IEEE INFOCOM 2019 - IEEE Conference on Computer Communications 2019
DOI: 10.1109/infocom.2019.8737430
|View full text |Cite
|
Sign up to set email alerts
|

Unsupervised Anomaly Detection for Intricate KPIs via Adversarial Training of VAE

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 80 publications
(18 citation statements)
references
References 14 publications
0
18
0
Order By: Relevance
“…Donut puts forward innovations, such as M-ELBO, MCMC iteration, and missing value zero fillings on the basis of VAE, which has excellent performance on periodic KPIs. Subsequently, Buzz [6] solved the problem that was difficult for donut as it handles more complex data distribution. It measures the distance of data distributions and generates distributions through the Wasserstein distance.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Donut puts forward innovations, such as M-ELBO, MCMC iteration, and missing value zero fillings on the basis of VAE, which has excellent performance on periodic KPIs. Subsequently, Buzz [6] solved the problem that was difficult for donut as it handles more complex data distribution. It measures the distance of data distributions and generates distributions through the Wasserstein distance.…”
Section: Related Workmentioning
confidence: 99%
“…(1) VAE is not well suited for time series modeling. Previous VAE-based KPI anomaly detection methods [5,6] regard time series as sliding windows, ignoring the time relationship between sliding windows in the encoding process. In order to solve this problem, researchers combine LSTM [7] and VAE.…”
Section: Introductionmentioning
confidence: 99%
“…Hence, supervised machine learning strategies like [38][39][40] that depend on prior patterns of normal and abnormal behaviours are not suitable for real-time anomaly detection systems. Many recent works like [33,41], propose unsupervised machine learning algorithms for detecting anomalies. However, these unsupervised machine learning approaches train the models offline and hence, they cannot effectively adapt to the rapidly changing network behaviours over time and learn new threats and vulnerabilities.…”
Section: Real-time Security With Unsupervised Deep Learning Modelsmentioning
confidence: 99%
“…However, kitsune adds a separate feature extraction step which requires a basic understanding of the underlying network protocols. In [41], authors use adversarial training of VAE to detect anomalies in key performance monitors of the network however, it unsuitable for online systems as the adversarial training is unstable and difficult to converge. Khatuya et al [121] propose ADELE, with an aim to select features from system logs in order to create groundwork for a proactive, online failure prediction system.…”
Section: Unsupervised Learning Approachesmentioning
confidence: 99%
See 1 more Smart Citation