skip to main content
10.1145/3292500.3330871acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article

Deep Anomaly Detection with Deviation Networks

Published:25 July 2019Publication History

ABSTRACT

Although deep learning has been applied to successfully address many data mining problems, relatively limited work has been done on deep learning for anomaly detection. Existing deep anomaly detection methods, which focus on learning new feature representations to enable downstream anomaly detection methods, perform indirect optimization of anomaly scores, leading to data-inefficient learning and suboptimal anomaly scoring. Also, they are typically designed as unsupervised learning due to the lack of large-scale labeled anomaly data. As a result, they are difficult to leverage prior knowledge (e.g., a few labeled anomalies) when such information is available as in many real-world anomaly detection applications. This paper introduces a novel anomaly detection framework and its instantiation to address these problems. Instead of representation learning, our method fulfills an end-to-end learning of anomaly scores by a neural deviation learning, in which we leverage a few (e.g., multiple to dozens) labeled anomalies and a prior probability to enforce statistically significant deviations of the anomaly scores of anomalies from that of normal data objects in the upper tail. Extensive results show that our method can be trained substantially more data-efficiently and achieves significantly better anomaly scoring than state-of-the-art competing methods.

References

  1. Charu C Aggarwal. 2017. Supervised outlier detection. In Outlier Analysis. Springer, 219--248.Google ScholarGoogle Scholar
  2. Jinghui Chen, Saket Sathe, Charu Aggarwal, and Deepak Turaga. 2017. Outlier detection with autoencoder ensembles. In SDM. SIAM, 90--98.Google ScholarGoogle Scholar
  3. Franccois Chollet et al. 2015. Keras. https://keras.io.Google ScholarGoogle Scholar
  4. Charles Elkan and Keith Noto. 2008. Learning classifiers from only positive and unlabeled data. In KDD. ACM, 213--220. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Li Fei-Fei, Rob Fergus, and Pietro Perona. 2006. One-shot learning of object categories. IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 28, 4 (2006), 594--611. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. R. Hadsell, S. Chopra, and Y. LeCun. 2006. Dimensionality Reduction by Learning an Invariant Mapping. In CVPR, Vol. 2. 1735--1742. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Simon Hawkins, Hongxing He, Graham Williams, and Rohan Baxter. 2002. Outlier detection using replicator neural networks. In DaWaK. Springer, 170--180. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Geoffrey Hinton. 2012. Overview of mini-batch gradient descent. (2012). https://www.cs.toronto.edu/ tijmen/csc321/slides/lecture_slides_lec6.pdfGoogle ScholarGoogle Scholar
  9. Fabian Keller, Emmanuel Muller, and Klemens Bohm. 2012. HiCS: High contrast subspaces for density-based outlier ranking. In ICDE. IEEE, 1037--1048. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Hans-Peter Kriegel, Peer Kroger, Erich Schubert, and Arthur Zimek. 2011. Interpreting and unifying outlier scores. In SDM. SIAM, 13--24.Google ScholarGoogle Scholar
  11. Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. 2015. Deep learning. Nature, Vol. 521, 7553 (2015), 436.Google ScholarGoogle Scholar
  12. Ping Li, Trevor J Hastie, and Kenneth W Church. 2006. Very sparse random projections. In KDD. ACM, 287--296. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Xiaoli Li and Bing Liu. 2003. Learning to classify texts using positive and unlabeled data. In IJCAI, Vol. 3. 587--592. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Fei Tony Liu, Kai Ming Ting, and Zhi-Hua Zhou. 2012. Isolation-based anomaly detection. ACM Transactions on Knowledge Discovery from Data, Vol. 6, 1 (2012), 3. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Justin Ma, Lawrence K Saul, Stefan Savage, and Geoffrey M Voelker. 2009. Identifying suspicious URLs: An application of large-scale online learning. In ICML. ACM, 681--688. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Mary McGlohon, Stephen Bay, Markus G Anderle, David M Steier, and Christos Faloutsos. 2009. SNARE: A link analytic system for graph labeling and risk detection. In KDD. ACM, 1265--1274. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Nour Moustafa and Jill Slay. 2015. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In Military Communications and Information Systems Conference, 2015. 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  18. Guansong Pang, Longbing Cao, Ling Chen, Defu Lian, and Huan Liu. 2018. Sparse modeling-based sequential ensemble learning for effective outlier detection in high-dimensional numeric data. In AAAI. AAAI press, 3892--3899.Google ScholarGoogle Scholar
  19. Guansong Pang, Longbing Cao, Ling Chen, and Huan Liu. 2018. Learning Representations of Ultrahigh-dimensional Data for Random Distance-based Outlier Detection. In KDD. 2041--2050. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Lukas Ruff, Nico Görnitz, Lucas Deecke, Shoaib Ahmed Siddiqui, Robert Vandermeulen, Alexander Binder, Emmanuel Müller, and Marius Kloft. 2018. Deep one-class classification. In ICML. 4390--4399.Google ScholarGoogle Scholar
  21. Emanuele Sansone, Francesco GB De Natale, and Zhi-Hua Zhou. 2018. Efficient training for positive unlabeled learning. IEEE Transactions on Pattern Analysis and Machine Intelligence (2018).Google ScholarGoogle Scholar
  22. Thomas Schlegl, Philipp Seeböck, Sebastian M Waldstein, Ursula Schmidt-Erfurth, and Georg Langs. 2017. Unsupervised anomaly detection with generative adversarial networks to guide marker discovery. In IPMI. Springer, Cham, 146--157.Google ScholarGoogle Scholar
  23. Hinrich Schütze, Christopher D Manning, and Prabhakar Raghavan. 2008. Introduction to Information Retrieval .Cambridge University Press.Google ScholarGoogle Scholar
  24. Md Amran Siddiqui, Alan Fern, Thomas G. Dietterich, Ryan Wright, Alec Theriault, and David W. Archer. 2018. Feedback-Guided Anomaly Discovery via Online Optimization. In KDD. ACM, 2200--2209. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Jake Snell, Kevin Swersky, and Richard Zemel. 2017. Prototypical networks for few-shot learning. In NeurIPS. 4077--4087. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Acar Tamersoy, Kevin Roundy, and Duen Horng Chau. 2014. Guilt by association: Large scale malware detection by mining file-relation graphs. In KDD. 1524--1533. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. David MJ Tax and Robert PW Duin. 2004. Support vector data description. Machine Learning, Vol. 54, 1 (2004), 45--66. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. RF Woolson. 2007. Wilcoxon signed-rank test. Wiley Encyclopedia of Clinical Trials (2007), 1--3.Google ScholarGoogle Scholar
  29. Houssam Zenati, Manon Romain, Chuan-Sheng Foo, Bruno Lecouat, and Vijay Chandrasekhar. 2018. Adversarially Learned Anomaly Detection. In ICDM. IEEE, 727--736.Google ScholarGoogle Scholar
  30. Chong Zhou and Randy C Paffenroth. 2017. Anomaly detection with robust deep autoencoders. In KDD. ACM, 665--674. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Deep Anomaly Detection with Deviation Networks

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          KDD '19: Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining
          July 2019
          3305 pages
          ISBN:9781450362016
          DOI:10.1145/3292500

          Copyright © 2019 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 25 July 2019

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          KDD '19 Paper Acceptance Rate110of1,200submissions,9%Overall Acceptance Rate1,133of8,635submissions,13%

          Upcoming Conference

          KDD '24

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader