Anomaly Detection in Data Docent Xiao-Zhi Gao

Slides:



Advertisements
Similar presentations
Applicability Issues of the (Real-valued) Negative Selection Algorithms Zhou Ji, Dipankar Dasgupta The University of Memphis GECCO 2006: July 11, 2006.
Advertisements

Augmented Negative Selection Algorithm with Variable-Coverage Detectors Zhou Ji, Zhou Ji, St. Jude Childrens Research Hospital Dipankar Dasgupta, Dipankar.
Analysis of Dental Images using Artificial Immune Systems Zhou Ji 1, Dipankar Dasgupta 1, Zhiling Yang 2 & Hongmei Teng 1 1: The University of Memphis.
Estimating the detector coverage in a negative selection algorithm Zhou Ji St. Jude Childrens Research Hospital Dipankar Dasgupta The University of Memphis.
Negative Selection Algorithms at GECCO /22/2005.
V-Detector: A Negative Selection Algorithm Zhou Ji, advised by Prof. Dasgupta Computer Science Research Day The University of Memphis March 25, 2005.
Applications of one-class classification
CIFD: Computational Immunology for Fraud Detection
1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.
POSTER TEMPLATE BY: Multi-Sensor Health Diagnosis Using Deep Belief Network Based State Classification Prasanna Tamilselvan.
Fuzzy immune PID neural network control method based on boiler steam pressure system Third pacific-asia conference on circuits,communications and system,
WRSTA, 13 August, 2006 Rough Sets in Hybrid Intelligent Systems For Breast Cancer Detection By Aboul Ella Hassanien Cairo University, Faculty of Computer.
Artificial Immune Systems Andrew Watkins. Why the Immune System? Recognition –Anomaly detection –Noise tolerance Robustness Feature extraction Diversity.
Virtual Dart: An Augmented Reality Game on Mobile Device Supervisor: Professor Michael R. Lyu Prepared by: Lai Chung Sum Siu Ho Tung.
The Decision-Making Process IT Brainpower
1 Negative selection algorithms: from the thymus to V-detector Dissertation defense Zhou Ji Major professor: Prof. Dasgupta Advisory committee: Dr. Lin,
School of Computing and Engineering Diagnostic Engineering Research Group Diagnosis and Prognosis of Machinery Health based on Advanced Intelligent Computations.
Artificial Immune Systems Our body’s immune system is a perfect example of a learning system. It is able to distinguish between good cells and potentially.
Face Processing System Presented by: Harvest Jang Group meeting Fall 2002.
Oral Defense by Sunny Tang 15 Aug 2003
ADAPTIVE ALGORITHMS IN VIBRATION DIAGNOSIS A.V. Tsurko Liahushevich S.I. − Associate Professor Belarusian State University of Informatics and Radioelectronics.
CS Machine Learning. What is Machine Learning? Adapt to / learn from data  To optimize a performance function Can be used to:  Extract knowledge.
By : Anas Assiri.  Introduction  fraud detection  Immune system  Artificial immune system (AIS)  AISFD  Clonal selection.
Distributed Network Intrusion Detection An Immunological Approach Steven Hofmeyr Stephanie Forrest Patrik D’haeseleer Dept. of Computer Science University.
1 Principles of a Computer Immune System Anil Somayaji, Steven Hofmeyr, & Stephanie Forrest Presented by: Jesus Morales.
Data Mining Anomaly Detection Lecture Notes for Chapter 10 Introduction to Data Mining by Tan, Steinbach, Kumar © Tan,Steinbach, Kumar Introduction to.
1 CSI 5388: Topics in Machine Learning Instructor: Nathalie Japkowicz Objectives of the Course and Preliminaries Course Webpage.
Anomaly detection with Bayesian networks Website: John Sandiford.
A Shaft Sensorless Control for PMSM Using Direct Neural Network Adaptive Observer Authors: Guo Qingding Luo Ruifu Wang Limei IEEE IECON 22 nd International.
On-line Novelty Detection With Application to Mobile Robotics Stephen Marsland Imaging Science and Biomedical Engineering University of Manchester.
Electrical and Computer Systems Engineering Postgraduate Student Research Forum 2001 WAVELET ANALYSIS FOR CONDITION MONITORING OF CIRCUIT BREAKERS Author:
IE 585 Introduction to Neural Networks. 2 Modeling Continuum Unarticulated Wisdom Articulated Qualitative Models Theoretic (First Principles) Models Empirical.
Compiled By: Raj G Tiwari.  A pattern is an object, process or event that can be given a name.  A pattern class (or category) is a set of patterns sharing.
RECENT DEVELOPMENTS OF INDUCTION MOTOR DRIVES FAULT DIAGNOSIS USING AI TECHNIQUES 1 Oly Paz.
Machine Learning Using Support Vector Machines (Paper Review) Presented to: Prof. Dr. Mohamed Batouche Prepared By: Asma B. Al-Saleh Amani A. Al-Ajlan.
Prognosis of Gear Health Using Gaussian Process Model Department of Adaptive systems, Institute of Information Theory and Automation, May 2011, Prague.
APPLICATION OF THE METHOD AND COMBINED ALGORITHM ON THE BASIS OF IMMUNE NETWORK AND NEGATIVE SELECTION FOR IDENTIFICATION OF TURBINE ENGINE SURGING Lytvynenko.
Biologically Inspired Defenses against Computer Viruses International Joint Conference on Artificial Intelligence 95’ J.O. Kephart et al.
Using Support Vector Machines to Enhance the Performance of Bayesian Face Recognition IEEE Transaction on Information Forensics and Security Zhifeng Li,
Last Words DM 1. Mining Data Steams / Incremental Data Mining / Mining sensor data (e.g. modify a decision tree assuming that new examples arrive continuously,
Anomaly Detection in Data Mining. Hybrid Approach between Filtering- and-refinement and DBSCAN Eng. Ştefan-Iulian Handra Prof. Dr. Eng. Horia Cioc ârlie.
Data Mining Anomaly/Outlier Detection Lecture Notes for Chapter 10 Introduction to Data Mining by Tan, Steinbach, Kumar © Tan,Steinbach, Kumar Introduction.
NORPIE 2004 Trondheim, 14 June Requirements for Embedded Analysis Concept of Bearing Condition Monitoring Petr Spatenka Tuomo Lindh Jero Ahola.
Correlation of Electrical and Vibration Data of Machine Faults Hala Abualsaud, Nour Boland Project advisor: George Collins (SKF/Baker USA, Fort Collins)
CS 478 – Tools for Machine Learning and Data Mining Perceptron.
Data Mining Anomaly Detection Lecture Notes for Chapter 10 Introduction to Data Mining by Tan, Steinbach, Kumar © Tan,Steinbach, Kumar Introduction to.
Data Mining Anomaly/Outlier Detection Lecture Notes for Chapter 10 Introduction to Data Mining by Tan, Steinbach, Kumar.
Anomaly Detection.
WHAT IS DATA MINING?  The process of automatically extracting useful information from large amounts of data.  Uses traditional data analysis techniques.
Anomaly Detection. Network Intrusion Detection Techniques. Ştefan-Iulian Handra Dept. of Computer Science Polytechnic University of Timișoara June 2010.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology 2005.ACM GECCO.8.Discriminating and visualizing anomalies.
Machine Learning BY UZMA TUFAIL MCS : section (E) ROLL NO: /31/2016.
CSC321: Introduction to Neural Networks and Machine Learning Lecture 17: Boltzmann Machines as Probabilistic Models Geoffrey Hinton.
1 An introduction to support vector machine (SVM) Advisor : Dr.Hsu Graduate : Ching –Wen Hong.
Finding Clusters within a Class to Improve Classification Accuracy Literature Survey Yong Jae Lee 3/6/08.
Presentation By SANJOG BHATTA Student ID : July 1’ 2009.
1 Azhari, Dr Computer Science UGM. Human brain is a densely interconnected network of approximately neurons, each connected to, on average, 10 4.
Big Data Javad Azimi May First of All… Sorry about the language  Feel free to ask any question Please share similar experiences.
Surface Defect Inspection: an Artificial Immune Approach Dr. Hong Zheng and Dr. Saeid Nahavandi School of Engineering and Technology.
A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from.
Artificial Intelligence
ANOMALY DETECTION FRAMEWORK FOR BIG DATA
Siemens Enables Digitalization: Data Analytics & Artificial Intelligence Dr. Mike Roshchin, CT RDA BAM.
Development of RCP Vibration Monitoring System using Power Line Analysis Method 정 재 천.
Online Conditional Outlier Detection in Nonstationary Time Series
Soft Computing Introduction.
Machine Learning Dr. Mohamed Farouk.
Introduction to Pattern Recognition
Integrating Deep Learning with Cyber Forensics
Immunocomputing and Artificial Immune Systems
Presentation transcript:

Anomaly Detection in Data Docent Xiao-Zhi Gao

Outline Introduction Anomaly detection in data Negative Selection Algorithm (NSA) Application examples Conclusions

What are Anomalies? Anomaly is a pattern in the data that does not conform to the expected behavior Anomaly is also referred to as outliers, exceptions, peculiarities, surprise, etc. Anomalies translate to significant (often critical) real life entities –Credit card fraud –Cyber intrusions

Simple Example N 1 and N 2 are regions of normal behavior Points o 1 and o 2 are anomalies Points in region O 3 are anomalies

Simple Example

Real World Anomalies Credit Card Fraud –An abnormally high purchase made on a credit card Cyber Intrusions –A web server involved in ftp traffic

Applications of Anomaly Detection Network intrusion detection Insurance / Credit card fraud detection Healthcare informatics / Medical diagnostics Industrial damage detection Image processing / Video surveillance Novel topic detection in text mining …

Key Challenges Defining a representative normal region is challenging The boundary between normal and outlying behavior is often not precise The exact notion of an outlier is different for different application domains Data might contain noise Normal behavior keeps evolving

Artificial Immune Systems (AIS) Artificial Immune Systems (AIS) are an emerging kind of soft computing methods –Inspired by natural immune systems –Features of pattern recognition, anomaly detection, data analysis, machine learning, etc Negative Selection Algorithm (NSA) is an important partner of AIS –Maturation of T cells and self/nonself discrimination –Developed by Forrest in 1994 NSA is applied to deal with anomaly detection in data

Biological Information Processing Systems

Natural Immune System

XX Pathogens Biochemical barriers Skin Innate immune response Adaptive immune response Lymphocytes

How Does Natural Immune System Work?

Negative Selection Algorithm (NSA) Immune system (B and T cells) is capable of distinguishing self from nonself –Negative censoring of T cells in thymus Negative Selection Algorithm (NSA) mimics mechanism of immune system –1. Define self samples (representative samples) –2. Generation of detectors (binary and real-valued) –3. Negative selection of detectors –4. Employment of detectors in anomaly detection

Negative Selection Algorithm (NSA) Generation of NSA Detectors

Negative Selection Algorithm (NSA) Anomaly Detection Using NSA

Self and Nonself Samples

Self and Nonself Coverage in NSA

Self and Nonself Samples

Two Examples of Random Detector Groups

Two Examples of Optimized Detector Groups (Gao, 2004)

Distribution of Fisher’s iris Data in Sepal Length-Sepal Width Dimensions

Distribution of Fisher’s iris Data in Petal Length-Petal Width Dimensions

Detector Generation in NSA (Gao, 2006)

Anomaly Detection in Fisher’s iris Data with NSA Detectors

Anomaly Detection in Chaotic Time Series Mackey-Glass chaotic time series  controls the behaviors of Mackey-Glass time series – and Anomaly detection rate can be improved by neural networks-based NSA

Mackey-Glass Time Series Fresh Data

Anomaly Detection in Mackey-Glass Time Series Using Adaptive NSA Before Training After Training

NSA-based Motor Fault Detection Monitoring of the working conditions of the running motors is necessary in maintaining their normal status Anomaly in the feature signals acquired from the faulty motors is caused by faults Motor fault detection is converted to a typical problem of anomaly detection

Normal, Abnormal, and Faulty Feature Signals of Motors

NSA in Motor Fault Detection

NSA-based Motor Fault Detection Anomaly in feature signals is caused by faults –Healthy feature signals: self –Faulty feature signals: nonself Neural networks are combined with NSA NSA detectors are built up on the structure of BP neural networks Neural networks training algorithm is applied

Neural Networks-based NSA (Gao, 2010)

Training of Neural Networks-based NSA

Margin Training Strategy of NSA Detectors Case1: (for faulty plant feature signals only): if, detectors are trained using normal BP learning algorithm to decrease E; otherwise, no training is employed Case 2 (for healthy plant feature signals only): if, detectors are trained using ‘positive’ learning algorithm to increase E; otherwise, no training is employed

Margin Training of NSA Detectors in Fault Detection

Inner Raceway Fault Detection of Bearings Bearings are important components in rotating machinery Defect on the inner raceway is a common but typical fault of bearings Fault detection is based on vibration signals of bearings –A sensor mounted on eight-ball bearings with a motor rotation speed at 1,782 rpm

Inner Raceway Fault of Bearings

Features Signals of Healthy and Faulty Bearings Healthy Bearings Faulty Bearings

Fault Detection Rate of Neural Networks-based NSA Before Training After Training

Motor Fault Detection using NSA (Gao, 2012) Two kinds of motor faults are considered here –Rotor fault –Stator fault Stator current signals are used as feature signals Both healthy and faulty motors are running with/without varying loads Fault detection rate is

Feature Signals for Motor Fault Detection Healthy Motor

Feature Signals for Motor Fault Detection Broken Rotor

Feature Signals for Motor Fault Detection Broken Stator

Motor Fault Detection Results Healthy Motor

Motor Fault Detection Results Broken Rotor

Motor Fault Detection Result Broken Stator

Detection Results of Rotor and Stator Faults

Current Signals of Healthy Motor with Four Different Loads

Current Signals of Faulty Motor with Four Different Loads

Numbers of Activated NSA Detectors for Healthy Motor Healthy Motor

Numbers of Activated NSA Detectors for Faulty Motor Faulty Motor

Fault Detection Rates of Faulty Motors with Different Loads (Gao, 2013)

Conclusions Anomaly detection in data is an important topic NSA can be used for anomaly detection based on only the normal data A few application examples have demonstrated the effectiveness of the NSA in anomaly detection Performance comparisons need to be made between the NSA and other anomaly detection methods, e.g., Support Vector Machine (SVM)