Towards Improved Sensitivity, Specificity, and Timeliness of Syndromic Surveillance Systems Anna L. Buczak, PhD, Linda J. Moniz, PhD, Joseph Lombardo,

Slides:



Advertisements
Similar presentations
Applications of one-class classification
Advertisements

Loss-Sensitive Decision Rules for Intrusion Detection and Response Linda Zhao Statistics Department University of Pennsylvania Joint work with I. Lee,
ECG Signal processing (2)
G53MLE | Machine Learning | Dr Guoping Qiu
Image classification Given the bag-of-features representations of images from different classes, how do we learn a model for distinguishing them?
Supervised Learning Techniques over Twitter Data Kleisarchaki Sofia.
An Introduction of Support Vector Machine
Support Vector Machines
SVM—Support Vector Machines
Groundwater 3D Geological Modeling: Solving as Classification Problem with Support Vector Machine A. Smirnoff, E. Boisvert, S. J.Paradis Earth Sciences.
Transductive Reliability Estimation for Kernel Based Classifiers 1 Department of Computer Science, University of Ioannina, Greece 2 Faculty of Computer.
The Disputed Federalist Papers : SVM Feature Selection via Concave Minimization Glenn Fung and Olvi L. Mangasarian CSNA 2002 June 13-16, 2002 Madison,
Robust Multi-Kernel Classification of Uncertain and Imbalanced Data
Software Quality Ranking: Bringing Order to Software Modules in Testing Fei Xing Michael R. Lyu Ping Guo.
Fei Xing1, Ping Guo1,2 and Michael R. Lyu2
Optimizing Disease Outbreak Detection Methods Using Reinforcement Learning Masoumeh Izadi Clinical & Health Informatics Research Group Faculty of Medicine,
Project Mimic: Simulation for Syndromic Surveillance Thomas Lotze Applied Mathematics and Scientific Computation University of Maryland Galit Shmueli and.
Service Discrimination and Audit File Reduction for Effective Intrusion Detection by Fernando Godínez (ITESM) In collaboration with Dieter Hutter (DFKI)
Reduced Support Vector Machine
Lecture outline Support vector machines. Support Vector Machines Find a linear hyperplane (decision boundary) that will separate the data.
Spatiotemporal Cluster Detection in ESSENCE Biosurveillance Systems Panelist: Howard Burkom National Security Technology Department, John Hopkins University.
SVM (Support Vector Machines) Base on statistical learning theory choose the kernel before the learning process.
Population-Wide Anomaly Detection Weng-Keen Wong 1, Gregory Cooper 2, Denver Dash 3, John Levander 2, John Dowling 2, Bill Hogan 2, Michael Wagner 2 1.
Statistical Learning: Pattern Classification, Prediction, and Control Peter Bartlett August 2002, UC Berkeley CIS.
Theory Simulations Applications Theory Simulations Applications.
Causal Modeling for Anomaly Detection Andrew Arnold Machine Learning Department, Carnegie Mellon University Summer Project with Naoki Abe Predictive Modeling.
Masquerade Detection Mark Stamp 1Masquerade Detection.
July 11, 2001Daniel Whiteson Support Vector Machines: Get more Higgs out of your data Daniel Whiteson UC Berkeley.
A Wavelet-based Anomaly Detector for Disease Outbreaks Thomas Lotze Galit Shmueli University of Maryland College Park Sean Murphy Howard Burkom Johns Hopkins.
Bayesian networks Classification, segmentation, time series prediction and more. Website: Twitter:
1 SUPPORT VECTOR MACHINES İsmail GÜNEŞ. 2 What is SVM? A new generation learning system. A new generation learning system. Based on recent advances in.
An Introduction to Support Vector Machine (SVM) Presenter : Ahey Date : 2007/07/20 The slides are based on lecture notes of Prof. 林智仁 and Daniel Yeung.
Machine Learning Using Support Vector Machines (Paper Review) Presented to: Prof. Dr. Mohamed Batouche Prepared By: Asma B. Al-Saleh Amani A. Al-Ajlan.
Kernel Methods A B M Shawkat Ali 1 2 Data Mining ¤ DM or KDD (Knowledge Discovery in Databases) Extracting previously unknown, valid, and actionable.
One-class Training for Masquerade Detection Ke Wang, Sal Stolfo Columbia University Computer Science IDS Lab.
Support Vector Machines Reading: Ben-Hur and Weston, “A User’s Guide to Support Vector Machines” (linked from class web page)
1 K-Means+ID3 A Novel Method for Supervised Anomaly Detection by Cascading K-Means Clustering and ID3 Decision Tree Learning Methods Author : Shekhar R.
Practical Aspects of Alerting Algorithms in Biosurveillance Howard S. Burkom The Johns Hopkins University Applied Physics Laboratory National Security.
RSVM: Reduced Support Vector Machines Y.-J. Lee & O. L. Mangasarian First SIAM International Conference on Data Mining Chicago, April 6, 2001 University.
Support Vector Machines Project מגישים : גיל טל ואורן אגם מנחה : מיקי אלעד נובמבר 1999 הטכניון מכון טכנולוגי לישראל הפקולטה להנדסת חשמל המעבדה לעיבוד וניתוח.
Sparse Kernel Methods 1 Sparse Kernel Methods for Classification and Regression October 17, 2007 Kyungchul Park SKKU.
CSSE463: Image Recognition Day 14 Lab due Weds, 3:25. Lab due Weds, 3:25. My solutions assume that you don't threshold the shapes.ppt image. My solutions.
Support Vector Machines and Gene Function Prediction Brown et al PNAS. CS 466 Saurabh Sinha.
CSE4334/5334 DATA MINING CSE4334/5334 Data Mining, Fall 2014 Department of Computer Science and Engineering, University of Texas at Arlington Chengkai.
1 Classification and Feature Selection Algorithms for Multi-class CGH data Jun Liu, Sanjay Ranka, Tamer Kahveci
CSSE463: Image Recognition Day 15 Announcements: Announcements: Lab 5 posted, due Weds, Jan 13. Lab 5 posted, due Weds, Jan 13. Sunset detector posted,
Support Vector Machines (SVM): A Tool for Machine Learning Yixin Chen Ph.D Candidate, CSE 1/10/2002.
Chapter 6. Classification and Prediction Classification by decision tree induction Bayesian classification Rule-based classification Classification by.
Incremental Reduced Support Vector Machines Yuh-Jye Lee, Hung-Yi Lo and Su-Yun Huang National Taiwan University of Science and Technology and Institute.
CSSE463: Image Recognition Day 15 Today: Today: Your feedback: Your feedback: Projects/labs reinforce theory; interesting examples, topics, presentation;
High resolution product by SVM. L’Aquila experience and prospects for the validation site R. Anniballe DIET- Sapienza University of Rome.
Kernel Based Anomaly Detection Andrew Arnold (aoa5) 2nd Annual Project Student Day Columbia University -- 4/26/01 Intrusion Detection Systems -- IDS Machine.
Anomaly Detection Nathan Dautenhahn CS 598 Class Lecture March 3, 2011.
Experience Report: System Log Analysis for Anomaly Detection
CSSE463: Image Recognition Day 14
Online Conditional Outlier Detection in Nonstationary Time Series
APHA, Washington, November, 2007
An Enhanced Support Vector Machine Model for Intrusion Detection
A survey of network anomaly detection techniques
CSSE463: Image Recognition Day 14
CSSE463: Image Recognition Day 15
CSSE463: Image Recognition Day 15
CSSE463: Image Recognition Day 14
CSSE463: Image Recognition Day 15
CSSE463: Image Recognition Day 15
CSSE463: Image Recognition Day 14
CSSE463: Image Recognition Day 15
A Novel Smoke Detection Method Using Support Vector Machine
University of Wisconsin - Madison
Modeling IDS using hybrid intelligent systems
Presentation transcript:

Towards Improved Sensitivity, Specificity, and Timeliness of Syndromic Surveillance Systems Anna L. Buczak, PhD, Linda J. Moniz, PhD, Joseph Lombardo, MS PHIN 2008, Session F7, August 27, 2008 This work was supported by the JHU/APL Internal Research and Development (IR&D) Program

2 Outline  Motivation  Classical disease outbreak detection methods  Novel machine learning methodology for disease outbreak detection  Results  Conclusions  Future directions

3 Motivation  Develop methodology for reliable detection of disease outbreaks  Most of the existing methods use univariate statistics i.e. look at each of the syndrome/ subsyndrome/ age/ gender, etc. combination separately  proliferation of false alarms  Our goal: develop multivariate models for detecting abnormal relationships between time series  reduced false alarms

4 Approaches to Outbreak Detection  Two broad types of approaches:  Anomaly detection  Detectors flag any anomalous behavior  Statistical methods: CUSUM, C1, C2, C3, EWMA  Machine learning methods: clustering techniques, SVMs  Specific disease outbreak detection  Detectors are geared towards a specific disease  In depth knowledge about given disease manifestation needed  Separate model needed for each disease  Methods: Bayesian networks, Markov Decision Processes This talk will concentrate on anomaly detection methods

5 Statistical disease outbreak detection methods  They often determine whether the counts in a given syndrome/ subsyndrome time series are unusually high and thus worth investigating.  Statistical detection algorithms: C2, C3, EWMA  C2 & C3: 7 day baseline, 2 day guardband;  Individual day statistic for day j with lag n:  S j,n = Max {0, ( Count j – [μ n + σ n ] ) / σ n }, where  μ n is 7-day average with n-day lag ( so μ 3 is mean of counts in [j-3, j-9] )  σ n = standard deviation of same 7-day window  C2: C2 statistic for day k is S k,3 (2-day lag)  Alerts if Individual day statistic exceeds threshold  C3 statistic for day k is S k,3 + S k-1,3 + S k-2,3  Alerts when statistic for day k exceeds threshold

6 Sample Univariate Algorithm Output: C2 Accessible Alerting Algorithms: courtesy of Dr. Howard Burkom, JHU/APL

7 Sample Univariate Algorithm Output: C3 Accessible Alerting Algorithms: courtesy of Dr. Howard Burkom, JHU/APL

8 EWMA  Exponential Weighted Moving Average (EWMA): average with most weight on recent count X t  28-day baseline, 2 day guard band  Test Statistic:  Often threshold = 3 >= threshold

9 Sample Univariate Algorithm Output: EWMA Accessible Alerting Algorithms: courtesy of Dr. Howard Burkom, JHU/APL

10 Machine Learning for Disease Outbreak Detection  Approach:  Learn the model of regular activities  Use one-class Support Vector Machine  Detect anomaly based on its dissimilarity from regular activities  Advantages:  Only normal behavior data needed  Detectors flag any anomalous behavior  Capable of detecting anomalies for new pathogens  No need for separate models for each disease NormalAnomalous In SVMs a hyperplane in n- dimensional space divides data into two classes in terms of the largest margin

11 Support Vector Machines (SVM)  SVM learning algorithm developed by Vapnik based on statistical learning theory  Learning problem:  Find the best separating hyperplane dividing two classes in terms of the largest margin  To construct a classifier for a given data set, SVM solves a quadratic programming problem  To solve non-linear problems SVM employs inner-product kernels such as: polynomial, RBF, sigmoid, etc.  SVMs build the decision surface using only those training examples that are near the boundary region  Data points at the margin are called support vectors  One-Class SVM used  Proposed by Schölkopf et al. (1999)  Only positive training examples are needed  SVM classifiers are based on hyperplanes corresponding to decision functions:  Where w is the weight vector, b is the threshold of the decision rule, x is the classified pattern.

12 Details of the Approach Normal Anomalous Data Streams (3021) Combined Syn SVM GI SVM Fever SVM … EWMA Smoothing Resp SVM 3021 SVM Module

13 Data Sets  Training  ESSENCE data - no outbreaks (180 days)  Flu season weeks removed from training data  Testing (Recall)  ESSENCE data - no outbreaks (132 days that were not used in training)  Simulated outbreaks added to real background data:  Tularemia  Hep A – Sets 1, 2 & 3  Real problem Real background data with simulated outbreaks

14 TotalMaleFemal e Age 0- 4 Age …Alexa ndria …Washi ngton Bot_Like Fever GI Hem_Ill Loc_Les Lymph Neuro … AbdominalCramps AbdominalPain AbdominalPainGroup AbdominalTenderness Abscess AcuteBloodAbnormalities … Unresponsive UrinaryTract ViralSyndrome Vomiting Wheezing 3021 Data Streams Number of data streams: (11+148)*19 = 3021 Time series for: each Syndrome & subsyndrome: total / gender / age group / county Fever All GI - Male Viral Syndrome: 0-4 Vomiting - Female

15 Results: Univariate EWMA  omega = 0.8, baseline = 28 days, guard band = 2 days  Alert when EWMA Test Statistic >= 3  Average of alarms per day on normal data: 28.1 Proliferation of false alarms Proliferation of false alarms

16 Results Initial SVM Results  Only Fever SVM and GI SVM trained  Results per day:  Specificity: 94.7%  Sensitivity: 54.8%  Results per outbreak:  Specificity: 94.7%  Sensitivity: 100% Polling Univariate EWMA Results  omega = 0.8, baseline = 28 days, guard band = 2 days  Results per day:  Specificity: 94.0% (th = 53)  Sensitivity: 29.0%  Specificity: 90.9% (th = 44)  Sensitivity: 41.9%  Specificity: 75.8% (th = 35)  Sensitivity : 48.4%  Specificity: 68.9% (th = 32 )  Sensitivity: 54.8%  Results per outbreak:  Specificity: 94.0%  Sensitivity: 80% Similar Specificity -> SVM has Sensitivity better by 25.8% Similar Sensitivity -> SVM has Specificity better by 25.8%

17 Results

18 Timeliness of Detection  SVM  Specificity: 94.7%  Avg number of days to detect an outbreak: 1.67  All outbreaks detected  PU EWMA  Specificity: 94.0 %  Avg number of days to detect an outbreak: 2.25  2 outbreaks not detected at all  Specificity: 68.9%  Avg number of days to detect an outbreak: 1.8  1 outbreak not detected at all SVM obtains better Timeliness of Detection, higher Specificity for same Sensitivity, and higher Sensitivity for same Specificity than PU EWMA SVM obtains better Timeliness of Detection, higher Specificity for same Sensitivity, and higher Sensitivity for same Specificity than PU EWMA

19 Conclusions  New approach for disease outbreak detection designed  Very promising initial results obtained for normal data, 4 simulated outbreaks, one real problem  Favorable comparison of initial SVM results to PU EWMA results

20 Future Directions  Proof-of-concept:  Remaining SVMs to be trained  More sophisticated decision fusion module  Testing on many different types of simulated outbreaks (varying amplitude, day of injection)  Testing on real Influenza outbreaks  Explanation capability for the SVM system:  Capability for users to drill down to find the reason for the alert

21 Contact info: Dr. Anna L. Buczak National Security Technology Department Johns Hopkins University Applied Physics Laboratory tel