Data Mining for Anomaly Detection

author: Jaideep Srivastava, University of Minnesota
author: Varun Chandola, University of Minnesota
author: Vipin Kumar, Department of Computer Science and Engineering, University of Minnesota
author: Aleksandar Lazarevic, United Technologies Research Center
author: Arindam Banerjee, Department of Computer Science and Engineering, University of Minnesota
published: Oct. 10, 2008,   recorded: September 2008,   views: 30566


Related Open Educational Resources

Related content

Report a problem or upload files

If you have found a problem with this lecture or would like to send us extra material, articles, exercises, etc., please use our ticket system to describe your request and upload the data.
Enter your e-mail into the 'Cc' field, and we will keep you updated with your request's status.
Lecture popularity: You need to login to cast your vote.

 Watch videos:   (click on thumbnail to launch)

Watch Part 1
Part 1 1:00:58
Watch Part 2
Part 2 58:26
Watch Part 3
Part 3 23:56


Anomaly detection corresponds to discovery of events that typically do not conform to expected normal behavior. Such events are often referred to as anomalies, outliers, exceptions, deviations, aberrations, surprise, peculiarities or contaminants in different application domains Detection of anomalies is a common problem in many domains, such as detecting fraudulent credit card transactions, insurance and tax fraud detection, intrusion detection for cyber security, failure detection, direct marketing, and medical diagnostics. Although anomalies are by definition infrequent, in many examples their importance is quite high compared to other events, making their detection extremely important. This tutorial will provide an overview of the research done in the increasingly important field of anomaly detection. The tutorial will cover the existing literature from a variety of perspectives, such as nature of input/output, and the availability of supervision. Anomalies will be divided into three broad groups: (i) Point anomalies, (ii) Contextual anomalies, and (iii) Structural anomalies, and a wide variety of anomaly detection methods appropriate for each type of anomaly will be presented. Additionally, the tutorial will discuss several application domains, such as intrusion detection, fraud detection, industrial damage detection, healthcare informatics, where anomaly detection plays a central role.

See Also:

Download slides icon Download slides: ecmlpkdd08_lazarevic_dmfa.pdf (6.2 MB)

Download slides icon Download slides: ecmlpkdd08_lazarevic_dmfa_01.ppt (9.5 MB)

Help icon Streaming Video Help

Link this page

Would you like to put a link to this lecture on your homepage?
Go ahead! Copy the HTML snippet !

Reviews and comments:

Comment1 Lucas Fettucci, July 28, 2009 at 5:16 p.m.:

Part 1 does not work: AJAX error: parsererror

Comment2 shenjun, December 5, 2009 at 4:49 p.m.:

i am instresting in that letcure!I wish get more information about the kwnolege in this field!

Comment3 qi, January 10, 2017 at 7:40 p.m.:

part 1 is not working

Comment4 vedant, July 25, 2019 at 6:53 a.m.:

Hello!I want to give my review for this site because i enjoy here so much and its so good for the system user.

Write your own review or comment:

make sure you have javascript enabled or clear this field: