2016
DOI: 10.1109/lsp.2016.2623773
|View full text |Cite
|
Sign up to set email alerts
|

Online Anomaly Detection With Nested Trees

Abstract: We introduce an online anomaly detection algorithm that processes data in a sequential manner. At each time, the algorithm makes a new observation, produces a decision, and then adaptively updates all its parameters to enhance its performance. The algorithm mainly works in an unsupervised manner since in most real-life applications labeling the data is costly. Even so, whenever there is a feedback, the algorithm uses it for better adaptation. The algorithm has two stages. In the first stage, it constructs a sc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0
1

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
4

Relationship

2
6

Authors

Journals

citations
Cited by 15 publications
(12 citation statements)
references
References 25 publications
0
11
0
1
Order By: Relevance
“…In most prominent detection, estimation, prediction and learning problems [1], [2], intelligent agents often make decisions under considerable uncertainty (randomness, noise, incomplete data), where they combine features to determine the actions that maximize some utility [3]. The applications are numerous in many fields including decision theory [4], control theory [5], game theory [6], [7], optimization [8], [9], distribution estimation [10]- [13], anomaly detection [14], [15], signal processing [16], [17], prediction [18], [19] and bandits [20], [21]. The outputs of these learning models are designed to discriminate the data patterns and provide accurate probabilities for practical usefulness.…”
Section: A Preliminariesmentioning
confidence: 99%
“…In most prominent detection, estimation, prediction and learning problems [1], [2], intelligent agents often make decisions under considerable uncertainty (randomness, noise, incomplete data), where they combine features to determine the actions that maximize some utility [3]. The applications are numerous in many fields including decision theory [4], control theory [5], game theory [6], [7], optimization [8], [9], distribution estimation [10]- [13], anomaly detection [14], [15], signal processing [16], [17], prediction [18], [19] and bandits [20], [21]. The outputs of these learning models are designed to discriminate the data patterns and provide accurate probabilities for practical usefulness.…”
Section: A Preliminariesmentioning
confidence: 99%
“…Machine learning-based detection methods mainly include support vector machines [16], random forests [17], and decision trees [18]. Narudin et al [19] propose a solution for malware detection that uses machine learning to evaluate various network traffic characteristics.…”
Section: Related Workmentioning
confidence: 99%
“…In the problems of learning, recognition, estimation or prediction [1]- [3]; decisions are often produced to minimize certain loss functions using features of the observations, which are generally noisy, random or even missing. There are numerous applications in a number of varying fields such as decision theory [4], control theory [5], game theory [6], [7], optimization [8], [9], density estimation and anomaly detection [10]- [15], scheduling [16], signal processing [17], [18], forecasting [19], [20] and bandits [21]- [23]. These decisions are acquired from specific learning models, where the goal is to distinguish certain data patterns and provide accurate estimations for practical use.…”
Section: A Calibrationmentioning
confidence: 99%