Unit V Outlier 2
Unit V Outlier 2
Analysis
Identifying
Outliers
Global outliers
Contextual Outliers
Collective Outliers
Outliers Types:-
Global outliers
Examples:-
◦ Global outlier detection is important in many applications. Consider intrusion detection
in computer networks, for example.
◦ If the communication behavior of a computer is very different from the normal patterns
(e.g., a large number of packages is broadcast in a short time), this behavior may be
considered as a global outlier and the corresponding computer is a suspected victim of
hacking.
◦ In trading transaction auditing systems, transactions that do not follow the regulations
are considered as global outliers and should be held for further examination.
Outliers Types:-
Contextual Outliers
Therefore, in contextual outlier detection, the context has to be specified as part of the
problem definition.
Generally, in contextual outlier detection, the attributes of the data objects in question are
divided into two groups:
◦ Contextual attributes: The contextual attributes of a data object define the object’s context.
In the temperature example, the contextual attributes may be date and location.
◦ Behavioral attributes: These define the object’s characteristics, and are used to evaluate
whether the object is an outlier in the context to which it belongs. In the temperature
example, the behavioral attributes may be the temperature, humidity, and pressure.
Identifying Outliers- Collective Outliers
◦ Given a data set, a subset of data objects forms a collective outlier, if the objects as a
whole deviate significantly from the entire data set.
Unlike other outliers, in collective outlier detection, we have to consider not only the
behavior of individual objects, but also that of groups of objects.
Outlier detection (also known as anomaly detection) is the process of finding data
objects with behaviors that are very different from expectation.
Such objects are called outliers or anomalies.
Outlier detection is important in many applications in addition to fraud detection
such as medical care, public safety and security, industry damage detection, image
processing, sensor/video network surveillance, and intrusion detection.
* Challenges of Outlier Detection *
Understandability
End