Presentation is loading. Please wait.

Presentation is loading. Please wait.

Barna Saha, AT&T Research Laboratory Joint work with: Lukasz Golab, Howard Karloff, Flip Korn, Divesh Srivastava.

Similar presentations


Presentation on theme: "Barna Saha, AT&T Research Laboratory Joint work with: Lukasz Golab, Howard Karloff, Flip Korn, Divesh Srivastava."— Presentation transcript:

1 Barna Saha, AT&T Research Laboratory Joint work with: Lukasz Golab, Howard Karloff, Flip Korn, Divesh Srivastava

2  Data Quality  Data Cleaning

3 IRS Vs Federal Mathematician “ You owe us $10,000 plus accrued interest in taxes for last year. You earned $36,000 last year but only had $1 withheld from your paycheck for Federal taxes. ” “ How could I work the entire year and only have $1 withheld ? I do not have time to waste on this foolishness. Goodbye !” The Federal Government Agency had only allocated enough storage on the computer to handle withholding amounts of $9999.99 or less. Amount withheld was $10001.00. The last $1 made the crucial difference.

4 The Risk of Massive ID Fraud In May 2004, Ryan Pirozzi of Edina, Minnesota opened his mail box and found more than a dozen bank statements inside. None of the accounts were his ! Because of a data entry error made by a clerk at the processing center of Wachovia Corp, a large bank headquartered in the Southeastern USA, over the course of 9 months, Pirozzi received the financial statements of 73 strangers. Their names, SSN, bank account numbers constitute an identity thief's dream !

5 The Risk of Massive ID Fraud Pirozzi began receiving completed 1099 tax forms belonging to many of these people. Finally one day in January 2005, a strange thing happened. Mr. Pirozzi went to his mail box and discovered an envelope from Wachovia that contained his completed 1099 tax form. That was the first piece of correspondence that he received from the bank that actually belonged to them.

6 Source of these stories 800 houses in Montgomery County, Maryland, were put on auction block in 2005 due to mistakes in the tax payment data of Washington Mutual Mortgage FOR SALE!

7 Data Quality Tools Real world data is often dirty: Inconsistent Inaccurate Incomplete Stale  Enterprises typically find data error rates of approximately 1%-5%, for some companies, it is above 30%.  Dirty data costs US businesses 600 billion dollars annually.  Data cleaning accounts for 30%-80% of development time and budget in most data warehouse projects. Data Quality Tools: Detect and repair errors Differentiate between dirty and clean data

8 A Systematic Approach to Improve Data Quality Impose integrity constraints Semantic rules for data Errors and inconsistencies in data emerge as violation of the constraints

9 Integrity Constraints: Functional Dependency [Codd, 1972] Functional Dependency: (Name, Type, State) (Price, Vat) NameTypeStatePriceVat CH1ClothingMaryland$50$3 BK45BookNew Jersey$120$15 FN30FurnitureWashington$100$0 CH1ClothingMaryland$100$6 BK66BookWashington$80$10

10 New Integrity Constraints for Data Quality Functional Dependency: (Name, Type, State) (Price, Vat) NameTypeStatePriceVat CH1ClothingMaryland$50$3 BK45BookNew Jersey$120$15 FN30FurnitureWashington$100$0 CH1ClothingMaryland$100$6 BK66BookWashington$80$10 1. If (Type=Book) then the above FD holds. 2.If (State=Washington) then (Vat= 0 ) Conditional Functional Dependency

11 New Integrity Constraints for Data Quality Conditional Functional Dependency Sequential Dependency Aggregation Dependency: Discovering Conservation Rules

12 Motivations Infrastructure networks are continuously monitored over time. Example: Highway monitoring systems use road sensors to identify traffic buildup and suggest alternate routes. Routers in an IP telecommunications network maintain counters to keep track of the traffic flowing through them. Power meters measure electricity flowing through different systems Monitored to troubleshoot customer problems, check network performance and understand provisioning requirements.

13 Data Quality Problems in Infrastructure Networks Missing or delayed data, especially over large interval of times, can be detrimental to any attempt to ensure reliable and well-functioning network. IP network monitoring typically uses the UDP protocol, so measurements can be delayed (or even lost) when there is high network congestion. Sometimes a new router interface is activated and traffic is flowing through it, but this interface is not known to the monitoring system; in this case, there is missing data that is hard to detect.

14 Data Quality Problems in Infrastructure Networks Missing or delayed data, especially over large interval of times, can be detrimental to any attempt to ensure reliable and well-functioning network. Monitoring road networks in the presence of sensor failures or unmonitored road segments Monitoring electricity networks in the presence of hacked power meters or if someone is diverting (stealing) electricity, etc. Detecting data quality issues is difficult when monitoring large and complex networks

15 Approach Impose integrity constraints to capture the semantics of data Provide concise summary of data where the rules hold/fail efficiently.

16 Integrity Constraint: Conservation Rules In many infrastructure networks, there exists a conservation law between related quantities in monitored data.  Kirchoff’s Node Law of Conservation of Electricity : The current flowing into a node in an electric circuit equals the current flowing out of the node.  Road Network Monitoring: Every car that enters an intersection must exit.  Telecommunication Networks: Every packet entering a router must exit. And many more…

17 Conservation Rules One to One Matching  Match each incoming event to each outgoing event, and report average delay/ loss as measure for violation of conservation laws.  Infeasible with respect to storage and processing costs to collect individual packets/ monitor individual events Monitoring systems provide aggregate counts at regular intervals.

18 Conservation Rules Incoming traffic at a router Outgoing traffic at a router time We expect the two time series to be identical Matching incoming and outgoing aggregated traffic at every time point may not reveal true data quality issues.  Clock synchronization error  Queuing delay Compare aggregated total over time windows.

19 Conservation Rules: Confidence of an Interval Confidence of an interval = Ignores duration of violation Incoming traffic at a router Outgoing traffic at a router 10 8 6 4 6 IN OUT a 1 a 2 a 3 a 4 a 5 b 1 b 2 b 3 b 4 b 5 34 ∑ a i ∑ b i

20 Conservation Rules: Confidence of an interval Rightward Matching between IN and OUT Confidence=1 Incoming traffic at a router Outgoing traffic at a router Confidence=0 10 8 6 4 6 5 IN OUT a 1 a 2 a 3 a 4 a 5 b 1 b 2 b 3 b 4 b 5 34

21 Earth Mover Distance A measure of distance between two distributions over some region D. Interpret the distributions as two different ways of piling up a certain amount of dirt over the region D. EMD is the minimum cost of turning one pile into the other. Cost is assumed to be amount of dirt moved times the distance by which its is moved. Also known as Wasserstein distance.

22 Rightward Matching (RM): A special case of Earth Mover Distance (EMD) Only right shifting Simple greedy algorithm works Confidence=1 Incoming traffic at a router Outgoing traffic at a router Confidence=0 10 8 6 4 6 5 IN OUT EMD=114 Maximum EMD Possible=114 EMD=0 Maximum EMD Possible=114

23 RM: Interpretation by area over cumulative counts Confidence of an interval I = area(CUM-OUT(I))/ area (CUM-IN(I)) time CUM- IN CUM-OUT Cumulative count CUM- IN CUM-OUT

24 RM: Interpretation by area over cumulative counts Find all intervals with confidence >= 0.9 (say) Cumulative count time CUM- IN CUM-OUT CUM- IN CUM-OUT

25 RM: Interpretation by area over cumulative counts Return a minimum collection of intervals with confidence >= 0.9 (say) covering at least 95% (say) of data Cumulative count time CUM- IN CUM-OUT CUM- IN CUM-OUT

26 Finding intervals with high confidence Trivial using O(n 3 ) time Try all possible n 2 intervals For each interval using O(n) time find the confidence Cumulative count time CUM- IN CUM-OUT CUM- IN CUM-OUT

27 Finding intervals with high confidence Easy to do in O( n 2 ) time Compute in linear time confidence of all the intervals that start from a specific point time Cumulative count time CUM- IN CUM-OUT CUM- IN CUM-OUT

28 How do you solve it in sub-quadratic time ? Only maximal intervals time Cumulative count Finding intervals with high confidence CUM- IN CUM-OUT CUM- IN CUM-OUT

29 Relax confidence: If outputs I, then conf(I) ≥ c/(1+ε) (no false positives) If conf(I*) ≥ c, output I I* with conf(I) ≥ c/(1+ε) (no false negatives) Finding intervals with high confidence

30 Algorithm 1 Finding intervals with high confidence

31 Generating Sparse Set of Intervals = Compute the confidence of intervals with growing geometrically by a factor of Finding intervals with high confidence

32 Generating Sparse Set of Intervals = Compute the confidence of intervals with growing geometrically by a factor of Finding intervals with high confidence

33 Running time depends on area B

34 Finding intervals with high confidence: Avoiding dependency on area Main Idea: Consider each possible ending point of intervals instead of starting points Compute confidence of intervals with interval lengths growing exponentially in 1+ε

35 Finding intervals with high confidence: Avoiding dependency on area

36 Finding intervals with high confidence: Avoiding dependency on area

37 Discount Models

38 Finding minimum collection of maximal intervals with support threshold Partial set cover on line Can be solved exactly in quadratic time using dynamic programming Can be solved in linear time if we allow constant factor approximation using greedy algorithm Greedy gives 7-approximation

39 Finding minimum collection of maximal intervals with support threshold Partial set cover using greedy algorithm If OPT chooses t intervals then We can choose at most t intervals that do not intersect any of the OPT intervals. We can choose at most 6 intervals that intersect a particular OPT intervals.

40 Credit Card Data Dec Jan

41 Entrance-Exit Data

42 Network Monitoring Data

43 Running Time on Job-log Data Area Based Non-area Based

44 Summary We study data quality problems that arise frequently in many infrastructure networks. We propose rules that express conservation laws between related quantities, such as those between the inbound and outbound counts reported by network monitoring systems. We present several confidence metrics for conservation rules. We give efficient approximation algorithms for finding a concise set of intervals that satisfy (or fail) a supplied conservation rule given a confidence threshold


Download ppt "Barna Saha, AT&T Research Laboratory Joint work with: Lukasz Golab, Howard Karloff, Flip Korn, Divesh Srivastava."

Similar presentations


Ads by Google