Skip to main content

Applications of Autonomous Anomaly Detection

  • Chapter
  • First Online:
Empirical Approach to Machine Learning

Part of the book series: Studies in Computational Intelligence ((SCI,volume 800))

Abstract

In this chapter, the algorithm summary of the proposed autonomous anomaly detection (AAD) algorithm described in Chap. 6 is provided. Numerical examples based on both the synthetic and benchmark datasets are presented for evaluating the performance of the AAD algorithm. Well-known traditional anomaly detection approaches are used for a further comparison. It was demonstrated through the numerical experiments that the AAD algorithm is able to provide a more objective, accurate way for anomaly detection, and its performance is not influenced by the structure of the data and is equally effective in detecting collective anomalies as well as individual anomalies. The pseudo-code of the main procedure of the AAD algorithm and the MATLAB implementation can be found in Appendices B.1 and C.1, respectively.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. X. Gu, P. Angelov, in Autonomous Anomaly Detection, in IEEE Conference on Evolving and Adaptive Intelligent Systems (2017), pp. 1–8

    Google Scholar 

  2. H.T. Kahraman, S. Sagiroglu, I. Colak, The development of intuitive knowledge classifier and the modeling of domain dependent data. Knowl. Based Syst. 37, 283–295 (2013)

    Article  Google Scholar 

  3. https://archive.ics.uci.edu/ml/datasets/User+Knowledge+Modeling

  4. P. Cortez, A. Cerdeira, F. Almeida, T. Matos, J. Reis, Modeling wine preferences by data mining from physicochemical properties. Decis. Support Syst. 47, 547–553 (2009)

    Article  Google Scholar 

  5. https://archive.ics.uci.edu/ml/datasets/Wine+Quality

  6. B.A. Johnson, R. Tateishi, N.T. Hoan, A hybrid pansharpening approach and multiscale object-based image analysis for mapping diseased pine and oak trees. Int. J. Remote Sens. 34(20), 6969–6982 (2013)

    Article  Google Scholar 

  7. http://archive.ics.uci.edu/ml/datasets/Wilt

  8. D.E. Denning, An intrusion-detection model, IEEE Trans. Softw. Eng., SE-13(2), 222–232, 1987

    Article  Google Scholar 

  9. P.P. Angelov, in Anomaly Detection Based on Eccentricity Analysis, 2014 IEEE Symposium Series in Computational Intelligence, IEEE Symposium on Evolving and Autonomous Learning Systems, EALS, SSCI 2014, 2014, pp. 1–8

    Google Scholar 

  10. C. Thomas, N. Balakrishnan, Improvement in intrusion detection with advances in sensor fusion. IEEE Trans. Inf. Forensics Secur. 4(3), 542–551 (2009)

    Article  Google Scholar 

  11. H. Moonesinghe, P. Tan, in Outlier detection using random walks, Proceedings of the 18th IEEE International Conference on Tools with Artificial Intelligence (ICTAI’06), 2006, pp. 532–539

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Plamen P. Angelov .

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Angelov, P.P., Gu, X. (2019). Applications of Autonomous Anomaly Detection. In: Empirical Approach to Machine Learning. Studies in Computational Intelligence, vol 800. Springer, Cham. https://doi.org/10.1007/978-3-030-02384-3_10

Download citation

Publish with us

Policies and ethics