Skip to main content

Anomaly Detection via Over-Sampling Principal Component Analysis

  • Chapter

Part of the book series: Studies in Computational Intelligence ((SCI,volume 199))

Abstract

Outlier detection is an important issue in datamining and has been studied in different research areas. It can be used for detecting the small amount of deviated data. In this article, we use “Leave One Out” procedure to check each individual point the “with or without” effect on the variation of principal directions. Based on this idea, an over-sampling principal component analysis outlier detection method is proposed for emphasizing the influence of an abnormal instance (or an outlier). Except for identifying the suspicious outliers, we also design an on-line anomaly detection to detect the new arriving anomaly. In addition, we also study the quick updating of the principal directions for the effective computation and satisfying the on-line detecting demand. Numerical experiments show that our proposed method is effective in computation time and anomaly detection.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Asuncion, A., Newman, D.J.: UCI repository of machine learning databases (2007), http://www.ics.uci.edu/~mlearn/mlrepository.html

  2. Bradley, A.P.: The use of the area under the ROC curve in the evaluation of machine learning algorithms. Pattern Recognition 30, 1145–1159 (1997)

    Article  Google Scholar 

  3. Breunig, M.M., Kriegel, H.-P., Ng, R., Sander, J.: LOF: Identifying density-based local outliers. In: Proc. of the 2000 ACM SIGMOD Int. Conf. on Management of Data, Dallas, Texas (2000)

    Google Scholar 

  4. Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Computing Surveys (2009)

    Google Scholar 

  5. Erdogmus, D., Rao, Y., Peddaneni, H., Hegde, A., Principe, J.C.: Recursive principal components analysis using eigenvector matrix perturbation. Journal of Applied Signal Process 13, 2034–2041 (2004)

    Article  Google Scholar 

  6. Golub, G.H., Van Loan, C.F.: Matrix Computations. Johns Hopkins University Press, Baltimore (1983)

    MATH  Google Scholar 

  7. Hawkins, D.: Identification of Outliers. Chapman and Hall, London (1980)

    MATH  Google Scholar 

  8. Huang, L., Nguyen, X., Garofalakis, M., Jordan, M.I., Joseph, A., Taft, N.: In-network pca and anomaly detection. In: Advances in Neural Information Processing Systems, vol. 19, pp. 617–624. MIT Press, Cambridge (2007)

    Google Scholar 

  9. Kriegel, H.-P., Schubert, M., Zimek, A.: Angle-based outlier detection. In: Proc. of 14th ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, Las Vegas, NV (2008)

    Google Scholar 

  10. KDD Cup 1999 Data (August 2003), http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html

  11. Lazarevic, A., Ertoz, L., Kumar, V., Ozgur, A., Srivastava, J.: A comparative study of anomaly detection schemes in network intrusion detection. In: Proc. of the Third SIAM Conference on Data Mining (2003)

    Google Scholar 

  12. Rawat, S., Gulati, V.P., Pujari, A.K.: On the use of singular value decomposition for a fast intrusion detection system. Electronic Notes in Theoretical Computer Science 142, 215–228 (2006)

    Article  Google Scholar 

  13. Wang, W., Guan, X., Zhang, X.: A novel intrusion detection method based on principal component analysis in computer security. In: Proceedings of the International Symposium on Neural Networks, Dalian, China, pp. 657–662 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Yeh, YR., Lee, ZY., Lee, YJ. (2009). Anomaly Detection via Over-Sampling Principal Component Analysis. In: Nakamatsu, K., Phillips-Wren, G., Jain, L.C., Howlett, R.J. (eds) New Advances in Intelligent Decision Technologies. Studies in Computational Intelligence, vol 199. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00909-9_43

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-00909-9_43

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-00908-2

  • Online ISBN: 978-3-642-00909-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics