- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
异常检测方法简介Anomaly Detection A Tutorial
Anomaly Detection: A Tutorial Arindam Banerjee, Varun Chandola, Vipin Kumar, Jaideep Srivastava University of Minnesota Aleksandar Lazarevic United Technology Research Center Outline Introduction Aspects of Anomaly Detection Problem Applications Different Types of Anomaly Detection Case Studies Discussion and Conclusions Introduction We are drowning in the deluge of data that are being collected world-wide, while starving for knowledge at the same time* Anomalous events occur relatively infrequently However, when they do occur, their consequences can be quite dramatic and quite often in a negative sense What are Anomalies? Anomaly is a pattern in the data that does not conform to the expected behavior Also referred to as outliers, exceptions, peculiarities, surprise, etc. Anomalies translate to significant (often critical) real life entities Cyber intrusions Credit card fraud Real World Anomalies Credit Card Fraud An abnormally high purchase made on a credit card Cyber Intrusions A web server involved in ftp traffic Simple Example N1 and N2 are regions of normal behavior Points o1 and o2 are anomalies Points in region O3 are anomalies Related problems Rare Class Mining Chance discovery Novelty Detection Exception Mining Noise Removal Black Swan* Key Challenges Defining a representative normal region is challenging The boundary between normal and outlying behavior is often not precise The exact notion of an outlier is different for different application domains Availability of labeled data for training/validation Malicious adversaries Data might contain noise Normal behavior keeps evolving Aspects of Anomaly Detection Problem Nature of input data Availability of supervision Type of anomaly: point, contextual, structural Output of anomaly detection Evaluation of anomaly detection techniques Input Data Most common form of data handled by anomaly detection techniques is Record Data Univariate Multivariate Input Data – Nature of Attributes Nature of attributes
您可能关注的文档
- 开心学英语四年级第五课.ppt
- 引水竖井滑模安装脚手架搭设安全技术措施.doc
- 开发区太阳能路灯实验段设计方案0917.doc
- 引物设计原则及PP5.0设计软件.ppt
- 引语评论作文写作.ppt
- 引江济汉工程渠线比.ppt
- 引导文教学方法.ppt
- 弟子规双语版.docx
- 引入 第1节 大气层 (第一课时).ppt
- 张一凡专业英语.ppt
- 张保红——文学翻译.ppt
- 张家港市2013-2014学年八年级第二学期期末英语.doc
- 开源组合-openstack与cloudfoundry的组合介绍.pptx
- 张亚萍课件.ppt
- 张汉熙高级英语第一册第一课 课件.ppt
- 张汉熙高级英语第二册第一课课件Face with Hurricane Camille.ppt
- 张志敏英语课件I_can_run_fast.ppt
- 张汉熙高级英语第二册课文答案lesson one Face to Face with Hurricane Camille.ppt
- 张泰英语一轮资料.ppt
- 张汉熙高级英语第一册第一课课件the middle eastern bazzar.ppt
最近下载
- 八年级上名著《红岩》第10章(讲练测).docx VIP
- 表面处理技术在高端装备制造中的应用与挑战报告2025.docx
- 汪曾祺《钓鱼大夫》阅读答案试题解析理解 .pdf VIP
- 家庭反暴强制报告制度及服务流程.docx VIP
- 聚醚多元醇企业标准.pdf VIP
- 八年级上名著《红岩》第11章(讲练测).docx VIP
- T_CIATCM 093—2020_基层医疗卫生机构中医诊疗区(中医馆)团体标准远程会诊系统建设指南中国中医药信息学会.pdf VIP
- 八年级上名著《红岩》第12章(讲练测).docx VIP
- 2025国投生物制造创新研究院有限公司招聘(31人)考试备考试题及答案解析.docx VIP
- 边坡位移监测记录表.xlsx VIP
文档评论(0)