0% found this document useful (0 votes)
10 views

Outliers Intrusion Detection: Anomaly Detection, Also Referred To As Outlier Detection

Anomaly detection refers to finding patterns in data that do not conform to normal behavior. These anomalous patterns can provide important information for various applications. There are three main categories of anomaly detection techniques: unsupervised techniques detect anomalies in unlabeled data by finding instances that are dissimilar to most other data; supervised techniques are trained on labeled normal and abnormal data to classify new data; and semisupervised techniques build a model of normal behavior from a normal training set and test how likely new instances are based on the model.

Uploaded by

123shweta
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

Outliers Intrusion Detection: Anomaly Detection, Also Referred To As Outlier Detection

Anomaly detection refers to finding patterns in data that do not conform to normal behavior. These anomalous patterns can provide important information for various applications. There are three main categories of anomaly detection techniques: unsupervised techniques detect anomalies in unlabeled data by finding instances that are dissimilar to most other data; supervised techniques are trained on labeled normal and abnormal data to classify new data; and semisupervised techniques build a model of normal behavior from a normal training set and test how likely new instances are based on the model.

Uploaded by

123shweta
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Anomaly detection, also referred to as outlier detection refers to detecting patterns in a given data [2] set that do not

conform to an established normal behavior. The patterns thus detected are called anomalies and often translate to critical and actionable information in several application domains. Anomalies are also referred to as outliers, change, deviation, surprise, aberrant, peculiarity, intrusion, etc. In particular in the context of abuse and network intrusion detection, the interesting objects are often not rare objects, but unexpected bursts in activity. This pattern does not adhere to the common statistical definition of an outlier as a rare object, and many outlier detection methods (in particular unsupervised methods) will fail on such data, unless it has been aggregated appropriately. Instead, a cluster [3] analysis algorithm may be able to detect the micro clusters formed by these patterns. Three broad categories of anomaly detection techniques exist. Unsupervised anomaly detection techniques detect anomalies in an unlabeled test data set under the assumption that the majority of the instances in the data set are normal by looking for instances that seem to fit least to the remainder of the data set. Supervised anomaly detection techniques require a data set that has been labeled as "normal" and "abnormal" and involves training a classifier (the key difference to many other statistical classification problems is the inherent unbalanced nature of outlier detection). Semisupervised anomaly detection techniques construct a model representing normal behavior from a given normal training data set, and then testing the likelihood of a test instance to be generated by the learnt model

[1]

You might also like