
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...IEEEMEMTECHSTUDENTSPROJECTS
 
Detecting root of the rumor in social network using GSSS
Detecting root of the rumor in social network using GSSSDetecting root of the rumor in social network using GSSS
Detecting root of the rumor in social network using GSSSIRJET Journal
 
IRJET- Malicious Meter Inspection in Smart Grid using ABSC Algorithm
IRJET- Malicious Meter Inspection in Smart Grid using ABSC AlgorithmIRJET- Malicious Meter Inspection in Smart Grid using ABSC Algorithm
IRJET- Malicious Meter Inspection in Smart Grid using ABSC AlgorithmIRJET Journal
 
Social Media Mining - Chapter 4 (Network Models)
Social Media Mining - Chapter 4 (Network Models)Social Media Mining - Chapter 4 (Network Models)
Social Media Mining - Chapter 4 (Network Models)SocialMediaMining
 
Social Media Mining - Chapter 3 (Network Measures)
Social Media Mining - Chapter 3 (Network Measures)Social Media Mining - Chapter 3 (Network Measures)
Social Media Mining - Chapter 3 (Network Measures)SocialMediaMining
 
Inferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Inferring Peer Centrality in Socially-Informed Peer-to-Peer SystemsInferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Inferring Peer Centrality in Socially-Informed Peer-to-Peer SystemsNicolas Kourtellis
 
An Initial Homophily Indicator to Reinforce Context-Aware Semantic Computing
An Initial Homophily Indicator to Reinforce Context-Aware Semantic ComputingAn Initial Homophily Indicator to Reinforce Context-Aware Semantic Computing
An Initial Homophily Indicator to Reinforce Context-Aware Semantic ComputingAlejandro Rivero
 
Intelligent Video Surveillance System using Deep Learning
Intelligent Video Surveillance System using Deep LearningIntelligent Video Surveillance System using Deep Learning
Intelligent Video Surveillance System using Deep LearningIRJET Journal
 
Detection of uncontrolled motion behavior in human crowds
Detection of uncontrolled motion behavior in human crowdsDetection of uncontrolled motion behavior in human crowds
Detection of uncontrolled motion behavior in human crowdseSAT Publishing House
 
LRP for hand gesture recogntion.pptx
LRP for hand gesture recogntion.pptxLRP for hand gesture recogntion.pptx
LRP for hand gesture recogntion.pptxshamim806425
 
IRJET- Criminal Recognization in CCTV Surveillance Video
IRJET-  	  Criminal Recognization in CCTV Surveillance VideoIRJET-  	  Criminal Recognization in CCTV Surveillance Video
IRJET- Criminal Recognization in CCTV Surveillance VideoIRJET Journal
 
Evolving social data mining and affective analysis
Evolving social data mining and affective analysis  Evolving social data mining and affective analysis
Evolving social data mining and affective analysis Athena Vakali
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
 
The math behind big systems analysis.
The math behind big systems analysis.The math behind big systems analysis.
The math behind big systems analysis.Theo Schlossnagle
 
Random Walk by User Trust and Temporal Issues toward Sparsity Problem in Soci...
Random Walk by User Trust and Temporal Issues toward Sparsity Problem in Soci...Random Walk by User Trust and Temporal Issues toward Sparsity Problem in Soci...
Random Walk by User Trust and Temporal Issues toward Sparsity Problem in Soci...Sc Huang
 
An adaptive gmm approach to background subtraction for application in real ti...
An adaptive gmm approach to background subtraction for application in real ti...An adaptive gmm approach to background subtraction for application in real ti...
An adaptive gmm approach to background subtraction for application in real ti...eSAT Publishing House
 

Semelhante a Monitoring User-System Interactions through Graph-Based Intrinsic Dynamics Analysis (20)

BDTC2015-新加坡管理大学-朱飞达
BDTC2015-新加坡管理大学-朱飞达BDTC2015-新加坡管理大学-朱飞达
BDTC2015-新加坡管理大学-朱飞达
 
IEEE 2014 JAVA DATA MINING PROJECTS Discovering emerging topics in social str...
IEEE 2014 JAVA DATA MINING PROJECTS Discovering emerging topics in social str...IEEE 2014 JAVA DATA MINING PROJECTS Discovering emerging topics in social str...
IEEE 2014 JAVA DATA MINING PROJECTS Discovering emerging topics in social str...
 
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...
 
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...
 
Detecting root of the rumor in social network using GSSS
Detecting root of the rumor in social network using GSSSDetecting root of the rumor in social network using GSSS
Detecting root of the rumor in social network using GSSS
 
IRJET- Malicious Meter Inspection in Smart Grid using ABSC Algorithm
IRJET- Malicious Meter Inspection in Smart Grid using ABSC AlgorithmIRJET- Malicious Meter Inspection in Smart Grid using ABSC Algorithm
IRJET- Malicious Meter Inspection in Smart Grid using ABSC Algorithm
 
Social Media Mining - Chapter 4 (Network Models)
Social Media Mining - Chapter 4 (Network Models)Social Media Mining - Chapter 4 (Network Models)
Social Media Mining - Chapter 4 (Network Models)
 
Social Media Mining - Chapter 3 (Network Measures)
Social Media Mining - Chapter 3 (Network Measures)Social Media Mining - Chapter 3 (Network Measures)
Social Media Mining - Chapter 3 (Network Measures)
 
Inferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Inferring Peer Centrality in Socially-Informed Peer-to-Peer SystemsInferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Inferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
 
Final Report
Final ReportFinal Report
Final Report
 
An Initial Homophily Indicator to Reinforce Context-Aware Semantic Computing
An Initial Homophily Indicator to Reinforce Context-Aware Semantic ComputingAn Initial Homophily Indicator to Reinforce Context-Aware Semantic Computing
An Initial Homophily Indicator to Reinforce Context-Aware Semantic Computing
 
Intelligent Video Surveillance System using Deep Learning
Intelligent Video Surveillance System using Deep LearningIntelligent Video Surveillance System using Deep Learning
Intelligent Video Surveillance System using Deep Learning
 
Detection of uncontrolled motion behavior in human crowds
Detection of uncontrolled motion behavior in human crowdsDetection of uncontrolled motion behavior in human crowds
Detection of uncontrolled motion behavior in human crowds
 
LRP for hand gesture recogntion.pptx
LRP for hand gesture recogntion.pptxLRP for hand gesture recogntion.pptx
LRP for hand gesture recogntion.pptx
 
IRJET- Criminal Recognization in CCTV Surveillance Video
IRJET-  	  Criminal Recognization in CCTV Surveillance VideoIRJET-  	  Criminal Recognization in CCTV Surveillance Video
IRJET- Criminal Recognization in CCTV Surveillance Video
 
Evolving social data mining and affective analysis
Evolving social data mining and affective analysis  Evolving social data mining and affective analysis
Evolving social data mining and affective analysis
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
 
The math behind big systems analysis.
The math behind big systems analysis.The math behind big systems analysis.
The math behind big systems analysis.
 
Random Walk by User Trust and Temporal Issues toward Sparsity Problem in Soci...
Random Walk by User Trust and Temporal Issues toward Sparsity Problem in Soci...Random Walk by User Trust and Temporal Issues toward Sparsity Problem in Soci...
Random Walk by User Trust and Temporal Issues toward Sparsity Problem in Soci...
 
An adaptive gmm approach to background subtraction for application in real ti...
An adaptive gmm approach to background subtraction for application in real ti...An adaptive gmm approach to background subtraction for application in real ti...
An adaptive gmm approach to background subtraction for application in real ti...
 

Mais de Sébastien

Gephi short introduction
Gephi short introductionGephi short introduction
Gephi short introductionSébastien
 
Gephi : dynamic features
Gephi : dynamic featuresGephi : dynamic features
Gephi : dynamic featuresSébastien
 
Motivation in FLOSS communities
Motivation in FLOSS communitiesMotivation in FLOSS communities
Motivation in FLOSS communitiesSébastien
 
Outskewer: Using Skewness to Spot Outliers in Samples and Time Series
Outskewer: Using Skewness to Spot Outliers in Samples and Time SeriesOutskewer: Using Skewness to Spot Outliers in Samples and Time Series
Outskewer: Using Skewness to Spot Outliers in Samples and Time SeriesSébastien
 
Réseau thématique Analyse Exploratoire de Données pour les Réseaux Dynamiques
Réseau thématique Analyse Exploratoire de Données pour les Réseaux DynamiquesRéseau thématique Analyse Exploratoire de Données pour les Réseaux Dynamiques
Réseau thématique Analyse Exploratoire de Données pour les Réseaux DynamiquesSébastien
 
Conclusion du cours Exploration du Web
Conclusion du cours Exploration du WebConclusion du cours Exploration du Web
Conclusion du cours Exploration du WebSébastien
 
Introduction à l'exploration du Web
Introduction à l'exploration du WebIntroduction à l'exploration du Web
Introduction à l'exploration du WebSébastien
 
WebCSTI Rencontres OCIM 2009
WebCSTI Rencontres OCIM 2009WebCSTI Rencontres OCIM 2009
WebCSTI Rencontres OCIM 2009Sébastien
 
IC05 2008 - Le Web, objet de science?
IC05 2008 - Le Web, objet de science?IC05 2008 - Le Web, objet de science?
IC05 2008 - Le Web, objet de science?Sébastien
 
Des traces d'usages aux patterns relationnels : la construction technologique...
Des traces d'usages aux patterns relationnels : la construction technologique...Des traces d'usages aux patterns relationnels : la construction technologique...
Des traces d'usages aux patterns relationnels : la construction technologique...Sébastien
 
Tour d'horizon des personnes morales adhérentes à l'APRIL
Tour d'horizon des personnes morales adhérentes à l'APRILTour d'horizon des personnes morales adhérentes à l'APRIL
Tour d'horizon des personnes morales adhérentes à l'APRILSébastien
 

Mais de Sébastien (15)

Gephi short introduction
Gephi short introductionGephi short introduction
Gephi short introduction
 
Gephi : dynamic features
Gephi : dynamic featuresGephi : dynamic features
Gephi : dynamic features
 
Motivation in FLOSS communities
Motivation in FLOSS communitiesMotivation in FLOSS communities
Motivation in FLOSS communities
 
Outskewer: Using Skewness to Spot Outliers in Samples and Time Series
Outskewer: Using Skewness to Spot Outliers in Samples and Time SeriesOutskewer: Using Skewness to Spot Outliers in Samples and Time Series
Outskewer: Using Skewness to Spot Outliers in Samples and Time Series
 
Réseau thématique Analyse Exploratoire de Données pour les Réseaux Dynamiques
Réseau thématique Analyse Exploratoire de Données pour les Réseaux DynamiquesRéseau thématique Analyse Exploratoire de Données pour les Réseaux Dynamiques
Réseau thématique Analyse Exploratoire de Données pour les Réseaux Dynamiques
 
Conclusion du cours Exploration du Web
Conclusion du cours Exploration du WebConclusion du cours Exploration du Web
Conclusion du cours Exploration du Web
 
Introduction à l'exploration du Web
Introduction à l'exploration du WebIntroduction à l'exploration du Web
Introduction à l'exploration du Web
 
WebCSTI Rencontres OCIM 2009
WebCSTI Rencontres OCIM 2009WebCSTI Rencontres OCIM 2009
WebCSTI Rencontres OCIM 2009
 
IC05 cours 4
IC05 cours 4IC05 cours 4
IC05 cours 4
 
IC05 cours 3
IC05 cours 3IC05 cours 3
IC05 cours 3
 
IC05 cours 2
IC05 cours 2IC05 cours 2
IC05 cours 2
 
IC05 cours 1
IC05 cours 1IC05 cours 1
IC05 cours 1
 
IC05 2008 - Le Web, objet de science?
IC05 2008 - Le Web, objet de science?IC05 2008 - Le Web, objet de science?
IC05 2008 - Le Web, objet de science?
 
Des traces d'usages aux patterns relationnels : la construction technologique...
Des traces d'usages aux patterns relationnels : la construction technologique...Des traces d'usages aux patterns relationnels : la construction technologique...
Des traces d'usages aux patterns relationnels : la construction technologique...
 
Tour d'horizon des personnes morales adhérentes à l'APRIL
Tour d'horizon des personnes morales adhérentes à l'APRILTour d'horizon des personnes morales adhérentes à l'APRIL
Tour d'horizon des personnes morales adhérentes à l'APRIL
 

Último

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Último (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Monitoring User-System Interactions through Graph-Based Intrinsic Dynamics Analysis

  • 1. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Monitoring User-System Interactions through Graph-Based Intrinsic Dynamics Analysis S´ebastien Heymann, B´en´edicte Le Grand Emails: Sebastien.Heymann@lip6.fr, Benedicte.Le-Grand@univ-paris1.fr May 30, 2013
  • 2. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Monitoring user-system interactions What type of user-system interactions? • user-invoked services in information systems • social networks • ... What kind of monitoring? • discovery • conformance • model improvement Our ultimate goal: automatic and real-time anomaly detection. S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 2/28
  • 3. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Studied social network S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 3/28
  • 4. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Github interaction: code commit S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 4/28
  • 5. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Github interaction: bug report S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 5/28
  • 6. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Collected Dataset 👤 👤 👤 📸 📸 📸 📸 📸 📸       ❞ ❞ 🎔 Interactions examples commit code / merge repositories. open / close bug reports. ❞comment on bug reports. 🎔edit the repository wiki. ”who contributes to which source code repository” • 336 000 users and repositories monitored during 4 months. • 2.2 million interactions recorded sequentially with timestamps. S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 6/28
  • 7. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Log trace sample User, user, repository, event, timestamp lukearmstrong, fuel, core, IssuesEvent, 1341420003 Try-Git, clarkeash, try git, CreateEvent, 1341420006 uGoMobi, jquery, jquery-mobile, IssuesEvent, 1341420009 jexp, neo4j, java-rest-binding, IssueCommentEvent, 1341420011 HosipLan, nette, nette, PullRequestEvent, 1341420152 S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 7/28
  • 8. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Bipartite graph 👤 👤 👤 📸 📸 📸 📸 📸 📸 : users ⊥: repositories S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 8/28
  • 9. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Links appear over time 👤 📸 S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 9/28
  • 10. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Links appear over time 👤 👤 📸 📸 S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 9/28
  • 11. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Links appear over time 👤 👤 📸 📸 📸 S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 9/28
  • 12. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Links appear over time 👤 👤 📸 📸 📸 📸 S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 9/28
  • 13. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Links appear over time 👤 👤 📸 📸 📸 📸 S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 9/28
  • 14. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Links appear over time 👤 👤👤 📸 📸 📸 📸 📸 S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 9/28
  • 15. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Links appear over time 👤 👤👤 📸 📸 📸 📸 📸 📸 S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 9/28
  • 16. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Links appear over time 👤 👤👤 📸 📸 📸 📸 📸 📸 Detection of statistically abnormal links dynamics? Model of links dynamics? Link prediction? S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 9/28
  • 17. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Methodology 1 Order links by timestamp. 2 Define a sliding window of width w (time unit?). 3 Extract the bipartite graph from each window at interval i. 4 Compute an appropriate property on each graph. 5 Analyze the time series. S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 10/28
  • 18. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Example Date Nbnodes 500 1000 1500 11 March 13 April 31 May 18 July weekly patternNumber of nodes Date Nbnodes 400 600 800 1000 1200 1400 1600 15 April 22 April day-night pattern zoom w =1 hour, i = 5 minutes. Question: don’t temporal patterns hide information? S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 11/28
  • 19. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Notions of time Extrinsic time (real time) Time measured in units such as seconds. Good at revealing exogenous phenomena, e.g. day-night patterns. Intrinsic time (related to graph dynamics) Time measured in units such as the transition of two states in the graph. Better at revealing endogenous phenomena independently from the graph dynamics? S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 12/28
  • 20. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Window width: high resolution Time (nb links) Nbnodes 200 400 600 800 1000 1200 500000 1000000 1500000 2000000 Number of nodes w = 1000 links, i = 100 links. :) Additional observation S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 13/28
  • 21. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Window width: lower resolution Number of nodes Time (nb links) Nbnodes 15000 20000 25000 30000 500000 1000000 1500000 2000000 w = 50, 000 links, i = 1000 links. :) No need for high resolution S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 14/28
  • 22. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Event validation Visualization of the sub-graph: connected nodes are closer, disconnected nodes are more distant. In the sub-graph of 8,370 nodes and 10,000 links at the time of the event, one node has a high number of links: Try-Git interacts with 4,127 users (over 5,000). S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 15/28
  • 23. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i http://try.github.io S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 16/28
  • 24. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Towards automatic anomaly detection Need for more elaborate properties, like: Internal links Their removal does not change the projection of the graph for a given set of nodes, either or ⊥. 👤 👤 👤👤 👤👤 📸 📸 📸 📸 📸 📸 G G’ = G - (red link) G’T = GT 👤 👤👤 📸 📸 📸 📸 📸 📸 S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 17/28
  • 25. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Results Ratio of -internal links Time (nb links) Ratiooftop−internallinks 0.5 0.6 0.7 0.8 0.9 1.0 0 500000 1000000 1500000 2000000 2300000 not outlier potential outlier outlier unknown A B C D E F G H I J K w = 10, 000 links, i = 1000 links. Color = outlier class using the automatic Outskewer method*. * S. Heymann, M.Latapy and C. Magnien. Outskewer: Using Skewness to Spot Outliers in Samples and Time Series, IEEE ASONAM 2012 S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 18/28
  • 26. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Conclusion Contributions • Graph-based methodology to monitor user-system interactions • Intrinsic time unit avoids exogeneous patterns impact • Smaller windows not necessarily optimal • Checked relevance of detected events Applicable in other contexts • Client-server architectures • Processes-messages graphs • File-provider graphs • User-invoked services in information systems S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 19/28
  • 27. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Future work • Which property for anomaly detection? • Models of interaction dynamics • Link prediction S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 20/28
  • 28. Questions? Monitoring User-System Interactions through Graph-Based Intrinsic Dynamics Analysis <sebastien.heymann@lip6.fr>
  • 29. Thank You! Monitoring User-System Interactions through Graph-Based Intrinsic Dynamics Analysis <sebastien.heymann@lip6.fr>
  • 31. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Statistically significant anomalies General definition Values which deviate remarkably from the remainder of values (Grubbs, 1969) Outskewer method*: Our definition Extremal value which skews a distribution of values. * Heymann, Latapy and Magnien. Outskewer: Using Skewness to Spot Outliers in Samples and Time Series, IEEE ASONAM 2012 S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 24/28
  • 32. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Skewness coefficient γ = n (n−1)(n−2) x∈X x−mean standard deviation 3 density x density xγ < 0 γ > 0 Example of skewed distributions. It is sensitive to extremal values (min/max) far from the mean ! S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 25/28
  • 33. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Automatic anomaly detection Outskewer classifies each value as: qqqqqqqqqqqqq qqqqqqqqqqq 2000 status q not outlier potential outlier outlier or ’unknown’ for heterogeneous distributions of values. S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 26/28
  • 34. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Event detection in time series On a sliding window of size w, each value of X is classified w times. The final class of a value is the one that appears the most. time S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 27/28
  • 35. l i p 6 u n i v e r s i t ´e d e p a r i s 1 - c r i Why Outskewer? • claims no strong hypothesis on data • 1 parameter: the time window width • ignores regime changes (shifts in normality) • can be implemented on-line. S´ebastien Heymann, B´en´edicte Le Grand — Monitoring User-System Interactions — May 30, 2013 28/28