| Literature DB >> 34368422 |
Abstract
Anomalies are occurrences in a dataset that are in some way unusual and do not fit the general patterns. The concept of the anomaly is typically ill defined and perceived as vague and domain-dependent. Moreover, despite some 250 years of publications on the topic, no comprehensive and concrete overviews of the different types of anomalies have hitherto been published. By means of an extensive literature review this study therefore offers the first theoretically principled and domain-independent typology of data anomalies and presents a full overview of anomaly types and subtypes. To concretely define the concept of the anomaly and its different manifestations, the typology employs five dimensions: data type, cardinality of relationship, anomaly level, data structure, and data distribution. These fundamental and data-centric dimensions naturally yield 3 broad groups, 9 basic types, and 63 subtypes of anomalies. The typology facilitates the evaluation of the functional capabilities of anomaly detection algorithms, contributes to explainable data science, and provides insights into relevant topics such as local versus global anomalies.Entities:
Keywords: Anomalies; Anomaly detection; Deviants; Explainable data science; Outliers; Typology
Year: 2021 PMID: 34368422 PMCID: PMC8331998 DOI: 10.1007/s41060-021-00265-1
Source DB: PubMed Journal: Int J Data Sci Anal
Fig. 1Red bold occurrences illustrate the wide variety of anomalies, resulting in the anomaly being perceived as an ambiguous concept. Resolving this requires typifying all these manifestations in a single overarching framework
Existing classifications for distinguishing between anomalies.
| Reference | G/S | DC? | Classes of anomalies | Explicit classificatory dimensions |
|---|---|---|---|---|
| [ | G | Y | Extreme value ano, rare class ano, simple mixed data ano, multidimensional numerical ano, multidimensional rare class ano, multidimensional mixed data ano | Types of data, cardinality of relationship |
| [ | G | N | Extreme genuine member, contaminant | None |
| [ | G | Y | Fringelier, distant outlier | None |
| [ | G | Y | Strongest outlier, weak outlier, trivial outlier | Attribute subspace |
| [ | G | Y | white crow, in-disguise anomaly | None |
| [ | G | Y | Weak outlier, strong outlier | None |
| [ | G | N | Procedural error, extraordinary event, extraordinary observation, unique value combination | None |
| [ | G | N | Data error, normal variance, data from other distributions, distributional assumption | None |
| [ | G | N | Point anomaly, contextual anomaly, collective anomaly | None |
| [ | G | Y | Known distribution ano, sparse distribution ano, local density-based ano, global density-based ano, rare instance ano, burst ano, deviant sequence ano, trend ano, irregularity ano | None |
| [ | G | Y | Trivial outlier, non-trivial outlier | None |
| [ | S | N | Outlier, high-leverage point, influential point | None |
| [ | S | Y | Additive outlier, temporary change, level shift, innovational outlier | None |
| [ | S | Y | Isolated outlier, patch outlier, level shift | None |
| [ | S | Y | Isolated outlier, shift outlier, amplitude outlier, shape outlier | None |
| [ | S | Y | Trend anomaly, seasonality anomaly | None |
| [ | S | Y/N | Outlier, spike, stuck-at, high-noise (plus several non-data-centric anomalies) | None |
| [ | S | Y | Various spatio-temporal change patterns | Temporal, spatial, raster/vector |
| [ | S | Y | Deviant vertex, deviant edge, deviant subgraph | None |
| [ | S | Y | Near-star, near-clique, heavy vicinity, dominant edge | None |
| [ | S | Y | Insertion, update and deletion anomaly | Based on database CRUD functions |
| [ | S | Y | Foreign-symbol, foreign n-gram, rare n-gram | None |
| [ | S | Y | Positional outlier, angular outlier | None |
G/S refers to a general (broad and usually abstract) versus specific way to distinguish between classes of anomalies. DC stands for data-centric, meaning the anomalies can be distinguished by analyzing the dataset, without a reference to or dependency on external factors (such as unknown real-world events or arbitrary analyst decisions)
Fig. 2The framework for the typology of anomalies
Fig. 3The typology including all types and subtypes. Each anomaly subtype is represented by an icon that depicts the essence of the deviation. An icon that includes lines represents a set with dependent data. (Zoom in on a digital screen to see details.)
Fig. 4Real-world income data from the Polis administration with anomalies shown as large dots. The left plot has two and the right plot three numerical variables (wage and social charges). The social security code attribute is represented by color
Fig. 5(Left) Univariate social charges data from the Polis administration. Note that the vertical dimension represents random scatterplot jitter for visualization purposes. (Right) Two-dimensional synthetic dataset
Fig. 6(Left) Synthetic set with two numerical attributes and two categorical attributes (color and shape); (Right) Real-world Polis set with one categorical and three numerical attributes, and large dots representing anomalies
Fig. 8Time series and panel data anomalies. Gray dots represent individual measurements, red lines show temporal dependencies
Fig. 7Various types of anomalies in a a tree and b a cyclic graph
Fig. 10Crop biomass time series, with color representing the class of crop. The large dot in cycle 2 highlights an atomic anomaly, i.e., a data point with an unexpected class label, whereas cycle 14 is an aggregate anomaly
Fig. 9Real-world data: A and B are measurements from the Kepler space telescope. C is an aerial photograph
Illustration of using the typology to evaluate anomaly detection algorithms.
| Algorithm | Type | Remarks | |||||
|---|---|---|---|---|---|---|---|
| I | II | III | IV | V | VI | ||
| Grubbs/GESD test | a: ✓ b: × | a: × b: × | a: ✓ b: × | a: × b: × c: × d: × | a: × | a: × | Also provides statistical significance metric. ST-IIIa will be detected using quantitative data only, and thus cannot be directly distinguished from ST-Ia. |
| SECODA | a: ✓ b: ✓ | a: ✓ b: ✓ | a: ✓ b: ✓ | a: ✓ b: ✓ c: ✓ d: ✓ | a: ✓ | a: ✓ | No data type transformations or rescaling required, but vulnerable to the curse of dimensionality. ST-IIb cases are represented by high anomaly scores instead of low scores. |
| Distance-based AD | a: ✓ b: ✓ | a: × b: × | a: ✓ b: ✓ | a: ✓ b: ✓ c: × d: ✓ | a: × | a: × | Needs rescaling for optimal performance that corresponds with human intuition. With pre-processing (e.g., dummy variables or IDF) categorical data can also be analyzed. Type III occurrences cannot be directly distinguished from Type I outliers. |
Illustration of using the typology to evaluate anomaly detection algorithms, with the focus on the types.
| Type | Impact? | Useful? | Explanation [ED = equidepth / EW = equiwidth discretization] |
|---|---|---|---|
| I | Y | N | ED cannot discriminate between univariate numerical values and is intrinsically not equipped to detect this type. |
| II | N/Y | Y | ED is identical to EW when analyzing a single categorical attribute. It can be more useful than EW if the goal is to detect (non-unique) rare Type II anomalies in numerically high-density regions in an analysis of mixed data. |
| … | … | … | … |
| VI | Y | Y | ED tends to favor the detection of Type VI anomalies and can be more useful than EW if identifying them is the aim of the analysis. |