Local and Global Outlier Detection Algorithms in Unsupervised Approach: A Review

Q2 Computer Science
Ayad Mohammed Jabbar
{"title":"Local and Global Outlier Detection Algorithms in Unsupervised Approach: A Review","authors":"Ayad Mohammed Jabbar","doi":"10.37917/IJEEE.17.1.9","DOIUrl":null,"url":null,"abstract":"The problem of outlier detection is one of the most important issues in the field of analysis due to its applicability in several famous problem domains, including intrusion detection, security, banks, fraud detection, and discovery of criminal activities in electronic commerce. Anomaly detection comprises two main approaches: supervised and unsupervised approach. The supervised approach requires pre-defined information, which is defined as the type of outliers, and is difficult to be defined in some applications. Meanwhile, the second approach determines the outliers without human interaction. A review of the unsupervised approach, which shows the main advantages and the limitations considering the studies performed in the supervised approach, is introduced in this paper. This study indicated that the unsupervised approach suffers from determining local and global outlier objects simultaneously as the main problem related to algorithm parameterization. Moreover, most algorithms do not rank or identify the degree of being an outlier or normal objects and required different parameter settings by the research. Examples of such parameters are the radius of neighborhood, number of neighbors within the radius, and number of clusters. A comprehensive and structured overview of a large set of interesting outlier algorithms, which emphasized the outlier detection limitation in the unsupervised approach, can be used as a guideline for researchers who are interested in this field.","PeriodicalId":37533,"journal":{"name":"International Journal of Electrical and Electronic Engineering and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Electrical and Electronic Engineering and Telecommunications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.37917/IJEEE.17.1.9","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 6

Abstract

The problem of outlier detection is one of the most important issues in the field of analysis due to its applicability in several famous problem domains, including intrusion detection, security, banks, fraud detection, and discovery of criminal activities in electronic commerce. Anomaly detection comprises two main approaches: supervised and unsupervised approach. The supervised approach requires pre-defined information, which is defined as the type of outliers, and is difficult to be defined in some applications. Meanwhile, the second approach determines the outliers without human interaction. A review of the unsupervised approach, which shows the main advantages and the limitations considering the studies performed in the supervised approach, is introduced in this paper. This study indicated that the unsupervised approach suffers from determining local and global outlier objects simultaneously as the main problem related to algorithm parameterization. Moreover, most algorithms do not rank or identify the degree of being an outlier or normal objects and required different parameter settings by the research. Examples of such parameters are the radius of neighborhood, number of neighbors within the radius, and number of clusters. A comprehensive and structured overview of a large set of interesting outlier algorithms, which emphasized the outlier detection limitation in the unsupervised approach, can be used as a guideline for researchers who are interested in this field.
非监督方法中的局部和全局离群点检测算法综述
异常点检测问题是分析领域中最重要的问题之一,因为它适用于几个著名的问题领域,包括入侵检测、安全、银行、欺诈检测和电子商务中犯罪活动的发现。异常检测主要包括两种方法:有监督方法和无监督方法。监督方法需要预定义的信息,这些信息被定义为离群值的类型,在某些应用中难以定义。同时,第二种方法在没有人工干预的情况下确定异常值。本文对无监督方法进行了回顾,并结合有监督方法所进行的研究,介绍了无监督方法的主要优点和局限性。研究表明,无监督方法在参数化过程中存在局部离群目标和全局离群目标同时确定的问题。此外,大多数算法没有对异常值或正常对象的程度进行排序或识别,并且需要根据研究设置不同的参数。这些参数的例子包括邻域的半径、半径内的邻居数量和簇的数量。对大量有趣的离群值算法进行全面和结构化的概述,这些算法强调了无监督方法中离群值检测的局限性,可以作为对该领域感兴趣的研究人员的指导方针。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
5.90
自引率
0.00%
发文量
22
期刊介绍: International Journal of Electrical and Electronic Engineering & Telecommunications. IJEETC is a scholarly peer-reviewed international scientific journal published quarterly, focusing on theories, systems, methods, algorithms and applications in electrical and electronic engineering & telecommunications. It provide a high profile, leading edge forum for academic researchers, industrial professionals, engineers, consultants, managers, educators and policy makers working in the field to contribute and disseminate innovative new work on Electrical and Electronic Engineering & Telecommunications. All papers will be blind reviewed and accepted papers will be published quarterly, which is available online (open access) and in printed version.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信