Approaches to Abnormality Detection with Constraints
Main Author: | |
---|---|
Language: | English |
Published: |
The Ohio State University / OhioLINK
2006
|
Subjects: | |
Online Access: | http://rave.ohiolink.edu/etdc/view?acc_num=osu1150484039 |
id |
ndltd-OhioLink-oai-etd.ohiolink.edu-osu1150484039 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-OhioLink-oai-etd.ohiolink.edu-osu11504840392021-08-03T05:51:18Z Approaches to Abnormality Detection with Constraints Otey, Matthew Eric Computer Science abnormality detection anomaly detection signature detection outlier detection data mining A common problem in data analysis is that of discriminating between modes of normal behavior and modes of abnormal behavior. Of particular interest are techniques that can automatically detect abnormal activity in data. This is important since abnormal data may be indicative of measurement error in scientific data, or malicious activity in security audit data. There are two basic approaches to the problem of automatically finding abnormalities. The first is known as signature detection, which involves finding known patterns of abnormality in a database. However, it has the drawback of not being able to detect abnormalities for which there is no prior information. The second approach is known as anomaly detection, which involves building a model of normal data and then searching for patterns that do not fit this model. Unlike the signature detection approach, it is able to detect abnormalities for which there is no prior information, but has the drawback that the anomalies it does detect may not be (significantly) abnormal. The most successful approaches will use both signature detection and anomaly detection techniques to utilize their combined strengths. Much of the previous research in this area has focused on more general approaches to anomaly and signature detection. However, this work is focused on carrying out anomaly and signature detection under various constraints. For example, the data may contain heterogeneous attribute types, or have missing values. The data may also be distributed across several computers or streaming in at a high rate of speed, or there may be limitations on the resources available to analyze the data. In this work, we develop novel solutions to the abnormality detection problem with constraints, and empirically test them on various real and synthetic data sets. 2006-09-12 English text The Ohio State University / OhioLINK http://rave.ohiolink.edu/etdc/view?acc_num=osu1150484039 http://rave.ohiolink.edu/etdc/view?acc_num=osu1150484039 unrestricted This thesis or dissertation is protected by copyright: all rights reserved. It may not be copied or redistributed beyond the terms of applicable copyright laws. |
collection |
NDLTD |
language |
English |
sources |
NDLTD |
topic |
Computer Science abnormality detection anomaly detection signature detection outlier detection data mining |
spellingShingle |
Computer Science abnormality detection anomaly detection signature detection outlier detection data mining Otey, Matthew Eric Approaches to Abnormality Detection with Constraints |
author |
Otey, Matthew Eric |
author_facet |
Otey, Matthew Eric |
author_sort |
Otey, Matthew Eric |
title |
Approaches to Abnormality Detection with Constraints |
title_short |
Approaches to Abnormality Detection with Constraints |
title_full |
Approaches to Abnormality Detection with Constraints |
title_fullStr |
Approaches to Abnormality Detection with Constraints |
title_full_unstemmed |
Approaches to Abnormality Detection with Constraints |
title_sort |
approaches to abnormality detection with constraints |
publisher |
The Ohio State University / OhioLINK |
publishDate |
2006 |
url |
http://rave.ohiolink.edu/etdc/view?acc_num=osu1150484039 |
work_keys_str_mv |
AT oteymattheweric approachestoabnormalitydetectionwithconstraints |
_version_ |
1719426586693861376 |