Incorporating Expert Feedback into Active Anomaly Discovery

Unsupervised anomaly detection algorithms search for outliers and then predict that these outliers are the anomalies. When deployed, however, these algorithms are often criticized for high false positive and high false negative rates. One cause of poor performance is that not all outliers are anomal...

Full description

Saved in:
Bibliographic Details
Published in2016 IEEE 16th International Conference on Data Mining (ICDM) pp. 853 - 858
Main Authors Das, Shubhomoy, Weng-Keen Wong, Dietterich, Thomas, Fern, Alan, Emmott, Andrew
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.12.2016
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Unsupervised anomaly detection algorithms search for outliers and then predict that these outliers are the anomalies. When deployed, however, these algorithms are often criticized for high false positive and high false negative rates. One cause of poor performance is that not all outliers are anomalies and not all anomalies are outliers. In this paper, we describe an Active Anomaly Discovery (AAD) method for incorporating expert feedback to adjust the anomaly detector so that the outliers it discovers are more in tune with the expert user's semantic understanding of the anomalies. The AAD approach is designed to operate in an interactive data exploration loop. In each iteration of this loop, our algorithm first selects a data instance to present to the expert as a potential anomaly and then the expert labels the instance as an anomaly or as a nominal data point. Our algorithm updates its internal model with the instance label and the loop continues until a budget of B queries is spent. The goal of our approach is to maximize the total number of true anomalies in the B instances presented to the expert. We show that when compared to other state-of-the-art algorithms, AAD is consistently one of the best performers.
AbstractList Unsupervised anomaly detection algorithms search for outliers and then predict that these outliers are the anomalies. When deployed, however, these algorithms are often criticized for high false positive and high false negative rates. One cause of poor performance is that not all outliers are anomalies and not all anomalies are outliers. In this paper, we describe an Active Anomaly Discovery (AAD) method for incorporating expert feedback to adjust the anomaly detector so that the outliers it discovers are more in tune with the expert user's semantic understanding of the anomalies. The AAD approach is designed to operate in an interactive data exploration loop. In each iteration of this loop, our algorithm first selects a data instance to present to the expert as a potential anomaly and then the expert labels the instance as an anomaly or as a nominal data point. Our algorithm updates its internal model with the instance label and the loop continues until a budget of B queries is spent. The goal of our approach is to maximize the total number of true anomalies in the B instances presented to the expert. We show that when compared to other state-of-the-art algorithms, AAD is consistently one of the best performers.
Author Das, Shubhomoy
Emmott, Andrew
Weng-Keen Wong
Fern, Alan
Dietterich, Thomas
Author_xml – sequence: 1
  givenname: Shubhomoy
  surname: Das
  fullname: Das, Shubhomoy
  email: dassh@oregonstate.edu
  organization: Oregon State Univ., Corvallis, OR, USA
– sequence: 2
  surname: Weng-Keen Wong
  fullname: Weng-Keen Wong
  email: wongwe@oregonstate.edu
  organization: Oregon State Univ., Corvallis, OR, USA
– sequence: 3
  givenname: Thomas
  surname: Dietterich
  fullname: Dietterich, Thomas
  email: tgd@oregonstate.edu
  organization: Oregon State Univ., Corvallis, OR, USA
– sequence: 4
  givenname: Alan
  surname: Fern
  fullname: Fern, Alan
  email: alan.fern@oregonstate.edu
  organization: Oregon State Univ., Corvallis, OR, USA
– sequence: 5
  givenname: Andrew
  surname: Emmott
  fullname: Emmott, Andrew
  email: emmotta@oregonstate.edu
  organization: Oregon State Univ., Corvallis, OR, USA
BookMark eNp9ybsOgjAUANCr0cQXq4tLfwC8pUAhTkYgOri5k4pXUx8tKcTI37s4O53hzGBkrCGAJceAc8zWh11-DELkSYAcwwF4mUx5jBnGkRThEKahkJGfRmkygVnb3hFFkgicwuZgausa61SnzY0Vn4Zcx0qiy1nVD6ZNZ9m27vSb2NbYl3r2LNdtbd_k-gWMr-rZkvdzDquyOO32viaiqnH6pVxfyVTIjMfi_34B5lM5_w
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICDM.2016.0102
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library Online
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library Online
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 9781509054732
1509054731
EISSN 2374-8486
EndPage 858
ExternalDocumentID 7837915
Genre orig-research
GroupedDBID 29O
6IE
6IF
6IH
6IK
6IL
6IN
AAJGR
ABLEC
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IPLJI
M43
OCL
RIE
RIL
RNS
ID FETCH-ieee_primary_78379153
IEDL.DBID RIE
IngestDate Wed Jun 26 19:23:55 EDT 2024
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-ieee_primary_78379153
ParticipantIDs ieee_primary_7837915
PublicationCentury 2000
PublicationDate 2016-Dec.
PublicationDateYYYYMMDD 2016-12-01
PublicationDate_xml – month: 12
  year: 2016
  text: 2016-Dec.
PublicationDecade 2010
PublicationTitle 2016 IEEE 16th International Conference on Data Mining (ICDM)
PublicationTitleAbbrev ICDM
PublicationYear 2016
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0036630
Score 3.3043506
Snippet Unsupervised anomaly detection algorithms search for outliers and then predict that these outliers are the anomalies. When deployed, however, these algorithms...
SourceID ieee
SourceType Publisher
StartPage 853
SubjectTerms active learning
Algorithm design and analysis
Anomaly detection
Data models
Detection algorithms
Detectors
Feature extraction
Linear programming
Mathematical model
user feedback
Title Incorporating Expert Feedback into Active Anomaly Discovery
URI https://ieeexplore.ieee.org/document/7837915
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjZ3BT4MwFMZf5k6e5tyMOjU9eLRs0go0Oy2bZDPBeNBkt6WUkixTMAqH-dfbV2BGs4O3hrTw0oa-Qr_vV4Brxi1jRNHE04JyrhiVInGpYimXfiC4sDiG6NGbv_CH5d2yBTc7L4zW2orPtINFu5ef5KrEX2VD33xNCXSUH_hCVF6tZtZlJnOOaijj7UgMF9NZhMItz0Fo2q-jU2zmCDsQNc-sBCMbpyxiR339wTH-N6gj6P949MjTLvt0oaWzY-g0hzSQ-p3twXiBpEpLKzb1iEUbFyQ0zWKpNmSdFTmZ2EmPTLL8Tb5uyWz9qVDZue3DILx_ns4pxrN6r8AUqzoUdgLtLM_0KRDlY6cHnOtU8SBBY20qzZIvNuswN3XZGfT23eF8_-UBHGKXVmqOC2gXH6W-NDm5iK_sYHwDEYOQ3w
link.rule.ids 310,311,783,787,792,793,799,27937,55086
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjZ3PT4MwFMdflnnQ09TNqPNHDx6FTVqBxtOySUDH4mEmuxEoJVk2wWg5zL_etsCMZgdvhEB5KWnfg36_nwLcYKIZI8xIbU4NQhg2YppaBsMZiR2XEqpxDOHM9l_J0-J-0YLbrReGc67FZ9xUh3otPy1YqX6VDRz5NUWVo3xP1tWuXbm1mnkXy9w5rLGMd0M6CMaTUEm3bFNh035tnqJzh9eBsHlqJRlZmaVITPb1B8j437AOoffj0kMv2_xzBC2eH0On2aYB1aO2Cw-BYlVqXrG8Dmm4sUCevC2J2Qotc1GgkZ720Cgv3uL1Bk2Wn0xpOzc96HuP87FvqHii9wpNEdWh4BNo50XOTwExR3W7SwjPGHFTZa3NYln0JbISszILn0F3Vwvnu09fw74_D6fRNJg99-FAdW-l7biAtvgo-aXM0CK50i_mG9N4lCo
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2016+IEEE+16th+International+Conference+on+Data+Mining+%28ICDM%29&rft.atitle=Incorporating+Expert+Feedback+into+Active+Anomaly+Discovery&rft.au=Das%2C+Shubhomoy&rft.au=Weng-Keen+Wong&rft.au=Dietterich%2C+Thomas&rft.au=Fern%2C+Alan&rft.date=2016-12-01&rft.pub=IEEE&rft.eissn=2374-8486&rft.spage=853&rft.epage=858&rft_id=info:doi/10.1109%2FICDM.2016.0102&rft.externalDocID=7837915