Data Mining Methods for Anomaly Detection KDD-2005 Workshop Report

Data Mining Methods for Anomaly Detection KDD-2005 Workshop Report

Data Mining Methods for Anomaly Detection KDD-2005 Workshop Report Dragos Margineantu Stephen Bay Philip Chan Terran Lane The Boeing Company PricewaterhouseCoopers Florida Institute of University of New Mexico Phantom Works Ten Almaden Boulevard Technology Department of Math & Computing Tech. Suite 1600 Department of Computer Science P.O. Box 3707, M/S 7L-66 San Jose, CA 95113 Computer Sciences Albuquerque, NM 87131 Seattle, WA 98124 Melbourne, FL 32901 dragos.d.margineantu [email protected] [email protected] [email protected] @boeing.com ABSTRACT developing and deploying data mining systems for anomaly detection and to inspire research on principled methods and For many applications, data mining systems are required to detect techniques for detecting and predicting anomalies. Finally, we anomalous (abnormal, unmodeled, or unexpected) observations. hoped to foster collaborations between AD researchers and those This has so far proven to be a difficult challenge because who had a need for AD – to bring together the data miners with anomalies are usually considered to be “non-normal” the data stakeholders. observations, where “normality” is typically defined by very complex concepts. Because of these and other reasons, there are 2. WORKSHOP OVERVIEW no standard and principled approaches for anomaly detection, yet, “What is an Anomaly?” This was the first question the audience and the data mining processes that have led to successful solutions was asked during the opening remarks at the beginning of the day. include most of the times ad-hoc (algorithmic, design, and The answers ranged from “three standard deviations away from implementation) decisions that incorporate prior or commonsense the mean/normal” to “outliers” to “abnormalities that are different knowledge about the tasks that are addressed. from outliers”. The definitions proposed by the workshop Consequently, we considered that it would be beneficial for both organizers are: researchers and practitioners interested in anomaly detection and data mining, to organize workshop that would bring together - “Anomalies are occurrences of events that are unusual and people interested in this topic. We considered that the that cannot be explained by our current knowledge of how International Conference on Knowledge Discovery and Data the domain works. I see anomaly detection as simply trying Mining would be a good venue for such a workshop because of to find these events. Anomalies are distinct from outliers, the diversity of interests, backgrounds, and problems that which I see as objects that on a measurement space, are far motivate people to attend the conference. away from the other points.” (Stephen Bay). This paper describes the workshop on “Data Mining Methods for - “Anomalies are events that are not expected based on the Anomaly Detection” – a one day event held in conjunction with knowledge of previous events that are considered normal. KDD-2005 in Chicago, on August 21, 2005. Since frequent events are usually considered normal, anomalies are usually rare. Based on the normal events, data mining methods can generate, in an automated manner, Keywords. models (knowledge) of normalcy to identify deviations, which could be considered anomalies.” (Philip Chan). Anomalies, detection of anomalies in data, data mining, machine learning. - “An anomaly is an event that deviates substantially from a known (explicit or implicit) model of some domain. 1. INTRODUCTION Anomalies are events generated by a process that is significantly different than (explicitly or implicitly) The KDD-2005 workshop on “Data Mining Methods for known/understood processes. ” (Terran Lane). Anomaly Detection” aimed to explore research efforts on data mining, machine learning, and related techniques that address the - “Anomalies are observations (or series of observations) with problem of detecting anomalies in data. The workshop was also very low likelihood of occurrence with respect to (1) the an attempt to study the common tasks that need to be addressed in model(s) that are believed (or are likely) to generate all practical applications that require anomaly detection (AD) tools observations and (2) the other observations that are and algorithms such as data collection, sampling, and pre- available“ (Dragos Margineantu). processing. These answers reflected the diverse interests of the people in the Our main goals were to bring together researchers and audience and the different motivations for their attending the practitioners interested in anomaly detection and to create a one- workshop. We learned that most of the people in the audience day forum for discussing recent advances in this area. We wanted were interested in this workshop because they were interested in to come to a better understanding of the practical challenges in addressing a particular application problem that involved SIGKDD Explorations Volume 7, Issue 2 Page 132 detecting anomalies, rather than in attempting to address a large 3.1.2 Outlier Detection in High-Dimensional Data – or general class of different anomaly detection tasks. The Using Exact Mapping to a Relative Distance Plane submissions, the reviews, and our discussions prior to the workshop reflected that all of us - researchers and practitioners The invited talk of the afternoon session was given by Ray interested in data mining and learning methods for AD - typically Somorjai, a scientist with the National Research Council of have certain beliefs regarding the best approaches (algorithms, Canada (NRC), in Winnipeg. The focus in this presentation was parameter settings, etc.) for a specific task. These beliefs are the detection of outliers in highly-dimensional spaces, especially usually based on previous experience on other applications, data when the number of labeled observation is small. For the sets, and tasks. In practice, however, the practicalities of a real- detection of the outliers, the speaker’s approach is to employ world problem can dramatically change the approach we take. different metrics for mapping the points into lower dimensional The organizers’ desire was to have a day of presentations and spaces and to employ a voting mechanism over the different discussions on: mappings for the final decisions. The talk explored different mapping functions and analyzed their outlier detection • Real problems encountered in anomaly detection; capabilities on bio-medical data. • Practical solutions and their generalizability; 3.2 Contributed Presentations • The identification of small sub-tasks shared by different applications; 3.2.1 Population-Wide Anomaly Detection • Automating methodologies for anomaly detection; Weng-Keen Wong (the presenter) and his colleagues (Gregory Cooper, Denver Dash, John Levander, John Dowling, William Techniques for assessing anomaly detection • Hogan, and Michael Wagner) have developed an algorithm – approaches; PANDA (Population-wide Anomaly Detection and Assessment) – • Identifying data sets that can be transformed into designed to monitor health-care data and detect the inception of standardized testbeds for anomaly detection algorithms. outbreaks caused by an outdoor, airborne release of inhalational We hope that the presentations and discussions we had during this anthrax. PANDA is basically a causal Bayesian network approach workshop will contribute to near-term steps in our community in capable of incorporating multiple sources of data, domain addressing these issues. knowledge, different types of evidence and, besides detecting the outbreaks, is capable of explaining the evidence that contributes 3. WORKSHOP PRESENTATIONS most likely to its conclusions. The workshop program included two invited talks and fourteen 3.2.2 Strip Mining the Sky: The CTI-II Transit contributed presentations. Telescope Survey All materials related to the workshop are available from the Until the beginning of last century, the term anomaly was used workshop website: http://www.dmargineantu.net/AD-KDD05. exclusively in describing abnormal movement of celestial objects. This talk (given by Peter Zimmer, and co-authored by John 3.1 Invited Talks McGraw and their CTI-II computing collective colleagues from the University of New Mexico) described a large astronomical 3.1.1 Multi-Stage Classification dataset that consists of images (approximately 200 gigapixels per The invited speaker of the morning session of the workshop, was night of operation) collected over a seven year period. Another Ted Senator, a program manager with the Information Processing database of parameters derived from the images, as well as Technology Office (IPTO) of the Defense Advanced Research extensive metadata, are stored. This presentation was a first step Projects Agency of the United States (DARPA). of a challenge coming from our colleagues working in astronomy. Having these databases available, will allow anomaly detection A common problem encountered in automated anomaly or rare- researchers to have a common ground for testing their methods event detection is the large number of false alarms (or false and may help astronomers to discover interesting new space positives) computed by the algorithms. Practice has shown that objects. virtually all techniques that rely on a single stage approach (i.e., a single run of an algorithm) can reduce the number of false 3.2.3 Learning to Live with False Alarms positives only at the (typically very high) expense of not detecting the anomalies. Based on this realization, our invited speaker Chris Drummond and Robert Holte addressed the

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    5 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us