SlideShare a Scribd company logo
2
Most read
12
Most read
20
Most read
ANOMALY DETECTION USING
DEEP AUTO-ENCODERS
Gianmario Spacagna
What you will (briefly) learn
– What is an anomaly (and an outlier)
– Popular techniques used in shallow machine learning
– Why deep learning can make the difference
– Anomaly detection using deep auto—encoders
– H2O overview
– Code examples in Jupyter:
■ ECG pulse detection
■ MNIST digit recognition (optional)
1. Machine Learning – An
Introduction
2. Neural Networks
3. Deep Learning Fundamentals
4. Unsupervised Feature
Learning
5. Image Recognition
6. Recurrent Neural Networks
and Languages Models
7. Deep Learning for Board
Games
8. Deep Learning for Computer
Games
9. Anomaly Detection
10. Building a Production-ready
Intrusion Detection System
Why this use case?
■ Anomaly detection is crucial to many business
applications
■ Smart feature representation =>
better anomaly detection
■ Deep Learning works very well on learning
relationships in the underlying raw data
(will see how…)
Outlier vs Anomaly
“An outlier is a legitimate data point that’s far away from the mean or median in a
distribution. It may be unusual, like a 9.6-second 100-meter dash, but still within the realm
of reality. An anomaly is an illegitimate data point that’s generated by a different process
than whatever generated the rest of the data.”
Ravi Parikh
http://data.heapanalytics.com/garbage-in-garbage-out-how-anomalies- can-wreck-your-data
Data modeling
■ Point anomaly
(e.g. black sheep)
■ Contextual anomaly
(e.g. selling
ice-creams in
January)
■ Collective anomaly
(e.g. sequence of
suspected credit card
activities)
Detection modeling (and its limitations)
■ Supervised (classification)
– Data skewness, lack of counter examples
■ Unsupervised (clustering)
– Curse of dimensionality
■ Semi-supervised (novelty detection)
– Require a “normal” training dataset
Real world applications
■ Manufacturing => hardware faults
■ Law-enforcement => reveal criminal activities
■ Network system => detect intrusions or anomalous behaviors
■ Internet Security => malware detection
■ Financial services => frauds
■ Marketing / business strategy => spotting profitable customers
■ Healthcare => Medical diagnosis
What’s the challenge?
“Coming up with features is difficult, time-consuming, requires expert knowledge. When
working applications of learning, we spend a lot of time tuning features.“
Andrew Ng, Machine Learning and AI via Brain simulations, Stanford University
Hierarchical Feature Learning
NVIDIA Deep Learning Course: Class #1 – Introduction to Deep Learning
https://www.youtube.com/watch?v=6eBpjEdgSm0
Structural representation
Advanced Topics, http://slideplayer.com/slide/3471890/
Signal propagation
Schematic diagram of back-propagation neural networks with two hidden layers.
Factor selection for delay analysis using Knowledge Discovery in Databases
Auto-encoders
• Signal propagation output: approximate an identity
function
• Error back propagation: Mean Squared Error MSE (*)
between the original datum and the reconstructed one
(*) in case of numerical data
Novelty detection using auto-encoders
1. Identify a training dataset of what is considered “normal”
2. Learn what “normal” means
aka. learn the structures of normal behavior
3. Try to reconstruct never-seen points re-using the same structure, if the error is high means the
point deviates from the normal distribution
TRAIN
Auto-Encoder
RECONSTRUCT
RECONSTRUCT
Low
error
High
error
Features compression
■ Use just the encoder to compress data into a reduced
dimensional space then use traditional unsupervised learning
Tom Mitchell’s example of an auto-encoder:
You can represent any combination of the 8 binary inputs using only 3 decimal values
Anomaly Detection using Deep Auto-Encoders
Examples
■ ECG Anomaly Pulse Detection
■ MNIST Anomaly Digit Recognition (Optional)
■ Jupyter notebooks available on
https://github.com/packtmayur/Python-Deep-Learning/tree/master/chapter_9
Summary
■ We listed a few real-world applications of anomaly detection
■ We covered some of the most popular techniques in the literature with their
limitations
■ We proposed an overview of how deep neural networks work and why they are great
for learning smart feature representations
■ We proposed 2 semi-supervised approaches using deep auto-encoders:
– Novel detection
– Feature compression
Going deeper
■ Advanced modeling:
– Denoising auto-encoders
– Contractive auto-encoders
– Sparse auto-encoders
– Variational auto-encoders (for better novelty detection)
– Stacked auto-encoders (for better feature compression)
■ Building a production-ready intrusion detection system
– Validating and testing with labels and in absence of ground truth
– Evaluation KPIs for anomaly detection
– A/B(C/D) testing
"Data scientists realize that their best days
coincide with discovery of truly odd features in
the data."
Haystacks and Needles: Anomaly Detection By:
Gerhard Pilcher & Kenny Darrell, Data Mining
Analyst, Elder Research, Inc.

More Related Content

PPTX
Machine learning
PDF
Machine learning
PDF
Machine Learning: Introduction to Neural Networks
PPTX
Machine learning
PPTX
Machine learning
PPTX
Deep Learning in Computer Vision
PPT
Intro to Deep learning - Autoencoders
PPTX
Autoencoders in Deep Learning
Machine learning
Machine learning
Machine Learning: Introduction to Neural Networks
Machine learning
Machine learning
Deep Learning in Computer Vision
Intro to Deep learning - Autoencoders
Autoencoders in Deep Learning

What's hot (20)

PPTX
Machine learning overview
PPTX
Overfitting & Underfitting
PDF
Machine Learning and its Applications
PPT
Machine Learning
PDF
Anomaly detection
PPTX
Artificial Intelligence Course | AI Tutorial For Beginners | Artificial Intel...
PPTX
Image classification using CNN
PPTX
Machine learning
PPT
Machine Learning presentation.
PPTX
Anomaly Detection and Spark Implementation - Meetup Presentation.pptx
PPTX
Supervised and Unsupervised Learning In Machine Learning | Machine Learning T...
PPTX
Machine learning and pattern recognition
PPT
Machine learning
PDF
The fundamentals of Machine Learning
PDF
Machine Learning
PPTX
Cognitive computing
PDF
Introduction to Machine Learning with SciKit-Learn
PPTX
Introduction to Deep Learning
PDF
Deep Learning With Python Tutorial | Edureka
PPTX
Machine learning basics
Machine learning overview
Overfitting & Underfitting
Machine Learning and its Applications
Machine Learning
Anomaly detection
Artificial Intelligence Course | AI Tutorial For Beginners | Artificial Intel...
Image classification using CNN
Machine learning
Machine Learning presentation.
Anomaly Detection and Spark Implementation - Meetup Presentation.pptx
Supervised and Unsupervised Learning In Machine Learning | Machine Learning T...
Machine learning and pattern recognition
Machine learning
The fundamentals of Machine Learning
Machine Learning
Cognitive computing
Introduction to Machine Learning with SciKit-Learn
Introduction to Deep Learning
Deep Learning With Python Tutorial | Edureka
Machine learning basics
Ad

Similar to Anomaly Detection using Deep Auto-Encoders (20)

PPTX
Anomaly Detection using Deep Auto-Encoders | Gianmario Spacagna
PPTX
Machine Learning Algorithms for Anomaly Detection in Particles Accelerators T...
PDF
Deep learning for detecting anomalies and software vulnerabilities
PPTX
Anomaly detection - TIBCO Data Science Central
PDF
BSSML17 - Anomaly Detection
PDF
GANs for Anti Money Laundering
PPTX
Analytics forward 2019-03
PPTX
Anomaly Detection - Real World Scenarios, Approaches and Live Implementation
PPTX
swatiVCprsentation artificial learning and machine learning.pptx
PDF
Anomaly detection using deep learning based model with feature attention
PDF
Data pipelines and anomaly detection
PDF
Deep Learning for Time Series Data
PDF
2007.02500.pdf
PDF
A Comprehensive Introduction to Anomaly Detection in Machine Learning | USAII®
PDF
L14. Anomaly Detection
PDF
Cao nicolau-mc dermott-learning-neural-cybernetics-2018-preprint
PPTX
rsec2a-2016-jheaton-morning
PDF
EMT machine learning 12th weeks : Anomaly detection
PDF
Neural Networks and Deep Learning
PDF
Anomaly Detection using Neural Networks with Pandas, Keras and Python
Anomaly Detection using Deep Auto-Encoders | Gianmario Spacagna
Machine Learning Algorithms for Anomaly Detection in Particles Accelerators T...
Deep learning for detecting anomalies and software vulnerabilities
Anomaly detection - TIBCO Data Science Central
BSSML17 - Anomaly Detection
GANs for Anti Money Laundering
Analytics forward 2019-03
Anomaly Detection - Real World Scenarios, Approaches and Live Implementation
swatiVCprsentation artificial learning and machine learning.pptx
Anomaly detection using deep learning based model with feature attention
Data pipelines and anomaly detection
Deep Learning for Time Series Data
2007.02500.pdf
A Comprehensive Introduction to Anomaly Detection in Machine Learning | USAII®
L14. Anomaly Detection
Cao nicolau-mc dermott-learning-neural-cybernetics-2018-preprint
rsec2a-2016-jheaton-morning
EMT machine learning 12th weeks : Anomaly detection
Neural Networks and Deep Learning
Anomaly Detection using Neural Networks with Pandas, Keras and Python
Ad

More from Gianmario Spacagna (9)

PDF
BUILDING Q&A EDUCATIONAL APPLICATIONS WITH LLMS - MARCH 2024.pdf
PDF
Latent Panelists Affinities: a Helixa case study
PDF
Tech leaders guide to effective building of machine learning products
PDF
Managers guide to effective building of machine learning products
PDF
In-Memory Logical Data Warehouse for accelerating Machine Learning Pipelines ...
PDF
Logical-DataWarehouse-Alluxio-meetup
PDF
Robust and declarative machine learning pipelines for predictive buying at Ba...
PDF
TunUp final presentation
PDF
Parallel Tuning of Machine Learning Algorithms, Thesis Proposal
BUILDING Q&A EDUCATIONAL APPLICATIONS WITH LLMS - MARCH 2024.pdf
Latent Panelists Affinities: a Helixa case study
Tech leaders guide to effective building of machine learning products
Managers guide to effective building of machine learning products
In-Memory Logical Data Warehouse for accelerating Machine Learning Pipelines ...
Logical-DataWarehouse-Alluxio-meetup
Robust and declarative machine learning pipelines for predictive buying at Ba...
TunUp final presentation
Parallel Tuning of Machine Learning Algorithms, Thesis Proposal

Recently uploaded (20)

PPTX
Acceptance and paychological effects of mandatory extra coach I classes.pptx
PPTX
05. PRACTICAL GUIDE TO MICROSOFT EXCEL.pptx
PDF
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
PPTX
IBA_Chapter_11_Slides_Final_Accessible.pptx
PPTX
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
PPT
Chapter 3 METAL JOINING.pptnnnnnnnnnnnnn
PPTX
CEE 2 REPORT G7.pptxbdbshjdgsgjgsjfiuhsd
PDF
.pdf is not working space design for the following data for the following dat...
PDF
Lecture1 pattern recognition............
PPTX
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
PDF
Foundation of Data Science unit number two notes
PPTX
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
PPTX
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
PPTX
1_Introduction to advance data techniques.pptx
PPTX
Moving the Public Sector (Government) to a Digital Adoption
PDF
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
PPTX
Database Infoormation System (DBIS).pptx
PPTX
Data_Analytics_and_PowerBI_Presentation.pptx
PPT
Reliability_Chapter_ presentation 1221.5784
PPTX
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
Acceptance and paychological effects of mandatory extra coach I classes.pptx
05. PRACTICAL GUIDE TO MICROSOFT EXCEL.pptx
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
IBA_Chapter_11_Slides_Final_Accessible.pptx
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
Chapter 3 METAL JOINING.pptnnnnnnnnnnnnn
CEE 2 REPORT G7.pptxbdbshjdgsgjgsjfiuhsd
.pdf is not working space design for the following data for the following dat...
Lecture1 pattern recognition............
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
Foundation of Data Science unit number two notes
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
1_Introduction to advance data techniques.pptx
Moving the Public Sector (Government) to a Digital Adoption
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
Database Infoormation System (DBIS).pptx
Data_Analytics_and_PowerBI_Presentation.pptx
Reliability_Chapter_ presentation 1221.5784
The THESIS FINAL-DEFENSE-PRESENTATION.pptx

Anomaly Detection using Deep Auto-Encoders

  • 1. ANOMALY DETECTION USING DEEP AUTO-ENCODERS Gianmario Spacagna
  • 2. What you will (briefly) learn – What is an anomaly (and an outlier) – Popular techniques used in shallow machine learning – Why deep learning can make the difference – Anomaly detection using deep auto—encoders – H2O overview – Code examples in Jupyter: ■ ECG pulse detection ■ MNIST digit recognition (optional)
  • 3. 1. Machine Learning – An Introduction 2. Neural Networks 3. Deep Learning Fundamentals 4. Unsupervised Feature Learning 5. Image Recognition 6. Recurrent Neural Networks and Languages Models 7. Deep Learning for Board Games 8. Deep Learning for Computer Games 9. Anomaly Detection 10. Building a Production-ready Intrusion Detection System
  • 4. Why this use case? ■ Anomaly detection is crucial to many business applications ■ Smart feature representation => better anomaly detection ■ Deep Learning works very well on learning relationships in the underlying raw data (will see how…)
  • 5. Outlier vs Anomaly “An outlier is a legitimate data point that’s far away from the mean or median in a distribution. It may be unusual, like a 9.6-second 100-meter dash, but still within the realm of reality. An anomaly is an illegitimate data point that’s generated by a different process than whatever generated the rest of the data.” Ravi Parikh http://data.heapanalytics.com/garbage-in-garbage-out-how-anomalies- can-wreck-your-data
  • 6. Data modeling ■ Point anomaly (e.g. black sheep) ■ Contextual anomaly (e.g. selling ice-creams in January) ■ Collective anomaly (e.g. sequence of suspected credit card activities)
  • 7. Detection modeling (and its limitations) ■ Supervised (classification) – Data skewness, lack of counter examples ■ Unsupervised (clustering) – Curse of dimensionality ■ Semi-supervised (novelty detection) – Require a “normal” training dataset
  • 8. Real world applications ■ Manufacturing => hardware faults ■ Law-enforcement => reveal criminal activities ■ Network system => detect intrusions or anomalous behaviors ■ Internet Security => malware detection ■ Financial services => frauds ■ Marketing / business strategy => spotting profitable customers ■ Healthcare => Medical diagnosis
  • 9. What’s the challenge? “Coming up with features is difficult, time-consuming, requires expert knowledge. When working applications of learning, we spend a lot of time tuning features.“ Andrew Ng, Machine Learning and AI via Brain simulations, Stanford University
  • 10. Hierarchical Feature Learning NVIDIA Deep Learning Course: Class #1 – Introduction to Deep Learning https://www.youtube.com/watch?v=6eBpjEdgSm0
  • 11. Structural representation Advanced Topics, http://slideplayer.com/slide/3471890/
  • 12. Signal propagation Schematic diagram of back-propagation neural networks with two hidden layers. Factor selection for delay analysis using Knowledge Discovery in Databases
  • 13. Auto-encoders • Signal propagation output: approximate an identity function • Error back propagation: Mean Squared Error MSE (*) between the original datum and the reconstructed one (*) in case of numerical data
  • 14. Novelty detection using auto-encoders 1. Identify a training dataset of what is considered “normal” 2. Learn what “normal” means aka. learn the structures of normal behavior 3. Try to reconstruct never-seen points re-using the same structure, if the error is high means the point deviates from the normal distribution TRAIN Auto-Encoder RECONSTRUCT RECONSTRUCT Low error High error
  • 15. Features compression ■ Use just the encoder to compress data into a reduced dimensional space then use traditional unsupervised learning Tom Mitchell’s example of an auto-encoder: You can represent any combination of the 8 binary inputs using only 3 decimal values
  • 17. Examples ■ ECG Anomaly Pulse Detection ■ MNIST Anomaly Digit Recognition (Optional) ■ Jupyter notebooks available on https://github.com/packtmayur/Python-Deep-Learning/tree/master/chapter_9
  • 18. Summary ■ We listed a few real-world applications of anomaly detection ■ We covered some of the most popular techniques in the literature with their limitations ■ We proposed an overview of how deep neural networks work and why they are great for learning smart feature representations ■ We proposed 2 semi-supervised approaches using deep auto-encoders: – Novel detection – Feature compression
  • 19. Going deeper ■ Advanced modeling: – Denoising auto-encoders – Contractive auto-encoders – Sparse auto-encoders – Variational auto-encoders (for better novelty detection) – Stacked auto-encoders (for better feature compression) ■ Building a production-ready intrusion detection system – Validating and testing with labels and in absence of ground truth – Evaluation KPIs for anomaly detection – A/B(C/D) testing
  • 20. "Data scientists realize that their best days coincide with discovery of truly odd features in the data." Haystacks and Needles: Anomaly Detection By: Gerhard Pilcher & Kenny Darrell, Data Mining Analyst, Elder Research, Inc.