Unit 5
Unit 5
3
Types of Outliers
■ Three kinds: global, contextual and collective outliers
4
Types of Outliers
■ 2. Collective Outliers
■ A subset of data objects collectively deviate
significantly from the whole data set, even if the
individual data objects may not be outliers
■ Applications: E.g., intrusion detection: Collective Outlier
■ When a number of computers keep sending
denial-of-service packages to each other
5
3. Contextual outlier (or conditional outlier)
Object is Oc if it deviates significantly based on a selected context
6
■ Detection of collective outliers
■ Consider not only behavior of individual objects, but also that of
groups of objects
■ Need to have the background knowledge on the relationship
7
Challenges of Outlier Detection
■ Modeling normal objects and outliers properly
■ Hard to count all possible normal behaviors in an application
■ The border between normal and outlier objects is often a gray area
■ Application-specific outlier detection
■ Choice of distance measure among objects and the model of
relationship among objects are often application-dependent
■ E.g., clinic data: a small deviation could be an outlier; while in
marketing analysis, larger fluctuations
■ Handling noise in outlier detection
■ Noise may change the normal objects and blur the distinction
between normal objects and outliers. It may help hide outliers and
reduce the effectiveness of outlier detection
■ Understandability
■ Understand why these are outliers: Justification of the detection
■ Specify the degree of an outlier: the unlikelihood of the object being
generated by a normal mechanism
8
Chapter 12. Outlier Analysis
■ Outlier and Outlier Analysis
■ Outlier Detection Methods
■ Statistical Approaches
■ Proximity-Base Approaches
■ Clustering-Base Approaches
■ Classification Approaches
■ Mining Contextual and Collective Outliers
■ Outlier Detection in High Dimensional Data
■ Summary
9
Outlier Detection I: Supervised Methods
■ Two ways to categorize outlier detection methods:
■ Based on whether user-labeled examples of outliers can be obtained:
■ Supervised, semi-supervised, unsupervised methods
outliers, or
■ Model outliers and treat those not matching the model as normal
■ Challenges
■ Imbalanced classes, i.e., outliers are rare: Boost the outlier class
11
Outlier Detection III: Semi-Supervised Methods
■ Situation: In many applications, the number of labeled data is often
small: Labels could be on outliers only, normal objects only, or both
■ Semi-supervised outlier detection: Regarded as applications of
semi-supervised learning
■ If some labeled normal objects are available
■ Use the labeled examples and the proximate unlabeled objects to
train a model for normal objects
■ Those not fitting the model of normal objects are detected as outliers
■ If only some labeled outliers are available, a small number of labeled
outliers many not cover the possible outliers well
■ To improve the quality of outlier detection, one can get help from
models for normal objects learned from unsupervised methods
12
Outlier Detection (1): Statistical Methods
■ Statistical methods (also known as model-based methods) assume that
the normal data follow some statistical model (a stochastic model)
■ The data not following the model are outliers.
■ Example (right figure): First use Gaussian distribution to
model the normal data
■ For each object y in region R, estimate gD(y), the
probability of y fits the Gaussian distribution
■ If gD(y) is very low, y is unlikely generated by the
Gaussian model, thus an outlier
13
Outlier Detection (2): Proximity-Based Methods
■ An object is an outlier if the nearest neighbors of the object are far
away, i.e., the proximity of the object is significantly deviates from
the proximity of most of the other objects in the same data set
■ Example (right figure): Model the proximity of an
object using its 3 nearest neighbors
■ Objects in region R are substantially different
from other objects in the data set.
■ Thus the objects in R are outliers
■ The effectiveness of proximity-based methods highly relies on the
proximity measure.
■ In some applications, proximity or distance measures cannot be
obtained easily.
■ Often have a difficulty in finding a group of outliers which stay close to
each other
■ Two major types of proximity-based outlier detection
■ Distance-based vs. density-based
14
Outlier Detection (3): Clustering-Based Methods
■ Normal data belong to large and dense clusters, whereas
outliers belong to small or sparse clusters, or do not belong
to any clusters
■ Example (right figure): two clusters
■ All points not in R form a large cluster
■ The two points in R form a tiny cluster,
thus are outliers
■ Since there are many clustering methods, there are many
clustering-based outlier detection methods as well
■ Clustering is expensive: straightforward adaption of a
clustering method for outlier detection can be costly and
does not scale up well for large data sets
15
Chapter 12. Outlier Analysis
■ Outlier and Outlier Analysis
■ Outlier Detection Methods
■ Statistical Approaches
■ Proximity-Base Approaches
■ Clustering-Base Approaches
■ Classification Approaches
■ Mining Contextual and Collective Outliers
■ Outlier Detection in High Dimensional Data
■ Summary
16
Statistical Approaches
■ Statistical approaches assume that the objects in a data set are
generated by a stochastic process (a generative model)
■ Idea: learn a generative model fitting the given data set, and then
identify the objects in low probability regions of the model as outliers
■ Methods are divided into two categories: parametric vs. non-parametric
■ Parametric method
■ Assumes that the normal data is generated by a parametric
distribution with parameter θ
■ The probability density function of the parametric distribution f(x, θ)
gives the probability that object x is generated by the distribution
■ The smaller this value, the more likely x is an outlier
■ Non-parametric method
■ Not assume an a-priori statistical model and determine the model
from the input data
■ Not completely parameter free but consider the number and nature
of the parameters are flexible and not fixed in advance
■ Examples: histogram and kernel density estimation
17
Parametric Methods I: Detection Univariate Outliers
Based on Normal Distribution
■ Univariate data: A data set involving only one attribute or variable
■ Often assume that data are generated from a normal distribution, learn
the parameters from the input data, and identify the points with low
probability as outliers
■ Ex: Avg. temp.: {24.0, 28.9, 28.9, 29.0, 29.1, 29.1, 29.2, 29.2, 29.3,
29.4}
■ Use the maximum likelihood method to estimate μ and σ
18
Parametric Methods I: The Grubb’s Test
■ Univariate outlier detection: The Grubb's test (maximum normed residual
test) ─ another statistical method under normal distribution
■ For each object x in a data set, compute its z-score: x is an outlier if
19
Parametric Methods II: Detection of
Multivariate Outliers
■ Multivariate data: A data set involving two or more attributes or
variables
■ Transform the multivariate outlier detection task into a univariate
outlier detection problem
■ Method 1. Compute Mahalaobis distance
■ Let ō be the mean vector for a multivariate data set. Mahalaobis
distance for an object o to ō is MDist(o, ō) = (o – ō )T S –1(o – ō)
where S is the covariance matrix
■ Use the Grubb's test on this measure to detect outliers
■ Method 2. Use χ2 –statistic:
■ where Ei is the mean of the i-dimension among all objects, and n is
the dimensionality
■ If χ2 –statistic is large, then object oi is an outlier
20
Parametric Methods III: Using Mixture of Parametric
Distributions
■ Assuming data generated by a normal distribution
could be sometimes overly simplified
■ Example (right figure): The objects between the two
clusters cannot be captured as outliers since they
are close to the estimated mean
■ To overcome this problem, assume the normal data is generated by two
normal distributions. For any object o in the data set, the probability that
o is generated by the mixture of the two distributions is given by
where fθ1 and fθ2 are the probability density functions of θ1 and θ2
■ Then use EM algorithm to learn the parameters μ1, σ1, μ2, σ2 from data
■ An object o is an outlier if it does not belong to any cluster
21
Non-Parametric Methods: Detection Using Histogram
■ The model of normal data is learned from the
input data without any a priori structure.
■ Often makes fewer assumptions about the data,
and thus can be applicable in more scenarios
■ Outlier detection using histogram:
■ Figure shows the histogram of purchase amounts in transactions
■ A transaction in the amount of $7,500 is an outlier, since only 0.2%
transactions have an amount higher than $5,000
■ Problem: Hard to choose an appropriate bin size for histogram
■ Too small bin size → normal objects in empty/rare bins, false positive
■ Too big bin size → outliers in some frequent bins, false negative
■ Solution: Adopt kernel density estimation to estimate the probability
density distribution of the data. If the estimated density function is high,
the object is likely normal. Otherwise, it is likely an outlier.
22
Chapter 12. Outlier Analysis
■ Outlier and Outlier Analysis
■ Outlier Detection Methods
■ Statistical Approaches
■ Proximity-Base Approaches
■ Clustering-Base Approaches
■ Classification Approaches
■ Mining Contextual and Collective Outliers
■ Outlier Detection in High Dimensional Data
■ Summary
23
Proximity-Based Approaches: Distance-Based vs.
Density-Based Outlier Detection
■ Intuition: Objects that are far away from the others are
outliers
■ Assumption of proximity-based approach: The proximity of
an outlier deviates significantly from that of most of the
others in the data set
■ Two types of proximity-based outlier detection methods
■ Distance-based outlier detection: An object o is an
outlier if its neighborhood does not have enough other
points
■ Density-based outlier detection: An object o is an outlier
if its density is relatively much lower than that of its
neighbors
24
Distance-Based Outlier Detection
■ For each object o, examine the # of other objects in the r-neighborhood
of o, where r is a user-specified distance threshold
■ An object o is an outlier if most (taking π as a fraction threshold) of
the objects in D are far away from o, i.e., not in the r-neighborhood of o
■ The lower the local reachability density of o, and the higher the local
reachability density of the kNN of o, the higher LOF
■ This captures a local outlier whose local density is relatively low
comparing to the local densities of its kNN
28
Chapter 12. Outlier Analysis
■ Outlier and Outlier Analysis
■ Outlier Detection Methods
■ Statistical Approaches
■ Proximity-Base Approaches
■ Clustering-Base Approaches
■ Classification Approaches
■ Mining Contextual and Collective Outliers
■ Outlier Detection in High Dimensional Data
■ Summary
29
Clustering-Based Outlier Detection (1 & 2):
Not belong to any cluster, or far from the closest one
■ An object is an outlier if (1) it does not belong to any cluster, (2) there is
a large distance between the object and its closest cluster , or (3) it
belongs to a small or sparse cluster
■ Case I: Not belong to any cluster
■ Identify animals not part of a flock: Using a
density-based clustering method such as DBSCAN
■ Case 2: Far from its closest cluster
■ Using k-means, partition data points of into clusters
■ For each object o, assign an outlier score based on
its distance from its closest center
■ If dist(o, c )/avg_dist(c ) is large, likely an outlier
o o
■ Ex. Intrusion detection: Consider the similarity between
data points and the clusters in a training data set
■ Use a training set to find patterns of “normal” data, e.g., frequent
itemsets in each segment, and cluster similar connections into groups
■ Compare new data points with the clusters mined—Outliers are
possible attacks 30
Clustering-Based Outlier Detection (3):
Detecting Outliers in Small Clusters
■ FindCBLOF: Detect outliers in small clusters
■ Find clusters, and sort them in decreasing size
■ To each data point, assign a cluster-based local
outlier factor (CBLOF):
■ If obj p belongs to a large cluster, CBLOF =
cluster_size X similarity between p and cluster
■ If p belongs to a small one, CBLOF = cluster size
X similarity betw. p and the closest large cluster
■ Ex. In the figure, o is outlier since its closest large cluster is C1, but the
similarity between o and C1 is small. For any point in C3, its closest
large cluster is C2 but its similarity from C2 is low, plus |C3| = 3 is small
31
Clustering-Based Method: Strength and Weakness
■ Strength
■ Detect outliers without requiring any labeled data
■ Work for many types of data
■ Clusters can be regarded as summaries of the data
■ Once the cluster are obtained, need only compare any object
against the clusters to determine whether it is an outlier (fast)
■ Weakness
■ Effectiveness depends highly on the clustering method used—they
may not be optimized for outlier detection
■ High computational cost: Need to first find clusters
■ A method to reduce the cost: Fixed-width clustering
■ A point is assigned to a cluster if the center of the cluster is
37
Mining Contextual Outliers II: Modeling Normal
Behavior with Respect to Contexts
■ In some applications, one cannot clearly partition the data into contexts
■ Ex. if a customer suddenly purchased a product that is unrelated to
those she recently browsed, it is unclear how many products
browsed earlier should be considered as the context
■ Model the “normal” behavior with respect to contexts
■ Using a training data set, train a model that predicts the expected
behavior attribute values with respect to the contextual attribute
values
■ An object is a contextual outlier if its behavior attribute values
significantly deviate from the values predicted by the model
■ Using a prediction model that links the contexts and behavior, these
methods avoid the explicit identification of specific contexts
■ Methods: A number of classification and prediction techniques can be
used to build such models, such as regression, Markov Models, and
Finite State Automaton
38
Mining Collective Outliers I: On the Set of
“Structured Objects”
■ Collective outlier if objects as a group deviate
significantly from the entire data
■ Need to examine the structure of the data set, i.e, the
relationships between multiple data objects
■ Each of these structures is inherent to its respective type of data
■ For temporal data (such as time series and sequences), we explore
the structures formed by time, which occur in segments of the time
series or subsequences
■ For spatial data, explore local areas
■ For graph and network data, we explore subgraphs
■ Difference from the contextual outlier detection: the structures are often
not explicitly defined, and have to be discovered as part of the outlier
detection process.
■ Collective outlier detection methods: two categories
■ Reduce the problem to conventional outlier detection
■ Identify structure units, treat each structure unit (e.g.,
subsequence, time series segment, local area, or subgraph) as
a data object, and extract features
■ Then outlier detection on the set of “structured objects”
constructed as such using the extracted features
39
Mining Collective Outliers II: Direct Modeling of the
Expected Behavior of Structure Units
■ Models the expected behavior of structure units directly
■ Ex. 1. Detect collective outliers in online social network of customers
■ Treat each possible subgraph of the network as a structure unit
■ Collective outlier: An outlier subgraph in the social network
■ Small subgraphs that are of very low frequency
42
Approach I: Extending Conventional Outlier Detection
■ Method 1: Detect outliers in the full space, e.g., HilOut Algorithm
■ Find distance-based outliers, but use the ranks of distance instead of
the absolute distance in outlier detection
■ For each object o, find its k-nearest neighbors: nn1(o), . . . , nnk(o)
■ The weight of object o:
■ The more negative, the sparser C is and the more likely the
47