Skip to main content
Log in

Unified model for collective and point anomaly detection using stacked temporal convolution networks

  • Published:
Applied Intelligence Aims and scope Submit manuscript

Abstract

Time-series anomaly detection utilizing deep learning methods is widely used in fraud detection, network intrusion detection, and medical anomaly detection. Most deep learning methods exclusively focus on models based on recurrent neural networks (RNNs), such as long short-term memory (LSTM) or gated recurring units (GRUs), rather than on models based on convolutional neural networks (CNNs) or integrated ones. Inspired by the success of CNN-based models in many scenarios, we propose a single model that can be used for detecting both collective and point anomalies using stacked temporal convolution networks (CPA-TCN). Compared with state-of-the-art models, the CPA-TCN model boasts the following advantages. First, the CPA-TCN model reconstructs sequential features with current inputs and historical features and is only trained on normal datasets. Second, the CPA-TCN model outperforms RNN-based models in terms of speed and accuracy across diverse tasks and datasets and demonstrates more effective memory. Third, the CPA-TCN model can effectively detect both collective and point anomalies by detecting point anomalies before collective anomalies, overcoming the shortcomings of models that can either detect point or collective anomalies. Fourth, the two-part anomaly detection module can significantly improve the accuracy of point anomaly detection. Extensive experiments on real-world datasets demonstrate that our CPA-TCN model achieves better prediction results with the ROC-AUC of 98%–99% compared to state-of-the-art methods and thus has a competitive advantage.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Han J, Kamber M, Pei J (2011) Data mining concepts and techniques third edition. Morgan Kaufmann Ser Data Manag Syst 5(4):83–124

    Google Scholar 

  2. Xu D, Wang Y, Meng Y, Zhang Z (2017) An improved data anomaly detection method based on isolation forest. In: 2017 10th international symposium on computational intelligence and design (ISCID), vol 2. IEEE, pp 287–291

  3. Miao X, Liu Y, Zhao H, Li C (2018) Distributed online one-class support vector machine for anomaly detection over networks. IEEE Trans Cybern 49(4):1475–1488

    Article  Google Scholar 

  4. de Rosa G H, Roder M, Santos DFS, Costa KAP (2021) Enhancing anomaly detection through restricted boltzmann machine features projection. Int J Inf Technol 13(1):49–57

    Google Scholar 

  5. Fang Y, Wang H, Zhao L, Yu F, Wang C (2020) Dynamic knowledge graph based fake-review detection. Appl Intell 50(12):4281–4295

    Article  Google Scholar 

  6. Luo W, Liu W, Gao S (2017) Remembering history with convolutional lstm for anomaly detection. In: 2017 IEEE international conference on multimedia and expo (ICME). IEEE, pp 439–444

  7. Chouhan N, Khan A, et al. (2019) Network anomaly detection using channel boosted and residual learning based deep convolutional neural network. Appl Soft Comput 83:105612

    Article  Google Scholar 

  8. Vinayakumar R, Soman KP, Poornachandran P (2017) Applying convolutional neural network for network intrusion detection. In: 2017 international conference on advances in computing, communications and informatics (ICACCI). IEEE, pp 1222–1228

  9. Pereira J, Silveira M (2018) Unsupervised anomaly detection in energy time series data using variational recurrent autoencoders with attention. In: 2018 17th IEEE international conference on machine learning and applications (ICMLA). IEEE, pp 1275–1282

  10. Yazdi H S, Bafghi A G, et al. (2020) A drift aware adaptive method based on minimum uncertainty for anomaly detection in social networking. Expert Syst Appl 162:113881

    Article  Google Scholar 

  11. Kim T-Y, Cho S-B (2018) Web traffic anomaly detection using c-lstm neural networks. Expert Syst Appl 106:66–76

    Article  Google Scholar 

  12. Provotar O I, Linder Y M, Veres M M (2019) Unsupervised anomaly detection in time series using lstm-based autoencoders. In: 2019 IEEE international conference on advanced trends in information theory (ATIT). IEEE, pp 513–517

  13. Nanduri A, Sherry L (2016) Anomaly detection in aircraft data using recurrent neural networks (rnn). In: 2016 integrated communications navigation and surveillance (ICNS). IEEE, pp 5C2–1

  14. Qu Z, Su L, Wang X, Zheng S, Song X, Song X (2018) A unsupervised learning method of anomaly detection using gru. In: 2018 IEEE international conference on big data and smart computing (BigComp). IEEE, pp 685–688

  15. Thi N N, Le-Khac N-A, et al. (2017) One-class collective anomaly detection based on lstm-rnns. In: Transactions on large-scale data-and knowledge-centered systems XXXVI. Springer, pp 73–85

  16. Bontemps L, McDermott J, Le-Khac N-A, et al. (2016) Collective anomaly detection based on long short-term memory recurrent neural networks. In: International conference on future data and security engineering. Springer, pp 141–152

  17. Ahmed M, Mahmood A N, Hu J (2016) A survey of network anomaly detection techniques. J Netw Comput Appl 60:19–31

    Article  Google Scholar 

  18. Fengming Z, Shufang L, Zhimin G, Bo W, Shiming T, Mingming P (2017) Anomaly detection in smart grid based on encoder-decoder framework with recurrent neural network. J Chin Univ Posts Telecommun 24(6):67–73

    Article  Google Scholar 

  19. Bai S, Kolter J Z, Koltun V (2018) An empirical evaluation of generic convolutional and recurrent networks for sequence modeling. arXiv:1803.01271

  20. Zhang Z, Zhou X, Zhang X, Wang L, Wang P (2018) A model based on convolutional neural network for online transaction fraud detection. Security and Communication Networks 2018

  21. Fu K, Cheng D, Tu Y, Zhang L (2016) Credit card fraud detection using convolutional neural networks. In: International conference on neural information processing. Springer, pp 483–490

  22. Chouiekh A, Haj EL, Hassane IEL (2018) Convnets for fraud detection analysis. Procedia Comput Sci 127:133–138

    Article  Google Scholar 

  23. Salimans T, Kingma D P (2016) Weight normalization: A simple reparameterization to accelerate training of deep neural networks. arXiv:1602.07868

  24. Ha C, Tran V-D, Van L N, Than K (2019) Eliminating overfitting of probabilistic topic models on short and noisy text: The role of dropout. Int J Approx Reason 112:85–104

Download references

Acknowledgements

This work is supported by the National Nature Science Foundation of China (No. 61672329, No. 62072290), Shandong Provincial Project of Graduate Education Quality Improvement (No.SDYY18058).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hong Wang.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, Z., Xiang, Z., Gong, W. et al. Unified model for collective and point anomaly detection using stacked temporal convolution networks. Appl Intell 52, 3118–3131 (2022). https://doi.org/10.1007/s10489-021-02559-0

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10489-021-02559-0

Keywords

Navigation