Abstract
The problem of outliers (Anomalies) detection has been generally presented as a single-minded problem, in which outliers are defined as objects that do not conform to a given definition. In this chapter, we propose a novel taxonomy that groups the methods into two categories: (1) quantitative outlier detection and (2) semantic outlier detection. For quantitative outliers, outliers are defined based on a calculated outlier score. For semantic outliers, there is a conceptual meaning behind the outlier based on the context of the dataset, shifting the focus to finding the anomalous class of data. We also discuss the use of the proposed definition of semantic learning in detecting credit card frauds.
CCS CONCEPTS
Computing methodologies → Anomaly detection
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Agrawal R, Srikant R (1995) Mining sequential patterns. In: Proc. of the 11th Int. Conf. on data engineering, pp 3–14. https://doi.org/10.1016/j.jbi.2007.05.004.
Aleskerov E, Freisleben B, Rao B (1997) Cardwatch : a neural network based database stern for credit card fraud detection. Proc IEEE/IAFE:220–226. https://doi.org/10.1109/CIFER.1997.618940
Bhaduri K, Matthews BL, Giannella CR (2011) Algorithms for speeding up distance-based outlier detection. In: Proceedings of the 17th ACM SIGKDD international conference on knowledge discovery and data mining, pp 859–67. https://doi.org/10.1145/2020408.2020554
Breunig MM, Kriegel H-P, Ng RT, Sander J (2000) LOF: identifying density-based local outliers. In: Proceedings of the 2000 ACM Sigmod international conference on management of data, pp 1–12. https://doi.org/10.1145/335191.335388
Cooper GF, Herskovits E (1992) A Bayesian method for the induction of probabilistic networks from data. Mach Learn 9(4):309–347. https://doi.org/10.1023/A:1022649401552
Dau HA, Ciesielski V, Song A (2014) Anomaly detection using replicator neural networks trained on examples of one class. Simul Evol Learn:311–322. https://doi.org/10.1007/978-3-642-10439-8_15
Duan L, Xu L, Liu Y, Lee J (2009) Cluster-based outlier detection. Ann Oper Res 168(1):151–168. https://doi.org/10.1007/s10479-008-0371-9
Hawkins DM (1982) Identification of outliers. Fresenius’ Z Anal Chem 311. https://doi.org/10.1007/BF00635536
Hejazi M, Singh YP (2013) One-class support vector machines approach to anomaly detection. Appl Artif Intell 27(5):351–366. https://doi.org/10.1080/08839514.2013.785791
Jiang F, Sui Y, Cao C (2011) A hybrid approach to outlier detection based on boundary region. Patt Recogn Lett 32(14):1860–1870. https://doi.org/10.1016/j.patrec.2011.07.002
Johnson T, Kwok I, Ng R (1998) Fast computation of 2-dimensional depth contours. Am Assoc Artif Intell 604:224–228
Knorr EM, Ng RT (1998) Algorithms for mining distance-based outliers in large datasets. In: 24th international conference on very large data bases, pp 392–403
Laskov P, Schäfer C, Kotenko I, Müller K-R (2004) Intrusion detection in unlabeled data with quarter-sphere support vector machines. PIK 27(4):228–236. https://doi.org/10.1515/PIKO.2004.228
Lei D, Zhu Q, Chen J, Lin H, Yang P (2012) Information engineering and applications, vol 154. https://doi.org/10.1007/978-1-4471-2386-6
Moore A, Wong W (2003) Optimal reinsertion: a new search operator for accelerated and more accurate Bayesian network structure learning. In: ICML, pp 552–559. http://www.aaai.org/Library/ICML/2003/icml03-073.php
Sam Maes, Tuyls K, Vanschoenwinkel B, Manderick B (1993) Credit card fraud detection using Bayesian and neural network. Interactive Image-Guided Neurosurguery 2:261–270
Schölkopf B (2002) Learning with kernels. J Electrochem Soc 129(November):2865. https://doi.org/10.1198/jasa.2003.s269
Seeja KR, Zareapoor M (2014) FraudMiner: a novel credit card fraud detection model based on frequent itemset mining. Sci World J 2014(August):252797. https://doi.org/10.1155/2014/252797
Shahid N, Naqvi IH, Qaisar SB (2015) One-class support vector machines: analysis of outlier detection for wireless sensor networks in harsh environments. Artif Intell Rev 43(4):515–563. https://doi.org/10.1007/s10462-013-9395-x
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Kashef, R., Gencarelli, M., Ibrahim, A. (2020). Classification of Outlier’s Detection Methods Based on Quantitative or Semantic Learning. In: Fadlullah, Z., Khan Pathan, AS. (eds) Combating Security Challenges in the Age of Big Data. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-35642-2_3
Download citation
DOI: https://doi.org/10.1007/978-3-030-35642-2_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-35641-5
Online ISBN: 978-3-030-35642-2
eBook Packages: Computer ScienceComputer Science (R0)