skip to main content
10.1145/3394486.3403392acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article
Open access

USAD: UnSupervised Anomaly Detection on Multivariate Time Series

Published: 20 August 2020 Publication History

Abstract

The automatic supervision of IT systems is a current challenge at Orange. Given the size and complexity reached by its IT operations, the number of sensors needed to obtain measurements over time, used to infer normal and abnormal behaviors, has increased dramatically making traditional expert-based supervision methods slow or prone to errors. In this paper, we propose a fast and stable method called UnSupervised Anomaly Detection for multivariate time series (USAD) based on adversely trained autoencoders. Its autoencoder architecture makes it capable of learning in an unsupervised way. The use of adversarial training and its architecture allows it to isolate anomalies while providing fast training. We study the properties of our methods through experiments on five public datasets, thus demonstrating its robustness, training speed and high anomaly detection performance. Through a feasibility study using Orange's proprietary data we have been able to validate Orange's requirements on scalability, stability, robustness, training speed and high performance.

Supplementary Material

MP4 File (3394486.3403392.mp4)
The automatic supervision of IT systems is a current challenge at Orange. Given the size and complexity reached by its IT operations, the number of sensors needed to obtain measurements over time, used to infer normal and abnormal behaviors, has increased dramatically making traditional expert-based supervision methods slow or prone to errors. In this presentation, we show a fast and stable method called UnSupervised Anomaly Detection for multivariate time series (USAD) based on adversely trained autoencoders. Its autoencoder architecture makes it capable of learning in an unsupervised way. The use of adversarial training and its architecture allows it to isolate anomalies while providing fast training. We study the properties of our methods through experiments on five public datasets, demonstrating its robustness, training speed and high anomaly detection performance. Through a feasibility study using Orange's proprietary data we have been able to validate Orange's requirements.

References

[1]
Martín Arjovsky and Lé on Bottou. 2017. Towards Principled Methods for Training Generative Adversarial Networks. In 5th International Conference on Learning Representations, ICLR 2017. OpenReview.net, Toulon, France.
[2]
Raghavendra Chalapathy and Sanjay Chawla. 2019. Deep Learning for Anomaly Detection: A Survey. CoRR, Vol. abs/1901.03407 (2019).
[3]
Wanpracha Art Chaovalitwongse, Ya-Ju Fan, and Rajesh C. Sachdeo. 2007. On the Time Series K-Nearest Neighbor Classification of Abnormal Brain Activity. IEEE Trans. Systems, Man, and Cybernetics, Part A, Vol. 37, 6 (2007), 1005--1016.
[4]
Jonathan Goh, Sridhar Adepu, Khurum Nazir Junejo, and Aditya Mathur. 2017. A Dataset to Support Research in the Design of Secure Water Treatment Systems. In Critical Information Infrastructures Security. Springer International Publishing, 88--99.
[5]
Ian J. Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron C. Courville, and Yoshua Bengio. 2014. Generative Adversarial Nets. In Advances in Neural Information Processing Systems 27: Annual Conference on Neural Information Processing Systems 2014. Montreal, Quebec, Canada, 2672--2680.
[6]
Manish Gupta, Jing Gao, Charu C Aggarwal, and Jiawei Han. 2013. Outlier detection for temporal data: A survey. IEEE Transactions on Knowledge and Data Engineering, Vol. 26, 9 (2013), 2250--2267.
[7]
Sepp Hochreiter and Jü rgen Schmidhuber. 1997. Long Short-Term Memory. Neural Computation, Vol. 9, 8 (1997), 1735--1780.
[8]
Kyle Hundman, Valentino Constantinou, Christopher Laporte, Ian Colwell, and Tom Sö derströ m. 2018. Detecting Spacecraft Anomalies Using LSTMs and Nonparametric Dynamic Thresholding. In Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, KDD 2018, London, UK, August 19-23, 2018. ACM, 387--395.
[9]
Istvan Kiss, Bela Genge, Piroska Haller, and Gheorghe Sebestyen. 2014. Data clustering-based anomaly detection in industrial control systems. In Proceedings - 2014 IEEE 10th International Conference on Intelligent Computer Communication and Processing, ICCP 2014. IEEE, Cluj-Napoca, Romania, 275--281.
[10]
Fei Tony Liu, Kai Ming Ting, and Zhi-Hua Zhou. 2008. Isolation Forest. In Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), December 15-19, 2008. IEEE Computer Society, Pisa, Italy, 413--422.
[11]
Junshui Ma and Simon Perkins. 2003. Time-series Novelty Detection Using One-class Support Vector Machines. Proceedings of the International Joint Conference on Neural Networks, Vol. 3 (2003), 1741--1745.
[12]
Pankaj Malhotra, Anusha Ramakrishnan, Gaurangi Anand, Lovekesh Vig, Puneet Agarwal, and Gautam Shroff. 2016. LSTM-based Encoder-Decoder for Multi-sensor Anomaly Detection. (2016).
[13]
Aditya P Mathur and Nils Ole Tippenhauer. 2016. SWaT: a water treatment testbed for research and training on ICS security. In 2016 International Workshop on Cyber-physical Systems for Smart Water Networks (CySWater). IEEE, 31--36.
[14]
Daehyung Park, Yuuna Hoshi, and Charles C. Kemp. 2018. A Multimodal Anomaly Detector for Robot-Assisted Feeding Using an LS™-Based Variational Autoencoder. IEEE Robotics and Automation Letters, Vol. 3, 3 (jul 2018), 1544--1551.
[15]
D. E. Rumelhart, G. E. Hinton, and R. J. Williams. 1986. Learning Internal Representations by Error Propagation. MIT Press, Cambridge, MA, USA, 318--362.
[16]
Roy Schwartz, Jesse Dodge, Noah A. Smith, and Oren Etzioni. 2019. Green AI. (jul 2019).
[17]
Ya Su, Rong Liu, Youjian Zhao, Wei Sun, Chenhao Niu, and Dan Pei. 2019. Robust anomaly detection for multivariate time series through stochastic recurrent neural network. Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Vol. 1485 (2019), 2828--2837.
[18]
Ye Yuan, Guangxu Xun, Fenglong Ma, Yaqing Wang, Nan Du, Kebin Jia, Lu Su, and Aidong Zhang. 2018. MuVAN: A Multi-view Attention Network for Multivariate Temporal Data. Proceedings - IEEE International Conference on Data Mining, ICDM, Vol. 2018-November (2018), 717--726.
[19]
Houssam Zenati, Manon Romain, Chuan-Sheng Foo, Bruno Lecouat, and Vijay Chandrasekhar. 2018. Adversarially Learned Anomaly Detection. In IEEE International Conference on Data Mining, ICDM 2018. IEEE Computer Society, Singapore, 727--736.
[20]
Chuxu Zhang, Dongjin Song, Yuncong Chen, Xinyang Feng, Cristian Lumezanu, Wei Cheng, Jingchao Ni, Bo Zong, Haifeng Chen, and Nitesh V. Chawla. 2019. A Deep Neural Network for Unsupervised Anomaly Detection and Diagnosis in Multivariate Time Series Data. Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 33 (2019), 1409--1416.
[21]
Bo Zong, Qi Song, Martin Renqiang Min, Wei Cheng, Cristian Lumezanu, Daeki Cho, and Haifeng Chen. 2018. Deep autoencoding Gaussian mixture model for unsupervised anomaly detection. In 6th International Conference on Learning Representations, ICLR 2018. Toulon, France, 1--19.

Cited By

View all
  • (2024)An IIoT Temporal Data Anomaly Detection Method Combining Transformer and Adversarial TrainingInternational Journal of Information Security and Privacy10.4018/IJISP.34330618:1(1-28)Online publication date: 7-May-2024
  • (2024)Variational Autoencoders (VAEs) for Anomaly DetectionUtilizing Generative AI for Cyber Defense Strategies10.4018/979-8-3693-8944-7.ch009(309-326)Online publication date: 13-Sep-2024
  • (2024)Interpretability of Causal Discovery in Tracking Deterioration in a Highly Dynamic ProcessSensors10.3390/s2412372824:12(3728)Online publication date: 8-Jun-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
KDD '20: Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining
August 2020
3664 pages
ISBN:9781450379984
DOI:10.1145/3394486
This work is licensed under a Creative Commons Attribution International 4.0 License.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 20 August 2020

Check for updates

Author Tags

  1. adversarial network
  2. anomaly detection
  3. autoencoders
  4. multivariate time series
  5. neural networks
  6. supervision
  7. unsupervised learning

Qualifiers

  • Research-article

Conference

KDD '20
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,133 of 8,635 submissions, 13%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)7,650
  • Downloads (Last 6 weeks)671
Reflects downloads up to 14 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)An IIoT Temporal Data Anomaly Detection Method Combining Transformer and Adversarial TrainingInternational Journal of Information Security and Privacy10.4018/IJISP.34330618:1(1-28)Online publication date: 7-May-2024
  • (2024)Variational Autoencoders (VAEs) for Anomaly DetectionUtilizing Generative AI for Cyber Defense Strategies10.4018/979-8-3693-8944-7.ch009(309-326)Online publication date: 13-Sep-2024
  • (2024)Interpretability of Causal Discovery in Tracking Deterioration in a Highly Dynamic ProcessSensors10.3390/s2412372824:12(3728)Online publication date: 8-Jun-2024
  • (2024)An Efficient Method for Detecting Abnormal Electricity BehaviorEnergies10.3390/en1711250217:11(2502)Online publication date: 23-May-2024
  • (2024)Graph Transformer Network Incorporating Sparse Representation for Multivariate Time Series Anomaly DetectionElectronics10.3390/electronics1311203213:11(2032)Online publication date: 23-May-2024
  • (2024)Univariate Time Series Anomaly Detection Based on Hierarchical Attention NetworkTsinghua Science and Technology10.26599/TST.2023.901007329:4(1181-1193)Online publication date: Aug-2024
  • (2024)A Deep Deterministic Policy Gradient-Based Method for Enforcing Service Fault-Tolerance in MECChinese Journal of Electronics10.23919/cje.2023.00.10533:4(899-909)Online publication date: Jul-2024
  • (2024)APT Attack Detection of a New Power System based on DPI-transformerRecent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering)10.2174/235209651666623050411112317:2(99-106)Online publication date: Feb-2024
  • (2024)CAE_AD: Unsupervised Time Series Anomaly Detection Method Based on Convolutional AutoencoderJournal of Image and Signal Processing10.12677/JISP.2024.13100313:01(21-32)Online publication date: 2024
  • (2024)Efficiently localizing system anomalies for cloud infrastructures: a novel Dynamic Graph Transformer based Parallel FrameworkJournal of Cloud Computing: Advances, Systems and Applications10.1186/s13677-024-00677-x13:1Online publication date: 4-Jun-2024
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media