Clustering ellipses for anomaly detection

被引:72
|
作者
Moshtaghi, Masud [1 ]
Havens, Timothy C. [2 ]
Bezdek, James C. [1 ,2 ]
Park, Laurence [3 ]
Leckie, Christopher [1 ]
Rajasegarar, Sutharshan [4 ]
Keller, James M. [2 ]
Palaniswami, Marimuthu [4 ]
机构
[1] Univ Melbourne, Dept Comp Sci & Software Engn, Melbourne, Vic, Australia
[2] Univ Missouri, Dept Elect & Comp Engn, Columbia, MO 65211 USA
[3] Univ Western Sydney, Sch Comp & Math, Penrith, NSW 1797, Australia
[4] Univ Melbourne, Dept Elect & Elect Engn, Melbourne, Vic, Australia
基金
美国国家卫生研究院; 美国国家航空航天局; 美国国家科学基金会;
关键词
Cluster analysis; Elliptical anomalies in wireless sensor networks; Reordered dissimilarity images; Similarity of ellipsoids; Single linkage clustering; Visual assessment; VISUAL ASSESSMENT; TENDENCY;
D O I
10.1016/j.patcog.2010.07.024
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Comparing, clustering and merging ellipsoids are problems that arise in various applications, e.g., anomaly detection in wireless sensor networks and motif-based patterned fabrics. We develop a theory underlying three measures of similarity that can be used to find groups of similar ellipsoids in p-space. Clusters of ellipsoids are suggested by dark blocks along the diagonal of a reordered dissimilarity image (RDI). The RDI is built with the recursive iVAT algorithm using any of the three (dis) similarity measures as input and performs two functions: (i) it is used to visually assess and estimate the number of possible clusters in the data; and (ii) it offers a means for comparing the three similarity measures. Finally, we apply the single linkage and CLODD clustering algorithms to three two-dimensional data sets using each of the three dissimilarity matrices as input. Two data sets are synthetic, and the third is a set of real WSN data that has one known second order node anomaly. We conclude that focal distance is the best measure of elliptical similarity, iVAT images are a reliable basis for estimating cluster structures in sets of ellipsoids, and single linkage can successfully extract the indicated clusters. (C) 2010 Elsevier Ltd. All rights reserved.
引用
收藏
页码:55 / 69
页数:15
相关论文
共 50 条
  • [31] Network anomaly detection based on clustering of sequence patterns
    Noh, Sang-Kyun
    Kim, Yong-Min
    Kim, DongKook
    Noh, Bong-Nam
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 2, 2006, 3981 : 349 - 358
  • [32] Integrated Clustering and Anomaly Detection (INCAD) for Streaming Data
    Guggilam, Sreelekha
    Zaidi, Syed Mohammed Arshad
    Chandola, Varun
    Patra, Abani K.
    [J]. COMPUTATIONAL SCIENCE - ICCS 2019, PT IV, 2019, 11539 : 45 - 59
  • [33] Almost aggregations in the gravitational clustering to perform anomaly detection
    Fumanal-Idocin, J.
    Rodriguez-Martinez, I
    Indurain, A.
    Minarova, M.
    Bustince, H.
    [J]. INFORMATION SCIENCES, 2022, 612 : 399 - 413
  • [34] Online Anomaly Detection Based on Support Vector Clustering
    Mohammad Amin Adibi
    Jamal Shahrabi
    [J]. International Journal of Computational Intelligence Systems, 2015, 8 : 735 - 746
  • [35] Online Anomaly Detection Based on Support Vector Clustering
    Adibi, Mohammad Amin
    Shahrabi, Jamal
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2015, 8 (04) : 735 - 746
  • [36] ONLINE ANOMALY DETECTION IN VIDEOS BY CLUSTERING DYNAMIC EXEMPLARS
    Feng, Jie
    Zhang, Chao
    Hao, Pengwei
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP 2012), 2012, : 3097 - 3100
  • [37] An Algorithm of Clustering by Density Peaks Using in Anomaly Detection
    Yin, Chunyong
    Zhang, Sun
    Yin, Zhichao
    Wang, Jin
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (12): : 115 - 127
  • [38] Anomaly Detection in Microblogging via Co-Clustering
    Yang, Wu
    Shen, Guo-Wei
    Wang, Wei
    Gong, Liang-Yi
    Yu, Miao
    Dong, Guo-Zhong
    [J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2015, 30 (05) : 1097 - 1108
  • [39] Factor-analysis based anomaly detection and clustering
    Wu, Ningning
    Zhang, Jing
    [J]. DECISION SUPPORT SYSTEMS, 2006, 42 (01) : 375 - 389
  • [40] Network anomaly detection based on DSOM and ACO clustering
    Feng, Yong
    Zhong, Jiang
    Xiong, Zhong-yang
    Ye, Chun-xiao
    Wu, Kai-gui
    [J]. ADVANCES IN NEURAL NETWORKS - ISNN 2007, PT 2, PROCEEDINGS, 2007, 4492 : 947 - +