Motivation: Fraud Detection

Similar documents
Data Mining. Outlier detection. Hamid Beigy. Sharif University of Technology. Fall 1395

Class Outlier Detection. Zuzana Pekarčíková

Knowledge Discovery and Data Mining I

Outlier Analysis. Lijun Zhang

OUTLIER DETECTION : A REVIEW

Brain Tumour Detection of MR Image Using Naïve Beyer classifier and Support Vector Machine

Chapter 1. Introduction

T. R. Golub, D. K. Slonim & Others 1999

SURVEY ON OUTLIER DETECTION TECHNIQUES USING CATEGORICAL DATA

A Semi-supervised Approach to Perceived Age Prediction from Face Images

Machine Learning Statistical Learning. Prof. Matteo Matteucci

Previously, when making inferences about the population mean,, we were assuming the following simple conditions:

10CS664: PATTERN RECOGNITION QUESTION BANK

Information-Theoretic Outlier Detection For Large_Scale Categorical Data

Data mining for Obstructive Sleep Apnea Detection. 18 October 2017 Konstantinos Nikolaidis

UNIVERSITY of PENNSYLVANIA CIS 520: Machine Learning Midterm, 2016

Citation for published version (APA): Ebbes, P. (2004). Latent instrumental variables: a new approach to solve for endogeneity s.n.

Lecture Notes Module 2

FUNNEL: Automatic Mining of Spatially Coevolving Epidemics

Semantic Pattern Transformation

Lec 02: Estimation & Hypothesis Testing in Animal Ecology

Gray level cooccurrence histograms via learning vector quantization

Automatic Segmentation and Identification of Abnormal Breast Region in Mammogram Images Based on Statistical Features

For general queries, contact

Gene expression analysis. Roadmap. Microarray technology: how it work Applications: what can we do with it Preprocessing: Classification Clustering

Outlier Detection Based on Surfeit Entropy for Large Scale Categorical Data Set

Kernel Density Estimation for Random-effects Meta-analysis

extraction can take place. Another problem is that the treatment for chronic diseases is sequential based upon the progression of the disease.

Comparative Study of K-means, Gaussian Mixture Model, Fuzzy C-means algorithms for Brain Tumor Segmentation

Outlier detection in datasets with mixed-attributes

Artificial Intelligence Lecture 7

Technical Specifications

Research Article Detection of Abnormal Item Based on Time Intervals for Recommender Systems

Intelligent Edge Detector Based on Multiple Edge Maps. M. Qasim, W.L. Woon, Z. Aung. Technical Report DNA # May 2012

EXTRACT THE BREAST CANCER IN MAMMOGRAM IMAGES

A STATISTICAL PATTERN RECOGNITION PARADIGM FOR VIBRATION-BASED STRUCTURAL HEALTH MONITORING

UNIVERSITY of PENNSYLVANIA CIS 520: Machine Learning Final, Fall 2014

Dynamic Causal Modeling

Review. Imagine the following table being obtained as a random. Decision Test Diseased Not Diseased Positive TP FP Negative FN TN

Bayesian Models for Combining Data Across Subjects and Studies in Predictive fmri Data Analysis

NeuroMem. RBF Decision Space Mapping

A Learning Method of Directly Optimizing Classifier Performance at Local Operating Range

n Outline final paper, add to outline as research progresses n Update literature review periodically (check citeseer)

Improved Intelligent Classification Technique Based On Support Vector Machines

STAT100 Module 4. Detecting abnormalities. Dr. Matias Salibian-Barrera Winter 2009 / 2010

A Concise Guide to Market

Measuring noncompliance in insurance benefit regulations with randomized response methods for multiple items

- Decide on an estimator for the parameter. - Calculate distribution of estimator; usually involves unknown parameter

Title: A robustness study of parametric and non-parametric tests in Model-Based Multifactor Dimensionality Reduction for epistasis detection

BREAST CANCER EARLY DETECTION USING X RAY IMAGES

Introduction & Basics

Bayesian and Frequentist Approaches

A REVIEW ON CLASSIFICATION OF BREAST CANCER DETECTION USING COMBINATION OF THE FEATURE EXTRACTION MODELS. Aeronautical Engineering. Hyderabad. India.

Copyright 2007 IEEE. Reprinted from 4th IEEE International Symposium on Biomedical Imaging: From Nano to Macro, April 2007.

Comparative study of Naïve Bayes Classifier and KNN for Tuberculosis

Machine Learning! Robert Stengel! Robotics and Intelligent Systems MAE 345,! Princeton University, 2017

EECS 433 Statistical Pattern Recognition

Search e Fall /18/15

Monte Carlo Analysis of Univariate Statistical Outlier Techniques Mark W. Lukens

EARLY STAGE DIAGNOSIS OF LUNG CANCER USING CT-SCAN IMAGES BASED ON CELLULAR LEARNING AUTOMATE

COMPARATIVE STUDY ON FEATURE EXTRACTION METHOD FOR BREAST CANCER CLASSIFICATION

Social Determinants of Health

Selection and Combination of Markers for Prediction

Predicting Breast Cancer Survival Using Treatment and Patient Factors

Section 4.1. Chapter 4. Classification into Groups: Discriminant Analysis. Introduction: Canonical Discriminant Analysis.

CHAPTER 6. Conclusions and Perspectives

Classification of cirrhotic liver in Gadolinium-enhanced MR images

Announcements. Perceptual Grouping. Quiz: Fourier Transform. What you should know for quiz. What you should know for quiz

Winner s Report: KDD CUP Breast Cancer Identification

A walk in the park with Probabilites and Stats. it::unimi::sps::webcomm

Predicting Sleep Using Consumer Wearable Sensing Devices

An Empirical Mixture Model for Large-Scale RTT Measurements

Hacettepe University Department of Computer Science & Engineering

What you should know before you collect data. BAE 815 (Fall 2017) Dr. Zifei Liu

Statistical Analysis Using Machine Learning Approach for Multiple Imputation of Missing Data

Chapter 19. Confidence Intervals for Proportions. Copyright 2010 Pearson Education, Inc.

Research Methods in Forest Sciences: Learning Diary. Yoko Lu December Research process

Quizzes (and relevant lab exercises): 20% Midterm exams (2): 25% each Final exam: 30%

MAGNETIC resonance imaging (MRI) has become a

Lung Cancer Diagnosis from CT Images Using Fuzzy Inference System

Chapter 8 Estimating with Confidence

Statistics 202: Data Mining. c Jonathan Taylor. Final review Based in part on slides from textbook, slides of Susan Holmes.

Gene Selection for Tumor Classification Using Microarray Gene Expression Data

Randomization as a Tool for Development Economists. Esther Duflo Sendhil Mullainathan BREAD-BIRS Summer school

Introduction to Discrimination in Microarray Data Analysis

Module 14: Missing Data Concepts

Reflection Questions for Math 58B

Cancer Cells Detection using OTSU Threshold Algorithm

Individualized Treatment Effects Using a Non-parametric Bayesian Approach

BREAST CANCER EPIDEMIOLOGY MODEL:

10.1 Estimating with Confidence. Chapter 10 Introduction to Inference

Assignment #6. Chapter 10: 14, 15 Chapter 11: 14, 18. Due tomorrow Nov. 6 th by 2pm in your TA s homework box

CS 453X: Class 18. Jacob Whitehill

Identification of Tissue Independent Cancer Driver Genes

Psychology 205, Revelle, Fall 2014 Research Methods in Psychology Mid-Term. Name:

Detection and Classification of Lung Cancer Using Artificial Neural Network

TITLE: A Data-Driven Approach to Patient Risk Stratification for Acute Respiratory Distress Syndrome (ARDS)

Network-based pattern recognition models for neuroimaging

Automatic Hemorrhage Classification System Based On Svm Classifier

Russian Journal of Agricultural and Socio-Economic Sciences, 3(15)

Transcription:

Outlier Detection

Motivation: Fraud Detection http://i.imgur.com/ckkoaop.gif Jian Pei: CMPT 741/459 Data Mining -- Outlier Detection (1) 2

Techniques: Fraud Detection Features Dissimilarity Groups and noise http://i.stack.imgur.com/trdgu.png Jian Pei: CMPT 741/459 Data Mining -- Outlier Detection (1) 3

Outlier Analysis One person s noise is another person s signal Outliers: the objects considerably dissimilar from the remainder of the data Examples: credit card fraud, Michael Jordon, intrusions, etc Applications: credit card fraud detection, telecom fraud detection, intrusion detection, customer segmentation, medical analysis, etc Jian Pei: CMPT 741/459 Data Mining -- Outlier Detection (1) 4

Outliers and Noise Different from noise Noise is random error or variance in a measured variable Outliers are interesting: an outlier violates the mechanism that generates the normal data Outlier detection vs. novelty detection Early stage may be regarded as outliers But later merged into the model Jian Pei: CMPT 741/459 Data Mining -- Outlier Detection (1) 5

Types of Outliers Three kinds: global, contextual and collective outliers A data set may have multiple types of outlier One object may belong to more than one type of outlier Global outlier (or point anomaly) An outlier object significantly deviates from the rest of the data set challenge: find an appropriate measurement of deviation Jian Pei: CMPT 741/459 Data Mining -- Outlier Detection (1) 6

Contextual Outliers An outlier object deviates significantly based on a selected context Ex. Is 10C in Vancouver an outlier? (depending on summer or winter?) Attributes of data objects should be divided into two groups Contextual attributes: defines the context, e.g., time & location Behavioral attributes: characteristics of the object, used in outlier evaluation, e.g., temperature A generalization of local outliers whose density significantly deviates from its local area Challenge: how to define or formulate meaningful context? Jian Pei: CMPT 741/459 Data Mining -- Outlier Detection (1) 7

Collective Outliers A subset of data objects collectively deviate significantly from the whole data set, even if the individual data objects may not be outliers Application example: intrusion detection when a number of computers keep sending denial-ofservice packages to each other Detection of collective outliers Consider not only behavior of individual objects, but also that of groups of objects Need to have the background knowledge on the relationship among data objects, such as a distance or similarity measure on objects Jian Pei: CMPT 741/459 Data Mining -- Outlier Detection (1) 8

Outlier Detection: Challenges Modeling normal objects and outliers properly Hard to enumerate all possible normal behaviors in an application The border between normal and outlier objects is often a gray area Application-specific outlier detection Choice of distance measure among objects and the model of relationship among objects are often application-dependent Example: clinic data: a small deviation could be an outlier; while in marketing analysis, larger fluctuations Jian Pei: CMPT 741/459 Data Mining -- Outlier Detection (1) 9

Outlier Detection: Challenges Handling noise in outlier detection Noise may distort the normal objects and blur the distinction between normal objects and outliers Noise may help hide outliers and reduce the effectiveness of outlier detection Understandability Understand why these are outliers: Justification of the detection Specify the degree of an outlier: the unlikelihood of the object being generated by a normal mechanism Jian Pei: CMPT 741/459 Data Mining -- Outlier Detection (1) 10

Outlier Detection Methods Whether user-labeled examples of outliers can be obtained Supervised, semi-supervised, and unsupervised methods Assumptions about normal data and outliers Statistical, proximity-based, and clusteringbased methods Jian Pei: CMPT 741/459 Data Mining -- Outlier Detection (1) 11

Supervised Methods Modeling outlier detection as a classification problem Samples examined by domain experts used for training & testing Methods for Learning a classifier for outlier detection effectively: Model normal objects & report those not matching the model as outliers, or Model outliers and treat those not matching the model as normal Challenges Imbalanced classes, i.e., outliers are rare: Boost the outlier class and make up some artificial outliers Catch as many outliers as possible, i.e., recall is more important than accuracy (i.e., not mislabeling normal objects as outliers) Jian Pei: CMPT 741/459 Data Mining -- Outlier Detection (1) 12

Unsupervised Methods Assume the normal objects are somewhat ``clustered' into multiple groups, each having some distinct features An outlier is expected to be far away from any groups of normal objects Weakness: Cannot detect collective outlier effectively Normal objects may not share any strong patterns, but the collective outliers may share high similarity in a small area Many clustering methods can be adapted for unsupervised methods Find clusters, then outliers: not belonging to any cluster Jian Pei: CMPT 741/459 Data Mining -- Outlier Detection (1) 13

Unsupervised Methods: Challenges In some intrusion or virus detection, normal activities are diverse Unsupervised methods may have a high false positive rate but still miss many real outliers. Supervised methods can be more effective, e.g., identify attacking some key resources Challenges Hard to distinguish noise from outliers Costly since first clustering: but far less outliers than normal objects Newer methods: tackle outliers directly Jian Pei: CMPT 741/459 Data Mining -- Outlier Detection (1) 14

Semi-Supervised Methods In many applications, the number of labeled data is often small Labels could be on outliers only, normal objects only, or both If some labeled normal objects are available Use the labeled examples and the proximate unlabeled objects to train a model for normal objects Those not fitting the model of normal objects are detected as outliers If only some labeled outliers are available, a small number of labeled outliers many not cover the possible outliers well To improve the quality of outlier detection, one can get help from models for normal objects learned from unsupervised methods Jian Pei: CMPT 741/459 Data Mining -- Outlier Detection (1) 15

Pros and Cons Effectiveness of statistical methods: highly depends on whether the assumption of statistical model holds in the real data There are rich alternatives to use various statistical models Parametric vs. non-parametric Jian Pei: CMPT 741/459 Data Mining -- Outlier Detection (1) 16

Proximity-based Methods An object is an outlier if the nearest neighbors of the object are far away, i.e., the proximity of the object is significantly deviates from the proximity of most of the other objects in the same data set Jian Pei: CMPT 741/459 Data Mining -- Outlier Detection (1) 17

Pros and Cons The effectiveness of proximity-based methods highly relies on the proximity measure In some applications, proximity or distance measures cannot be obtained easily Often have a difficulty in identifying a group of outliers that stay close to each other Two major types of proximity-based outlier detection methods Distance-based vs. density-based Jian Pei: CMPT 741/459 Data Mining -- Outlier Detection (1) 18

Clustering-based Methods Normal data belong to large and dense clusters, whereas outliers belong to small or sparse clusters, or do not belong to any clusters Jian Pei: CMPT 741/459 Data Mining -- Outlier Detection (1) 19

Challenges Since there are many clustering methods, there are many clustering-based outlier detection methods as well Clustering is expensive: straightforward adaption of a clustering method for outlier detection can be costly and does not scale up well for large data sets Jian Pei: CMPT 741/459 Data Mining -- Outlier Detection (1) 20

Statistical Outlier Analysis Assumption: the objects in a data set are generated by a (stochastic) process (a generative model) Learn a generative model fitting the given data set, and then identify the objects in low probability regions of the model as outliers two categories: parametric versus nonparametric Jian Pei: CMPT 741/459 Data Mining -- Outlier Detection (1) 21

Example Statistical methods (also known as modelbased methods) assume that the normal data follow some statistical model The data not following the model are outliers. Jian Pei: CMPT 741/459 Data Mining -- Outlier Detection (1) 22

Parametric Methods Assumption: the normal data is generated by a parametric distribution with parameter θ The probability density function of the parametric distribution f(x θ) gives the probability that object x is generated by the distribution The smaller this value, the more likely x is an outlier Jian Pei: CMPT 741/459 Data Mining -- Outlier Detection (1) 23

Univariate Outliers Based on Normal Distribution ln L(µ, 2 )= nx ln f(x i (u, i=1 2 )) = n 2 ln(2 ) n 2 ln 2 1 2 2 nx (x i µ) 2 Taking derivatives with respect to µ and σ 2, we derive the following maximum likelihood estimates ˆµ = x = 1 n nx i=1 x i ˆ2 = 1 n nx (x i x) 2 i=1 i=1 Jian Pei: CMPT 741/459 Data Mining -- Outlier Detection (1) 24

Example Daily average temperature: {24.0, 28.9, 28.9, 29.0, 29.1, 29.1, 29.2, 29.2, 29.3, 29.4} Since n = 10, ˆµ = 28.61 ˆ = p 2.29 = 1.51 Then (24 28.61) /1.51 = 3.04 < 3, 24 is an outlier since µ ± 3σ contains 99.7% data Jian Pei: CMPT 741/459 Data Mining -- Outlier Detection (1) 25

The Grubb s Test Maximum normed residual test For each object x in a data set, compute its z-score v x is an outlier if z N 1 p N u t N t2 2N,N 2 2+t 2 2N,N 2 t 2 is the value taken by a t-distribution at a 2N,N 2 significance level of α/(2n), and N is the number of objects in the data set Jian Pei: CMPT 741/459 Data Mining -- Outlier Detection (1) 26

Non-parametric Method Not assume an a-priori statistical model, instead, determine the model from the input data Not completely parameter free but consider the number and nature of the parameters are flexible and not fixed in advance Examples: histogram and kernel density estimation Jian Pei: CMPT 741/459 Data Mining -- Outlier Detection (1) 27

Histogram A transaction in the amount of $7,500 is an outlier, since only 0.2% transactions have an amount higher than $5,000 Jian Pei: CMPT 741/459 Data Mining -- Outlier Detection (1) 28

Challenges Hard to choose an appropriate bin size for histogram Too small bin size normal objects in empty/ rare bins, false positive Too big bin size outliers in some frequent bins, false negative Jian Pei: CMPT 741/459 Data Mining -- Outlier Detection (1) 29

To-Do List Read Chapters 12.1-12.3 Jian Pei: CMPT 741/459 Data Mining -- Outlier Detection (1) 30