Data Mining for Anomaly Detection
author: Varun Chandola, University of Minnesota
author: Vipin Kumar, Department of Computer Science and Engineering, University of Minnesota
author: Aleksandar Lazarevic, United Technologies Research Center
author: Arindam Banerjee, Department of Computer Science and Engineering, University of Minnesota
published: Oct. 10, 2008, recorded: September 2008, views: 29663
Report a problem or upload filesIf you have found a problem with this lecture or would like to send us extra material, articles, exercises, etc., please use our ticket system to describe your request and upload the data.
Enter your e-mail into the 'Cc' field, and we will keep you updated with your request's status.
Anomaly detection corresponds to discovery of events that typically do not conform to expected normal behavior. Such events are often referred to as anomalies, outliers, exceptions, deviations, aberrations, surprise, peculiarities or contaminants in different application domains Detection of anomalies is a common problem in many domains, such as detecting fraudulent credit card transactions, insurance and tax fraud detection, intrusion detection for cyber security, failure detection, direct marketing, and medical diagnostics. Although anomalies are by definition infrequent, in many examples their importance is quite high compared to other events, making their detection extremely important. This tutorial will provide an overview of the research done in the increasingly important field of anomaly detection. The tutorial will cover the existing literature from a variety of perspectives, such as nature of input/output, and the availability of supervision. Anomalies will be divided into three broad groups: (i) Point anomalies, (ii) Contextual anomalies, and (iii) Structural anomalies, and a wide variety of anomaly detection methods appropriate for each type of anomaly will be presented. Additionally, the tutorial will discuss several application domains, such as intrusion detection, fraud detection, industrial damage detection, healthcare informatics, where anomaly detection plays a central role.
Download slides: ecmlpkdd08_lazarevic_dmfa.pdf (6.2 MB)
Download slides: ecmlpkdd08_lazarevic_dmfa_01.ppt (9.5 MB)
Link this pageWould you like to put a link to this lecture on your homepage?
Go ahead! Copy the HTML snippet !