Skip to main content

Classification of Outlier’s Detection Methods Based on Quantitative or Semantic Learning

  • Chapter
  • First Online:
Combating Security Challenges in the Age of Big Data

Abstract

The problem of outliers (Anomalies) detection has been generally presented as a single-minded problem, in which outliers are defined as objects that do not conform to a given definition. In this chapter, we propose a novel taxonomy that groups the methods into two categories: (1) quantitative outlier detection and (2) semantic outlier detection. For quantitative outliers, outliers are defined based on a calculated outlier score. For semantic outliers, there is a conceptual meaning behind the outlier based on the context of the dataset, shifting the focus to finding the anomalous class of data. We also discuss the use of the proposed definition of semantic learning in detecting credit card frauds.

CCS CONCEPTS

Computing methodologies → Anomaly detection

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Agrawal R, Srikant R (1995) Mining sequential patterns. In: Proc. of the 11th Int. Conf. on data engineering, pp 3–14. https://doi.org/10.1016/j.jbi.2007.05.004.

    Article  Google Scholar 

  2. Aleskerov E, Freisleben B, Rao B (1997) Cardwatch : a neural network based database stern for credit card fraud detection. Proc IEEE/IAFE:220–226. https://doi.org/10.1109/CIFER.1997.618940

  3. Bhaduri K, Matthews BL, Giannella CR (2011) Algorithms for speeding up distance-based outlier detection. In: Proceedings of the 17th ACM SIGKDD international conference on knowledge discovery and data mining, pp 859–67. https://doi.org/10.1145/2020408.2020554

  4. Breunig MM, Kriegel H-P, Ng RT, Sander J (2000) LOF: identifying density-based local outliers. In: Proceedings of the 2000 ACM Sigmod international conference on management of data, pp 1–12. https://doi.org/10.1145/335191.335388

    Article  Google Scholar 

  5. Cooper GF, Herskovits E (1992) A Bayesian method for the induction of probabilistic networks from data. Mach Learn 9(4):309–347. https://doi.org/10.1023/A:1022649401552

    Article  MATH  Google Scholar 

  6. Dau HA, Ciesielski V, Song A (2014) Anomaly detection using replicator neural networks trained on examples of one class. Simul Evol Learn:311–322. https://doi.org/10.1007/978-3-642-10439-8_15

    Chapter  Google Scholar 

  7. Duan L, Xu L, Liu Y, Lee J (2009) Cluster-based outlier detection. Ann Oper Res 168(1):151–168. https://doi.org/10.1007/s10479-008-0371-9

    Article  MathSciNet  MATH  Google Scholar 

  8. Hawkins DM (1982) Identification of outliers. Fresenius’ Z Anal Chem 311. https://doi.org/10.1007/BF00635536

  9. Hejazi M, Singh YP (2013) One-class support vector machines approach to anomaly detection. Appl Artif Intell 27(5):351–366. https://doi.org/10.1080/08839514.2013.785791

    Article  Google Scholar 

  10. Jiang F, Sui Y, Cao C (2011) A hybrid approach to outlier detection based on boundary region. Patt Recogn Lett 32(14):1860–1870. https://doi.org/10.1016/j.patrec.2011.07.002

    Article  Google Scholar 

  11. Johnson T, Kwok I, Ng R (1998) Fast computation of 2-dimensional depth contours. Am Assoc Artif Intell 604:224–228

    Google Scholar 

  12. Knorr EM, Ng RT (1998) Algorithms for mining distance-based outliers in large datasets. In: 24th international conference on very large data bases, pp 392–403

    Google Scholar 

  13. Laskov P, Schäfer C, Kotenko I, Müller K-R (2004) Intrusion detection in unlabeled data with quarter-sphere support vector machines. PIK 27(4):228–236. https://doi.org/10.1515/PIKO.2004.228

    Article  Google Scholar 

  14. Lei D, Zhu Q, Chen J, Lin H, Yang P (2012) Information engineering and applications, vol 154. https://doi.org/10.1007/978-1-4471-2386-6

    Book  Google Scholar 

  15. Moore A, Wong W (2003) Optimal reinsertion: a new search operator for accelerated and more accurate Bayesian network structure learning. In: ICML, pp 552–559. http://www.aaai.org/Library/ICML/2003/icml03-073.php

  16. Sam Maes, Tuyls K, Vanschoenwinkel B, Manderick B (1993) Credit card fraud detection using Bayesian and neural network. Interactive Image-Guided Neurosurguery 2:261–270

    Google Scholar 

  17. Schölkopf B (2002) Learning with kernels. J Electrochem Soc 129(November):2865. https://doi.org/10.1198/jasa.2003.s269

    Article  Google Scholar 

  18. Seeja KR, Zareapoor M (2014) FraudMiner: a novel credit card fraud detection model based on frequent itemset mining. Sci World J 2014(August):252797. https://doi.org/10.1155/2014/252797

    Article  Google Scholar 

  19. Shahid N, Naqvi IH, Qaisar SB (2015) One-class support vector machines: analysis of outlier detection for wireless sensor networks in harsh environments. Artif Intell Rev 43(4):515–563. https://doi.org/10.1007/s10462-013-9395-x

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rasha Kashef .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kashef, R., Gencarelli, M., Ibrahim, A. (2020). Classification of Outlier’s Detection Methods Based on Quantitative or Semantic Learning. In: Fadlullah, Z., Khan Pathan, AS. (eds) Combating Security Challenges in the Age of Big Data. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-35642-2_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-35642-2_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-35641-5

  • Online ISBN: 978-3-030-35642-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics