Anomaly mining: Past, present and future

L Akoglu - Proceedings of the 30th ACM International Conference …, 2021 - dl.acm.org
Proceedings of the 30th ACM International Conference on Information …, 2021dl.acm.org
Anomaly mining finds high-stakes applications in various real-world domains such as
cybersecurity, finance, environmental monitoring, to name a few. Therefore, it has been
studied widely and a large body of detection techniques exists [1]. Today, many real-world
settings necessitate detection at speed for streaming/evolving data, and/or detection at scale
for massive datasets stored in a distributed environment [2]. Despite the plethora of detection
algorithms, selecting an algorithm to use on a new task as well as setting the values for its …
Anomaly mining finds high-stakes applications in various real-world domains such as cybersecurity, finance, environmental monitoring, to name a few. Therefore, it has been studied widely and a large body of detection techniques exists [1]. Today, many real-world settings necessitate detection at speed for streaming/evolving data, and/or detection at scale for massive datasets stored in a distributed environment [2]. Despite the plethora of detection algorithms, selecting an algorithm to use on a new task as well as setting the values for its hyperparameter(s), known as the model selection problem, is an open challenge for unsupervised anomaly detection. This issue is only to be exacerbated with the recent advent of detectors based on deep neural networks that exhibit a long list of hyperparameters. The challenge stems from two main factors: the lack of labeled data and the lack of a widely accepted anomaly loss function. Toward automation, one can explore internal evaluation strategies [3], or capitalize on the experience from historical detection tasks through meta-learning [4]. However, the problem remains far from solved. In deployment, many real-world use cases of anomaly detection require the flagged anomalies from a detector to be screened or audited by a human expert, typically for vetting purposes, where taking automatic actions can be costly (e.g. directly charging a flagged medical provider with fraud). While a vast majority of the literature focuses on novel detection algorithms, as humans are often involved with(in) the process, anomaly mining also concerns various human-centric problems that are beyond mere detection, namely explanation [5, 6], human interaction [7], and fairness [8]. These aspects of the field are under-studied and pose many open challenges.
ACM Digital Library
以上显示的是最相近的搜索结果。 查看全部搜索结果