AIDA: Analytic isolation and distance-based anomaly detection algorithm
نویسندگان
چکیده
Many unsupervised anomaly detection algorithms rely on the concept of nearest neighbours to compute scores. Such are popular because there no assumptions about data, making them a robust choice for unstructured datasets. However, number (k) neighbours, which critically affects model performance, cannot be tuned in an setting. Hence, we propose new and parameter-free Analytic Isolation Distance-based Anomaly (AIDA) algorithm, that combines metrics distance with isolation. Based AIDA, also introduce Tempered Isolation-based eXplanation (TIX) identifies most relevant features characterizing outlier, even large multi-dimensional datasets, improving overall explainability mechanism. Both AIDA TIX thoroughly tested compared state-of-the-art alternatives, proving useful additions existing set tools detection.
منابع مشابه
3D Gabor Based Hyperspectral Anomaly Detection
Hyperspectral anomaly detection is one of the main challenging topics in both military and civilian fields. The spectral information contained in a hyperspectral cube provides a high ability for anomaly detection. In addition, the costly spatial information of adjacent pixels such as texture can also improve the discrimination between anomalous targets and background. Most studies miss the wort...
متن کاملAn Algorithm for Anomaly-based Botnet Detection
We present an anomaly-based algorithm for detecting IRC-based botnet meshes. The algorithm combines an IRC mesh detection component with a TCP scan detection heuristic called the TCP work weight. The IRC component produces two tuples, one for determining the IRC mesh based on IP channel names, and a sub-tuple which collects statistics (including the TCP work weight) on individual IRC hosts in c...
متن کاملImportance of Scaling in Unsupervised Distance-based Anomaly Detection
− One of the key applications in mobile network monitoring is to detect anomalous phenomena in the network. Distance-based methods are commonly used in unsupervised anomaly detection. The results are dependent on the distance metrics used and the scaling of the variables. In many cases very simple methods can provide sufficient performance if the variables have been scaled properly. In this pap...
متن کاملAnomaly Based Intrusion Detection Based on the Junction Tree Algorithm
The aim of this paper is to present a methodology for the attacks recognition during the normal activities in the system. Since the proposed approach uses the graphical representation method, we apply the junction tree algorithm (JTA). Some results from the accomplished simulation experiments are submitted as well.
متن کاملA Distance-based Kernel Change Detection Algorithm
This paper proposes a distance-based kernel change detection algorithm (DKCD). The input vectors from two images of different times are mapped into a potentially much higher dimensional feature space via a nonlinear mapping. Which will usually increase the linear separation of change and no-change regions. Then, a simple linear distance measure between two feature vectors of high dimension is d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Pattern Recognition
سال: 2023
ISSN: ['1873-5142', '0031-3203']
DOI: https://doi.org/10.1016/j.patcog.2023.109607