cen 481 introduction to data mining week 12 outlier...

22
CEN 481 Introduction to Data Mining Week 12 OUTLIER DETECTION Fall 2019 Instructor: Dr. H. Esin ÜNAL

Upload: others

Post on 26-Jul-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CEN 481 Introduction to Data Mining Week 12 OUTLIER ...enformatik.cu.edu.tr/CEN481/CEN481_Week12.pdfContextual outlier analysis provides flexibilityto users in that one can examine

CEN 481 Introduction to Data Mining

Week 12OUTLIER DETECTION

Fall 2019

Instructor: Dr. H. Esin ÜNAL

Page 2: CEN 481 Introduction to Data Mining Week 12 OUTLIER ...enformatik.cu.edu.tr/CEN481/CEN481_Week12.pdfContextual outlier analysis provides flexibilityto users in that one can examine

What Are Outliers?

Outlier (Anomaly): A data object that deviates significantly from

the normal objects as if it were generated by a different mechanism

Ex.: Unusual credit card purchase, sports: Michael Jordon,

Wayne Gretzky, ...

2.12.2019 CEN 481- Introduction to Data Mining 2

Outliers are different from the noise data

Noise is random error or variance in a

measured variable

Noise should be removed before outlier

detection

Outliers are interesting: It violates the mechanism that

generates the normal data

Page 3: CEN 481 Introduction to Data Mining Week 12 OUTLIER ...enformatik.cu.edu.tr/CEN481/CEN481_Week12.pdfContextual outlier analysis provides flexibilityto users in that one can examine

What Are Outliers?

Outlier detection is also related to novelty detection in evolvingdatasets.

For example, by monitoring a social media web site where new content is

incoming, novelty detection may identify new topics and trends in a timely

manner.

Novel topics may initially appear as outliers. To this extent, outlier

detection and novelty detection share some similarity in modeling and

detection methods.

However, a critical difference between the two is that in novelty

detection, once new topics are confirmed, they are usually

incorporated into the model of normal behavior so that follow-up

instances are not treated as outliers anymore.

2.12.2019 CEN 481- Introduction to Data Mining 3

Page 4: CEN 481 Introduction to Data Mining Week 12 OUTLIER ...enformatik.cu.edu.tr/CEN481/CEN481_Week12.pdfContextual outlier analysis provides flexibilityto users in that one can examine

What Are Outliers?

Applications:

Credit card fraud detection

Telecom fraud detection

Customer segmentation

Medical care

Public safety and security

Industry damage detection

Image processing

Sensor/Video network surveillance

Intrusion detection

2.12.2019 CEN 481- Introduction to Data Mining 4

Page 5: CEN 481 Introduction to Data Mining Week 12 OUTLIER ...enformatik.cu.edu.tr/CEN481/CEN481_Week12.pdfContextual outlier analysis provides flexibilityto users in that one can examine

Types of Outliers

Outliers can be classified into three categories:

Global outliers

Contextual (or Conditional) outliers

Collective outliers

2.12.2019 CEN 481- Introduction to Data Mining 5

Page 6: CEN 481 Introduction to Data Mining Week 12 OUTLIER ...enformatik.cu.edu.tr/CEN481/CEN481_Week12.pdfContextual outlier analysis provides flexibilityto users in that one can examine

1. Global Outliers

In a given dataset, a data object is a global outlier if it deviates significantly from

the rest of the dataset.

Global outliers are sometimes called point anomalies, and are the simplest type

of outliers.

Most outlier detection methods are aimed at finding global outliers.

2.12.2019 CEN 481- Introduction to Data Mining 6

To detect global outliers, a critical issue is to find an

appropriate measurement of deviation with respect to the

application in question.

Example:Intrusion detection in computer networks, if the communication

behavior of a computer is very different from the normal patterns

In trading transaction auditing systems, transactions that do not

follow the regulations are considered as global outliers

Page 7: CEN 481 Introduction to Data Mining Week 12 OUTLIER ...enformatik.cu.edu.tr/CEN481/CEN481_Week12.pdfContextual outlier analysis provides flexibilityto users in that one can examine

2. Contextual Outliers

In a given data set, a data object is a contextual outlier if it deviates significantly

with respect to a specific context of the object.

Example: The temperature today is 28◦C. Is it exceptional (i.e., an outlier)?” It

depends whether it is on summer or winter.

In contextual outlier detection, the context has to be specified as part of the

problem definition.

Generally, in contextual outlier detection, the attributes of the data objects in

question are divided into two groups:

Contextual attributes: defines the context, e.g., time & location

Behavioral attributes: characteristics of the object, used to evaluate whether

the object is an outlier in the context to which it belongs., e.g., temperature,

humidity, and pressure.

2.12.2019 CEN 481- Introduction to Data Mining 7

Page 8: CEN 481 Introduction to Data Mining Week 12 OUTLIER ...enformatik.cu.edu.tr/CEN481/CEN481_Week12.pdfContextual outlier analysis provides flexibilityto users in that one can examine

2. Contextual Outliers

Unlike global outlier detection, in contextual outlier detection,

whether a data object is an outlier depends on not only the

behavioral attributes but also the contextual attributes.

Can be viewed as a generalization of local outliers—whose density

significantly deviates from its local area.

Contextual outlier analysis provides flexibility to users in that one

can examine outliers in different contexts, which can be highly

desirable in many applications.

2.12.2019 CEN 481- Introduction to Data Mining 8

Page 9: CEN 481 Introduction to Data Mining Week 12 OUTLIER ...enformatik.cu.edu.tr/CEN481/CEN481_Week12.pdfContextual outlier analysis provides flexibilityto users in that one can examine

3. Collective Outliers

Given a data set, a subset of data objects forms a collective outlier if the objects as

a whole deviate significantly from the entire data set. Importantly, the individual

data objects may not be outliers.

Example:

Intrusion detection: When a number of computers keep sending denial-of-

service packages to each other

2.12.2019 CEN 481- Introduction to Data Mining 9

Example:

The black objects as a whole form a collective outlier

because the density of those objects is much higher

than the rest in the dataset.

However, every black object individually is not an outlier

with respect to the whole data set.

Page 10: CEN 481 Introduction to Data Mining Week 12 OUTLIER ...enformatik.cu.edu.tr/CEN481/CEN481_Week12.pdfContextual outlier analysis provides flexibilityto users in that one can examine

3. Collective Outliers

2.12.2019 CEN 481- Introduction to Data Mining 10

Unlike global or contextual outlier detection, in collective outlier detection

Consider not only behavior of individual objects, but also that of groups of

objects

Need to have the background knowledge on the relationship among data

objects, such as a distance or similarity measure on objects.

A data set may have multiple types of outlier. One object may belong to more

than one type of outlier

Global outlier detection is the simplest.

Context outlier detection requires background information to determine

contextual attributes and contexts.

Collective outlier detection requires background information to model the

relationship among objects to find groups of outliers.

Page 11: CEN 481 Introduction to Data Mining Week 12 OUTLIER ...enformatik.cu.edu.tr/CEN481/CEN481_Week12.pdfContextual outlier analysis provides flexibilityto users in that one can examine

Challenges of Outlier Detection

2.12.2019 CEN 481- Introduction to Data Mining 11

Modeling normal objects and outliers properly

Hard to enumerate all possible normal behaviors in an application

The border between normal and outlier objects is often a gray area

Application-specific outlier detection

Choice of distance measure among objects and the model of

relationship among objects are often application-dependent

E.g., clinic data: a small deviation could be an outlier; while in

marketing analysis, larger fluctuations

Dependency on the application type makes it impossible to

develop a universally applicable outlier detection method.

Page 12: CEN 481 Introduction to Data Mining Week 12 OUTLIER ...enformatik.cu.edu.tr/CEN481/CEN481_Week12.pdfContextual outlier analysis provides flexibilityto users in that one can examine

Challenges of Outlier Detection

2.12.2019 CEN 481- Introduction to Data Mining 12

Handling noise in outlier detection

Noise may distort the normal objects and blur the distinction

between normal objects and outliers.

Noise and missing data may “hide” outliers and reduce the

effectiveness of outlier detection.

Understandability

Understand why these are outliers: Justification of the detection

Specify the degree of an outlier: the unlikelihood of the object

being generated by a normal mechanism that generated the

majority of the data.

Page 13: CEN 481 Introduction to Data Mining Week 12 OUTLIER ...enformatik.cu.edu.tr/CEN481/CEN481_Week12.pdfContextual outlier analysis provides flexibilityto users in that one can examine

Outlier Detection Methods

Two ways to categorize outlier detection methods:

Based on whether user-labeled examples of outliers can be

obtained:

Supervised, semi-supervised vs. unsupervised methods

Based on assumptions about normal data and outliers:

Statistical, proximity-based, and clustering-based methods

2.12.2019 CEN 481- Introduction to Data Mining 13

Page 14: CEN 481 Introduction to Data Mining Week 12 OUTLIER ...enformatik.cu.edu.tr/CEN481/CEN481_Week12.pdfContextual outlier analysis provides flexibilityto users in that one can examine

Outlier Detection: Supervised Methods

Supervised methods model data normality and abnormality.

Modeling outlier detection as a classification problem:

The task is to learn a classifier that can recognize outliers.

Samples examined by domain experts used for training & testing

Methods for learning a classifier for outlier detection effectively:

Model normal objects and report those not matching the model as

outliers, or

Model outliers and treat those not matching the model as normal

2.12.2019 CEN 481- Introduction to Data Mining 14

Page 15: CEN 481 Introduction to Data Mining Week 12 OUTLIER ...enformatik.cu.edu.tr/CEN481/CEN481_Week12.pdfContextual outlier analysis provides flexibilityto users in that one can examine

Outlier Detection: Supervised Methods

Although many classification methods can be applied, challenges to

supervised outlier detection include the following:

Imbalanced classes, i.e., outliers are rare:

Due to the small population of outliers in data, the sample data

examined by domain experts and used in training may not even

sufficiently represent the outlier distribution.

Boost the outlier class and make up some artificial outliers.

Catch as many outliers as possible, i.e., recall or sensitivity (=TP/P, true

positive recognition rate) is more important than accuracy

(=(TP+TN)/(P+N), recognition rate) (i.e., not mislabeling normal objects

as outliers)

2.12.2019 CEN 481- Introduction to Data Mining 15

Page 16: CEN 481 Introduction to Data Mining Week 12 OUTLIER ...enformatik.cu.edu.tr/CEN481/CEN481_Week12.pdfContextual outlier analysis provides flexibilityto users in that one can examine

Outlier Detection: Unsupervised Methods

In some application scenarios, objects labeled as “normal” or “outlier”

are not available. Thus, an unsupervised learning method has to be used.

Unsupervised outlier detection methods make an implicit assumption:

The normal objects are somewhat “clustered.”

They can form multiple groups, where each group has distinct features.

An outlier is expected to be far away from any groups of normal objects

2.12.2019 CEN 481- Introduction to Data Mining 16

Weakness: Cannot detect collective outlier

effectively

Normal objects may not share any strong

patterns (uniformly distributed), but the collective

outliers may share high similarity in a small area

Page 17: CEN 481 Introduction to Data Mining Week 12 OUTLIER ...enformatik.cu.edu.tr/CEN481/CEN481_Week12.pdfContextual outlier analysis provides flexibilityto users in that one can examine

Outlier Detection: Unsupervised Methods

As an example to this weakness:In some intrusion or virus detection

normal activities are very diverse and many do not fall into high-quality clusters.

Unsupervised methods may have a high false positive rate (=FP/N) i.e. they may mislabelmany normal objects as outliers (intrusions or viruses in these applications), and letmany actual outliers go undetected.

Due to the high similarity between intrusions and viruses (i.e., they have to attack keyresources in the target systems), modeling outliers using supervised methods may be farmore effective.

Many clustering methods can be adapted for unsupervised methods:The main idea: Find clusters, then outliers not belonging to any cluster

Problem 1: Hard to distinguish noise from outliers

Problem 2: It is often costly to find clusters first and then find outliers. Processing a largepopulation of non-target data entries before touching the real meat.

Newer methods: tackle outliers directly

2.12.2019 CEN 481- Introduction to Data Mining 17

Page 18: CEN 481 Introduction to Data Mining Week 12 OUTLIER ...enformatik.cu.edu.tr/CEN481/CEN481_Week12.pdfContextual outlier analysis provides flexibilityto users in that one can examine

Outlier Detection: Semi-Supervised Methods

Situation: In many applications, the number of labeled data is often small: only a

small set of the normal and/or outlier objects are labeled, but most of the data

are unlabeled.

Semi-supervised outlier detection: Regarded as applications of semi-supervised

learning.

If some labeled normal objects are available

Use the labeled examples and the proximate unlabeled objects to train a

model for normal objects

Those not fitting the model of normal objects are detected as outliers

If only some labeled outliers are available, a small number of labeled outliers

many not cover the possible outliers well

To improve the quality of outlier detection, one can get help from models for

normal objects learned from unsupervised methods

2.12.2019 CEN 481- Introduction to Data Mining 18

Page 19: CEN 481 Introduction to Data Mining Week 12 OUTLIER ...enformatik.cu.edu.tr/CEN481/CEN481_Week12.pdfContextual outlier analysis provides flexibilityto users in that one can examine

Outlier Detection: Statistical Methods

Statistical methods (also known as model-based methods)

assume that the normal data follow some statistical model (a

stochastic model)

The data not following the model are outliers.

Example (right figure):

First use Gaussian distribution to model the

normal data

For each object y in region R, estimate gD(y), the

probability of y fits the Gaussian distribution

If gD(y) is very low, y is unlikely generated by the

Gaussian model, thus an outlier.

2.12.2019 CEN 481- Introduction to Data Mining 19

Page 20: CEN 481 Introduction to Data Mining Week 12 OUTLIER ...enformatik.cu.edu.tr/CEN481/CEN481_Week12.pdfContextual outlier analysis provides flexibilityto users in that one can examine

Outlier Detection: Proximity-Based Methods

An object is an outlier if the nearest neighbors of the object are far away,

i.e., the proximity of the object is significantly deviates from the proximity

of most of the other objects in the same data set

2.12.2019 CEN 481- Introduction to Data Mining 20

Example (right figure):

Model the proximity of an object using its 3 nearest

neighbors

Objects in region R are substantially different from

other objects in the data set.

For the two objects in R, their second and third

nearest neighbors are dramatically more remote

than those of any other objects.

Thus the objects in R are outliers.

Page 21: CEN 481 Introduction to Data Mining Week 12 OUTLIER ...enformatik.cu.edu.tr/CEN481/CEN481_Week12.pdfContextual outlier analysis provides flexibilityto users in that one can examine

Outlier Detection: Proximity-Based Methods

2.12.2019 CEN 481- Introduction to Data Mining 21

The effectiveness of proximity-based methods highly relies on the

proximity measure.

In some applications, proximity or distance measures cannot be

obtained easily.

Often have a difficulty in finding a group of outliers which stay

close to each other

Two major types of proximity-based outlier detection

Distance-based vs. density-based

Page 22: CEN 481 Introduction to Data Mining Week 12 OUTLIER ...enformatik.cu.edu.tr/CEN481/CEN481_Week12.pdfContextual outlier analysis provides flexibilityto users in that one can examine

Outlier Detection: Clustering-Based Methods

Clustering-based methods assume that the normal data objects

belong to large and dense clusters, whereas outliers belong to small

or sparse clusters, or do not belong to any clusters.

2.12.2019 CEN 481- Introduction to Data Mining 22

Example (right figure):

There are two clusters

All points not in R form a large cluster

The two points in R form a tiny cluster,

thus are outliers