Preprint

Double-Adversarial Activation Anomaly Detection: Adversarial Autoencoders are Anomaly Generators

Authors:
Preprints and early-stage research may not have been peer reviewed yet.
To read the file of this research, you can request a copy directly from the authors.

Abstract

Anomaly detection is a challenging task for machine learning algorithms due to the inherent class imbalance. It is costly and time-demanding to manually analyse the observed data, thus usually only few known anomalies if any are available. Inspired by generative models and the analysis of the hidden activations of neural networks, we introduce a novel unsupervised anomaly detection method called DA3D. Here, we use adversarial autoencoders to generate anomalous counterexamples based on the normal data only. These artificial anomalies used during training allow the detection of real, yet unseen anomalies. With our novel generative approach, we transform the unsupervised task of anomaly detection to a supervised one, which is more tractable by machine learning and especially deep learning methods. DA3D surpasses the performance of state-of-the-art anomaly detection methods in a purely data-driven way, where no domain knowledge is required.

No file available

Request Full-text Paper PDF

To read the file of this research,
you can request a copy directly from the authors.

ResearchGate has not been able to resolve any citations for this publication.
  • Arjovsky
[Arjovsky et al., 2017] Arjovsky, M., Chintala, S., and Bottou, L. (2017). Wasserstein GAN. arXiv:1701.07875 [cs, stat]. arXiv: 1701.07875.
Robust Anomaly Detection in Images Using Adversarial Autoencoders
  • Beggel
[Beggel et al., 2020] Beggel, L., Pfeiffer, M., and Bischl, B. (2020). Robust Anomaly Detection in Images Using Adversarial Autoencoders. In Brefeld, U., Fromont, E., Hotho, A., Knobbe, A., Maathuis, M., and Robardet, C., editors, Machine Learning and Knowledge Discovery in Databases, Lecture Notes in Computer Science, pages 206-222, Cham. Springer International Publishing.
Adam: A Method for Stochastic Optimization
  • D P Kingma
  • J Ba
and Ba, 2017] Kingma, D. P. and Ba, J. (2017). Adam: A Method for Stochastic Optimization. arXiv:1412.6980 [cs]. arXiv: 1412.6980.
MAD-GAN: Multivariate Anomaly Detection for Time Series Data with Generative Adversarial Networks
et al., 2017] Klambauer, G., Unterthiner, T., Mayr, A., and Hochreiter, S. (2017). Self-Normalizing Neural Networks. In Guyon, I., Luxburg, U. V., Bengio, S., Wallach, H., Fergus, R., Vishwanathan, S., and Garnett, R., editors, Advances in Neural Information Processing Systems 30, pages 971-980. Curran Associates, Inc. [Li et al., 2019] Li, D., Chen, D., Jin, B., Shi, L., Goh, J., and Ng, S.-K. (2019). MAD-GAN: Multivariate Anomaly Detection for Time Series Data with Generative Adversarial Networks. In Tetko, I. V., Kůrková, V., Karpov, P., and Theis, F., editors, Artificial Neural Networks and Machine Learning -ICANN 2019: Text and Time Series, Lecture Notes in Computer Science, pages 703-716, Cham. Springer International Publishing.
Detection of DoH Tunnels using Time-series Classification of Encrypted Traffic
  • J Chen
  • V Piuri
  • C Su
  • M Montazerishatoori
Detecting Malicious URLs Using Lexical Analysis. In Chen, J., Piuri, V., Su, C., and Yung, M., editors, Network and System Security, Lecture Notes in Computer Science, pages 467-482, Cham. Springer International Publishing. [MontazeriShatoori et al., 2020] MontazeriShatoori, M., Davidson, L., Kaur, G., and Lashkari, A. H. (2020). Detection of DoH Tunnels using Time-series Classification of Encrypted Traffic. In 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), pages 63-70.
Anomaly Generation Using Generative Adversarial Networks in Host-Based Intrusion Detection
et al., 2019] Pang, G., Shen, C., and van den Hengel, A. (2019). Deep Anomaly Detection with Deviation Networks. In Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, KDD '19, pages 353-362, New York, NY, USA. Association for Computing Machinery. [Ruff et al., 2020] Ruff, L., Vandermeulen, R. A., Görnitz, N., Binder, A., Müller, E., Müller, K.-R., and Kloft, M. (2020). Deep Semi-Supervised Anomaly Detection. In International Conference on Learning Representations. [Salem et al., 2018] Salem, M., Taheri, S., and Yuan, J. S. (2018). Anomaly Generation Using Generative Adversarial Networks in Host-Based Intrusion Detection. In 2018 9th IEEE Annual Ubiquitous Computing, Electronics Mobile Communication Conference (UEMCON), pages 683-687.
f-AnoGAN: Fast unsupervised anomaly detection with generative adversarial networks
et al., 2019] Schlegl, T., Seeböck, P., Waldstein, S. M., Langs, G., and Schmidt-Erfurth, U. (2019). f-AnoGAN: Fast unsupervised anomaly detection with generative adversarial networks. Medical Image Analysis, 54:30-44.
Unsupervised Anomaly Detection with Generative Adversarial Networks to Guide Marker Discovery
et al., 2017] Schlegl, T., Seeböck, P., Waldstein, S. M., Schmidt-Erfurth, U., and Langs, G. (2017). Unsupervised Anomaly Detection with Generative Adversarial Networks to Guide Marker Discovery. In Niethammer, M., Styner, M., Aylward, S., Zhu, H., Oguz, I., Yap, P.-T., and Shen, D., editors, Information Processing in Medical Imaging, Lecture Notes in Computer Science, pages 146-157, Cham. Springer International Publishing. [Schölkopf et al., 2000] Schölkopf, B., Williamson, R. C., Smola, A. J., Shawe-Taylor, J., and Platt, J. C. (2000).
A detailed analysis of the KDD CUP 99 data set
  • Sperl
Double-Adversarial Activation Anomaly Detection: Adversarial Autoencoders are Anomaly Generators A PREPRINT [Sperl et al., 2020] Sperl, P., Schulze, J.-P., and Böttinger, K. (2020). Activation Anomaly Analysis. In Machine Learning and Knowledge Discovery in Databases. arXiv: 2003.01801. [Tavallaee et al., 2009] Tavallaee, M., Bagheri, E., Lu, W., and Ghorbani, A. A. (2009). A detailed analysis of the KDD CUP 99 data set. In 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pages 1-6. ISSN: 2329-6275.