Clustering ellipses for anomaly detection

被引:72
|
作者
Moshtaghi, Masud [1 ]
Havens, Timothy C. [2 ]
Bezdek, James C. [1 ,2 ]
Park, Laurence [3 ]
Leckie, Christopher [1 ]
Rajasegarar, Sutharshan [4 ]
Keller, James M. [2 ]
Palaniswami, Marimuthu [4 ]
机构
[1] Univ Melbourne, Dept Comp Sci & Software Engn, Melbourne, Vic, Australia
[2] Univ Missouri, Dept Elect & Comp Engn, Columbia, MO 65211 USA
[3] Univ Western Sydney, Sch Comp & Math, Penrith, NSW 1797, Australia
[4] Univ Melbourne, Dept Elect & Elect Engn, Melbourne, Vic, Australia
基金
美国国家卫生研究院; 美国国家航空航天局; 美国国家科学基金会;
关键词
Cluster analysis; Elliptical anomalies in wireless sensor networks; Reordered dissimilarity images; Similarity of ellipsoids; Single linkage clustering; Visual assessment; VISUAL ASSESSMENT; TENDENCY;
D O I
10.1016/j.patcog.2010.07.024
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Comparing, clustering and merging ellipsoids are problems that arise in various applications, e.g., anomaly detection in wireless sensor networks and motif-based patterned fabrics. We develop a theory underlying three measures of similarity that can be used to find groups of similar ellipsoids in p-space. Clusters of ellipsoids are suggested by dark blocks along the diagonal of a reordered dissimilarity image (RDI). The RDI is built with the recursive iVAT algorithm using any of the three (dis) similarity measures as input and performs two functions: (i) it is used to visually assess and estimate the number of possible clusters in the data; and (ii) it offers a means for comparing the three similarity measures. Finally, we apply the single linkage and CLODD clustering algorithms to three two-dimensional data sets using each of the three dissimilarity matrices as input. Two data sets are synthetic, and the third is a set of real WSN data that has one known second order node anomaly. We conclude that focal distance is the best measure of elliptical similarity, iVAT images are a reliable basis for estimating cluster structures in sets of ellipsoids, and single linkage can successfully extract the indicated clusters. (C) 2010 Elsevier Ltd. All rights reserved.
引用
收藏
页码:55 / 69
页数:15
相关论文
共 50 条
  • [21] An Evolutionary Feature Clustering Approach for Anomaly Detection Using Improved Fuzzy Membership Function: Feature Clustering Approach for Anomaly Detection
    Kumar, Gunupudi Rajesh
    Gugulothu, Narsimha
    Nimmala, Mangathayaru
    [J]. INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2019, 14 (04) : 19 - 49
  • [22] Clustering Algorithm Based on Outlier Detection for Anomaly Intrusion Detection
    Yin, Shang-Nan
    Kang, Ho-Seok
    Kim, Sung-Ryul
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (02): : 291 - 299
  • [23] Hyperspectral Anomaly Detection Using Quantum Potential Clustering
    Tu, Bing
    Wang, Zhi
    Yang, Xianchang
    Li, Jun
    Plaza, Antonio
    [J]. IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2022, 71
  • [24] Based on the clustering of the background for hyperspectral imaging anomaly detection
    Harbin Engineering University, College of Information and Communication Engineering, Harbin, China
    [J]. Int. Conf. Electron., Commun. Control, ICECC - Proc, 2011, (1345-1348):
  • [25] Unsupervised video anomaly detection using feature clustering
    Li, H.
    Achim, A.
    Bull, D.
    [J]. IET SIGNAL PROCESSING, 2012, 6 (05) : 521 - 533
  • [26] Leveraging an Isolation Forest to Anomaly Detection and Data Clustering
    Yepmo, Veronne
    Smits, Gregory
    Lesot, Marie -Jeanne
    Pivert, Olivier
    [J]. DATA & KNOWLEDGE ENGINEERING, 2024, 151
  • [27] Information Content Analysis and Clustering for Signal Anomaly Detection
    Afgani, Mostafa
    Haas, Harald
    [J]. 2009 IEEE 70TH VEHICULAR TECHNOLOGY CONFERENCE FALL, VOLS 1-4, 2009, : 1328 - 1332
  • [28] Anomaly detection model based on data stream clustering
    Yin, Chunyong
    Zhang, Sun
    Yin, Zhichao
    Wang, Jin
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1729 - 1738
  • [29] Based on the Clustering of the Background for Hyperspectral Imaging Anomaly Detection
    Li Xiaohui
    Zhao Chunhui
    [J]. 2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, : 1345 - 1348
  • [30] Clustering model for anomaly detection in time series sets
    Leng, Mingwei
    Lai, Xinsheng
    Liu, Yingdong
    [J]. Journal of Information and Computational Science, 2010, 7 (01): : 85 - 93