SlideShare uma empresa Scribd logo
1 de 52
Baixar para ler offline
Anomaly Detection
Softnix Technology
Chakrit Phain
Agenda
2
• Part 1
• Introduction
• Application for Anomaly Detection
• AIOps
• GraphDB
• Part 2
• Type Of Anomaly Detection
• How to Identify Outliers in your Data
• Part 3
• Anomaly Detection for Timeseries Technique
Introduction
3
https://en.wikipedia.org/wiki/Anomaly_detection
In data mining, anomaly detection (also outlier detection[1]) is the
identification of rare items, events or observations which raise suspicions by
differing significantly from the majority of the data.
Introduction
4
https://www.anodot.com/blog/what-is-anomaly-detection/
https://developer.mindsphere.io/apis/analytics-anomalydetection/api-anomalydetection-overview.html
Introduction
5
Introduction
6
Applications of Anomaly Detection in the Business
world
7
• Intrusion detection
• Attacks on computer systems and computer networks.
• Fraud detection
• The purchasing behavior of some one who steals a credit card is probably
different from that of the original owner.
• Ecosystem Disturbance.
• Hurricanes , floods , heat waves … etc
• Medicine.
• Unusual symptoms or test result may indicate potential health problem.
https://zindi.africa/blog/introduction-to-anomaly-detection-using-machine-learning-with-a-case-study
Introduction
8
https://www.datasciencecentral.com/profiles/blogs/driving-ai-revolution-with-pre-built-analytic-modules
AIOps
AIOps
10
https://aiops.fatpipes.biz/2019/09/aiops-best-for-anomalies-noise-alert.html?utm_source=dlvr.it&utm_medium=twitter
AIOps
11
AIOps
12
AIOps
13
https://infrastructureedge.blogspot.com/2019/09/enterprise-it-managers-say-aiops-works.html?utm_source=dlvr.it&utm_medium
AIOps
14
GRAPH DATABASE
Fraud Detection for Graph analytic
16
https://neo4j.com/whitepapers/fraud-detection-graph-databases/?ref=blog
Insurance Fraud
17
https://neo4j.com/whitepapers/fraud-detection-graph-databases/?ref=blog
Fraud Prevention Approach
18
Type Of Anomaly
Anomalies can be broadly categorized as
20
1. Point Anomalies
2. Contextual Anomalies
3. Collective Anomalies
If an individual data instance can be considered as
anomalous with respect to the rest of data, then the instance is
termed as a point anomaly.
Chandola, V., Banerjee, A. & Kumar, V., 2009. Anomaly Detection: A Survey. ACM Computing Surveys, July. 41(3).
Anomalies can be broadly categorized as
21
1. Point Anomalies
2. Contextual Anomalies
3. Collective Anomalies
If a data instance is anomalous in a specific context
(but not otherwise), then it is termed as a
contextual anomaly
Chandola, V., Banerjee, A. & Kumar, V., 2009. Anomaly Detection: A Survey. ACM Computing Surveys, July. 41(3).
Anomalies can be broadly categorized as
22
1. Point Anomalies
2. Contextual Anomalies
3. Collective Anomalies
Chandola, V., Banerjee, A. & Kumar, V., 2009. Anomaly Detection: A Survey. ACM Computing Surveys, July. 41(3).
If a collection of related data instances is
anomalous with respect to the entire data set, it
is termed as a collective anomaly
How to Identify Outliers in your Data
24
1. Extreme Value Analysis
2. Proximity Methods
3. Projection Methods
4. Methods Robust to Outliers
https://machinelearningmastery.com/how-to-identify-outliers-in-your-data/
How to Identify Outliers in your Data
25
1. Extreme Value Analysis
2. Proximity Methods
3. Projection Methods
4. Methods Robust to Outliers
https://machinelearningmastery.com/how-to-identify-outliers-in-your-data/
1. Focus on univariate methods
2. Visualize the data using scatterplots, histograms and box
and whisker plots and look for extreme values
3. Assume a distribution (Gaussian) and look for values more
than 2 or 3 standard deviations from the mean or 1.5 times
from the first or third quartile
4. Filter out outliers candidate from training dataset and
assess your models performance
https://en.wikipedia.org/wiki/Multivariate_normal_distribution
How to Identify Outliers in your Data
26
1. Extreme Value Analysis
2. Proximity Methods
3. Projection Methods
4. Methods Robust to Outliers
https://machinelearningmastery.com/how-to-identify-outliers-in-your-data/
How to Identify Outliers in your Data
27
1. Extreme Value Analysis
2. Proximity Methods
3. Projection Methods
4. Methods Robust to Outliers
https://machinelearningmastery.com/how-to-identify-outliers-in-your-data/
How to Identify Outliers in your Data
28
1. Extreme Value Analysis
2. Proximity Methods
3. Projection Methods
4. Methods Robust to Outliers
https://machinelearningmastery.com/how-to-identify-outliers-in-your-data/
Typology of Anomalies
29
https://tunguska.home.xs4all.nl/Publications/AD_Typology.htm
Anomaly based IDS using Backpropagation Neural Network
https://pdfs.semanticscholar.org/3ac9/37cb50bad238091fba6d1076a78136fe8691.pdf
• Vrushali D. Mane ME (Electronics) JNEC, Aurangabad
• S.N. Pawar Associate Professor JNEC, Aurangabad
• Neural Network detect 98% accuracy
Anomaly Detection for Timeseries
Recurrent neural network (RNN)
Recurrent neural network (GRU)
n=24
Recurrent neural network (GRU)
Historical
Historical
DB-Scan
Historical with DB-Scan
https://en.wikipedia.org/wiki/DBSCAN https://www.mathworks.com/matlabcentral/fileexchange/53842-dbscan
Historical with DB-Scan
RNN with DB-Scan
Historical with DB-Scan
Time Shift Detection
Create new graph with shift to 1 step
Zoom your graph and shift first 3 step
Zoom your graph and shift first 3 step
Zoom your graph and shift first 3 step
Zoom your graph and shift first 3 step
Cosine Similarity
https://www.softnix.co.th/2019/05/29/similarity-%E0%B8%84%E0%B8%A7%E0%B8%B2%E0%B8%A1%E0%B9%80%E0%B8%AB%E0
Rotate graph next 3 step and compare with cosine similarity
Remark when value lower than threshold
Compare with anomaly detection (left) and correlation values (right)
Pros & Cons
Time shift Detection DB-Scan
Work well on slope data like
temperature
Like Time shift compare
Not work on many spikes data Must defined eps and min_samples
Thank you

Mais conteúdo relacionado

Semelhante a anomalydetection-191104083630.pdf

Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
eSAT Journals
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
eSAT Journals
 

Semelhante a anomalydetection-191104083630.pdf (20)

Anomaly Detection - Real World Scenarios, Approaches and Live Implementation
Anomaly Detection - Real World Scenarios, Approaches and Live ImplementationAnomaly Detection - Real World Scenarios, Approaches and Live Implementation
Anomaly Detection - Real World Scenarios, Approaches and Live Implementation
 
Anomaly detection in plain static graphs
Anomaly detection in plain static graphsAnomaly detection in plain static graphs
Anomaly detection in plain static graphs
 
Anomaly detection
Anomaly detectionAnomaly detection
Anomaly detection
 
Outlier Detection Using Unsupervised Learning on High Dimensional Data
Outlier Detection Using Unsupervised Learning on High Dimensional DataOutlier Detection Using Unsupervised Learning on High Dimensional Data
Outlier Detection Using Unsupervised Learning on High Dimensional Data
 
Enhancing Time Series Anomaly Detection: A Hybrid Model Fusion Approach
Enhancing Time Series Anomaly Detection: A Hybrid Model Fusion ApproachEnhancing Time Series Anomaly Detection: A Hybrid Model Fusion Approach
Enhancing Time Series Anomaly Detection: A Hybrid Model Fusion Approach
 
Chapter 12 outlier
Chapter 12 outlierChapter 12 outlier
Chapter 12 outlier
 
Comparison of Data Mining Techniques used in Anomaly Based IDS
Comparison of Data Mining Techniques used in Anomaly Based IDS  Comparison of Data Mining Techniques used in Anomaly Based IDS
Comparison of Data Mining Techniques used in Anomaly Based IDS
 
Data mining techniques
Data mining techniquesData mining techniques
Data mining techniques
 
A Review of Machine Learning based Anomaly Detection Techniques
A Review of Machine Learning based Anomaly Detection TechniquesA Review of Machine Learning based Anomaly Detection Techniques
A Review of Machine Learning based Anomaly Detection Techniques
 
DLD_SYNOPSIS
DLD_SYNOPSISDLD_SYNOPSIS
DLD_SYNOPSIS
 
Chapter 6.pdf
Chapter 6.pdfChapter 6.pdf
Chapter 6.pdf
 
C3602021025
C3602021025C3602021025
C3602021025
 
SURVEY PAPER ON OUT LIER DETECTION USING FUZZY LOGIC BASED METHOD
SURVEY PAPER ON OUT LIER DETECTION USING FUZZY LOGIC BASED METHODSURVEY PAPER ON OUT LIER DETECTION USING FUZZY LOGIC BASED METHOD
SURVEY PAPER ON OUT LIER DETECTION USING FUZZY LOGIC BASED METHOD
 
Artificial Neural Content Techniques for Enhanced Intrusion Detection and Pre...
Artificial Neural Content Techniques for Enhanced Intrusion Detection and Pre...Artificial Neural Content Techniques for Enhanced Intrusion Detection and Pre...
Artificial Neural Content Techniques for Enhanced Intrusion Detection and Pre...
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
 
DB-OLS: An Approach for IDS1
DB-OLS: An Approach for IDS1DB-OLS: An Approach for IDS1
DB-OLS: An Approach for IDS1
 
Outlier analysis,Chapter-12, Data Mining: Concepts and Techniques
Outlier analysis,Chapter-12, Data Mining: Concepts and TechniquesOutlier analysis,Chapter-12, Data Mining: Concepts and Techniques
Outlier analysis,Chapter-12, Data Mining: Concepts and Techniques
 
Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques
 
A Survey on Cluster Based Outlier Detection Techniques in Data Stream
A Survey on Cluster Based Outlier Detection Techniques in Data StreamA Survey on Cluster Based Outlier Detection Techniques in Data Stream
A Survey on Cluster Based Outlier Detection Techniques in Data Stream
 

Mais de hanadi40

Concept of Microgrid.pdf
Concept of Microgrid.pdfConcept of Microgrid.pdf
Concept of Microgrid.pdf
hanadi40
 
SHET Charger Controllers pertemuan 3.pdf
SHET  Charger Controllers pertemuan 3.pdfSHET  Charger Controllers pertemuan 3.pdf
SHET Charger Controllers pertemuan 3.pdf
hanadi40
 
CalemEAM_Training_Part1-QuickStart.pdf
CalemEAM_Training_Part1-QuickStart.pdfCalemEAM_Training_Part1-QuickStart.pdf
CalemEAM_Training_Part1-QuickStart.pdf
hanadi40
 
ompresentation-intersolar2013ver3-131115095204-phpapp02.pdf
ompresentation-intersolar2013ver3-131115095204-phpapp02.pdfompresentation-intersolar2013ver3-131115095204-phpapp02.pdf
ompresentation-intersolar2013ver3-131115095204-phpapp02.pdf
hanadi40
 

Mais de hanadi40 (7)

Concept of Microgrid.pdf
Concept of Microgrid.pdfConcept of Microgrid.pdf
Concept of Microgrid.pdf
 
SHET Charger Controllers pertemuan 3.pdf
SHET  Charger Controllers pertemuan 3.pdfSHET  Charger Controllers pertemuan 3.pdf
SHET Charger Controllers pertemuan 3.pdf
 
CalemEAM_Training_Part1-QuickStart.pdf
CalemEAM_Training_Part1-QuickStart.pdfCalemEAM_Training_Part1-QuickStart.pdf
CalemEAM_Training_Part1-QuickStart.pdf
 
TF6002 PR4.pdf
TF6002 PR4.pdfTF6002 PR4.pdf
TF6002 PR4.pdf
 
kel 3 pres ke 3.pptx
kel 3 pres ke 3.pptxkel 3 pres ke 3.pptx
kel 3 pres ke 3.pptx
 
ompresentation-intersolar2013ver3-131115095204-phpapp02.pdf
ompresentation-intersolar2013ver3-131115095204-phpapp02.pdfompresentation-intersolar2013ver3-131115095204-phpapp02.pdf
ompresentation-intersolar2013ver3-131115095204-phpapp02.pdf
 
ModulFlutter-1.pptx
ModulFlutter-1.pptxModulFlutter-1.pptx
ModulFlutter-1.pptx
 

Último

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Último (20)

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 

anomalydetection-191104083630.pdf