CFP last date
20 December 2024
Reseach Article

Temporal Outlier Analysis

by Sunil Kumar Rajwar, I. Mukherjee, Pankaj Kumar Manjhi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 174 - Number 23
Year of Publication: 2021
Authors: Sunil Kumar Rajwar, I. Mukherjee, Pankaj Kumar Manjhi
10.5120/ijca2021921071

Sunil Kumar Rajwar, I. Mukherjee, Pankaj Kumar Manjhi . Temporal Outlier Analysis. International Journal of Computer Applications. 174, 23 ( Mar 2021), 26-29. DOI=10.5120/ijca2021921071

@article{ 10.5120/ijca2021921071,
author = { Sunil Kumar Rajwar, I. Mukherjee, Pankaj Kumar Manjhi },
title = { Temporal Outlier Analysis },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2021 },
volume = { 174 },
number = { 23 },
month = { Mar },
year = { 2021 },
issn = { 0975-8887 },
pages = { 26-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume174/number23/31815-2021921071/ },
doi = { 10.5120/ijca2021921071 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:22:54.006136+05:30
%A Sunil Kumar Rajwar
%A I. Mukherjee
%A Pankaj Kumar Manjhi
%T Temporal Outlier Analysis
%J International Journal of Computer Applications
%@ 0975-8887
%V 174
%N 23
%P 26-29
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The main focus of this research is temporal data. Temporal data means data depends on time. A large number of applications generate a set of temporal data. For example, in our daily life there are different types of records such as credit, personal, financial, judicial, medical, etc. All depends on time. This highlights the need for a detailed organized study of temporal outlier analysis. Over the past decade, a great deal of research has been done on various types of temporal data, including consecutive data snapshots, a series of data snapshots, and data streams. In addition to initial work on time series, the researchers focused on rich data types that include multiple data streams, spatio-temporal data, network data, community distribution data, etc. Compared to general outlier analysis, the techniques for temporal outlier analysis are very different, such as AR models, Markov models, evolutionary clustering, etc.

References
  1. C. C. Aggarwal, Outlier Analysis. Springer, 2013.
  2. V. Chandola, A. Banerjee, and V. Kumar, “Anomaly Detection: A Survey,” ACM  Computing Surveys, vol. 41, no. 3, pp.15:1–15:58, 2009.
  3. V. J. Hodge and J. Austin, “A Survey of Outlier Detection Methodologies,”  Artificial Intelligence Review, vol. 22, no. 2, pp. 85–126, 2004.
  4. Y. Zhang, N. Meratnia, and P. J. M. Havinga, “Outlier Detection Techniques For       Wireless Sensor Networks: A Survey,” Centre for Telematics and Information Technology University of Twente, Tech. Rep. TR-CTIT-08-59, Oct 2008.
  5. C. C. Aggarwal and P. S. Yu, “Outlier Detection for High Dimensional Data,” SIGMOD Records, vol. 30, pp. 37–46, May 2001.
  6. C. C. Aggarwal and P. S. Yu, “Outlier Detection with Uncertain Data,” in Proc. Of  the 2008 SIAM Intl. Conf. on Data Mining (SDM), 2008, pp. 483–493.
  7. C. Aggarwal and K. Subbian, “Event Detection in Social Streams,” in Proc. of the  12th SIAM Intl. Conf. on Data Mining (SDM), 2012, pp. 624–635.
  8. C. C. Aggarwal, “On Abnormality Detection in Spuriously Populated Data Streams,”  in Proc. of the 2005 SIAM Intl. Conf. on Data Mining (SDM), 2005, pp. 80–91.
  9. C. C. Aggarwal, Y. Zhao, and P. S. Yu, “Outlier Detection in Graph Streams,” in  Proc. of the 27th Intl. Conf. on Data Engineering (ICDE). IEEE Computer Society,   2011, pp. 399–409.
  10. J. Gao, F. Liang, W. Fan, C. Wang, Y. Sun, and J. Han, “On Community Outliers  and their Efficient Detection in Information Networks,” in Proc. of the 16th ACM Intl. Conf. on Knowledge Discovery and Data Mining (KDD), 2010, pp. 813–822. GUPTA et al.: OUTLIER DETECTION FOR TEMPORAL DATA: A SURVEY 17
  11. A. Ghoting, M. E. Otey, and S. Parthasarathy, “LOADED: Link-Based Outlier and  Anomaly Detection in Evolving Data Sets,” in Proc. of the 4th IEEE Intl. Conf. on  Data Mining (ICDM), 2004, pp. 387–390.
  12. M. Gupta, J. Gao, Y. Sun, and J. Han, “Community Trend Outlier Detection using         Soft Temporal Pattern Mining,” in Proc. of the 2012 European Conf. on Machine  Learning and Knowledge Discovery in Databases (ECML PKDD), 2012, pp. 692–708.
  13. M. Gupta, J. Gao, Y. Sun, and J. Han, “Integrating Community Matching and  Outlier Detection for Mining Evolutionary Community Outliers,” in Proc. of the 18th ACM Intl. Conf. on Knowledge Discovery and Data Mining (KDD), 2012, pp.  859–867.
  14. J. P. Burman and M. C. Otto, “Census Bureau Research Project: Outliers in Time  Series,” 1988.
  15. A. J. Fox, “Outliers in Time Series,” Journal of the Royal Statistical Society. Series  B (Methodological), vol. 34, no. 3, pp. 350–363, 1972.
  16. H. Cho, Y. jin Kim, H. J. Jung, S.-W. Lee, and J. W. Lee, “Outlierd: An r package    for outlier detection using quantile regression on mass spectrometry data,” Bioinformatics, vol. 24, no. 6, pp. 882–884, 2008.
  17. K. Sequeira and M. Zaki, “ADMIT: Anomaly-based Data Mining for Intrusions,” in  Proc. of the 8th ACM Intl. Conf. on Knowledge Discovery and Data Mining (KDD),        2002, pp. 386–395.
  18. S. A. Hofmeyr, S. Forrest, and A. Somayaji, “Intrusion Detection using Sequences  of System Calls,” Journal of Computer Security, vol. 6, no. 3, pp. 151–180, Aug 1998.
  19. T. Lane and C. E. Brodley, “An Application of Machine Learning to Anomaly Detection,” in Proc. of the 20th National Information Systems Security Conf.  (NISSC), 1997, pp. 366–380.
  20. T. Lane and C. E. Brodley, “Temporal Sequence Learning and Data Reduction for        Anomaly Detection,” in Proc. of the 5th ACM Conf. on Computer and   Communications Security (CCS), 1998, pp. 150–158.
  21. F. Angiulli and F. Fassetti, “Detecting Distance-based Outliers in Streams of Data,”   in Proc. of the 16th ACM Conf. on Information and Knowledge Management (CIKM), 2007, pp. 811–820.
  22. C. Warrender, S. Forrest, and B. Pearlmutter, “Detecting Intrusions using System  Calls: Alternative Data Models,” in Proc. of the 1999 IEEE Symposium on Security         and Privacy, 1999, pp. 133–145.
  23. A. Lakhina, M. Crovella, and C. Diot, “Characterization of Network-wide         Anomalies in Traffic Flows,” in Proc. of the 4th ACM SIGCOMM Conf. on Internet Measurement (IMC), 2004, pp. 201–206.
  24. P. Papadimitriou, A. Dasdan, and H. Garcia-Molina, “Web Graph Similarity for Anomaly Detection,” Journal of Internet Services and Applications, vol. 1, no. 1, pp.19–30, 2010.
  25. P. Papadimitriou, A. Dasdan, and H. Garcia-Molina, “Web Graph Similarity for Anomaly Detection,” in Proc. of the 17th Intl. Conf. on World Wide Web (WWW),  2008, pp. 1167–1168.
Index Terms

Computer Science
Information Sciences

Keywords

Temporal Outlier Analysis Clustering Time data