4.4 Article Proceedings Paper

Anomaly Detection in Time Series: A Comprehensive Evaluation

期刊

PROCEEDINGS OF THE VLDB ENDOWMENT
卷 15, 期 9, 页码 1779-1797

出版社

ASSOC COMPUTING MACHINERY
DOI: 10.14778/3538598.3538602

关键词

-

资金

  1. German government as part of the LuFo VI call I program (Luftfahrtforschungsprogramm) [20D1915]

向作者/读者索取更多资源

Detecting anomalous subsequences in time series data is crucial for various fields like manufacturing processes, finance applications, and health care monitoring. An increase in the number and variety of anomaly detection algorithms has not been systematically evaluated in the past. This study carefully evaluates state-of-the-art anomaly detection algorithms to address the challenge of selecting the best detection technique for a given task.
Detecting anomalous subsequences in time series data is an important task in areas ranging from manufacturing processes over finance applications to health care monitoring. An anomaly can indicate important events, such as production faults, delivery bottlenecks, system defects, or heart flicker, and is therefore of central interest. Because time series are often large and exhibit complex patterns, data scientists have developed various specialized algorithms for the automatic detection of such anomalous patterns. The number and variety of anomaly detection algorithms has grown significantly in the past and, because many of these solutions have been developed independently and by different research communities, there is no comprehensive study that systematically evaluates and compares the different approaches. For this reason, choosing the best detection technique for a given anomaly detection task is a difficult challenge. This comprehensive, scientific study carefully evaluates most state-of-the-art anomaly detection algorithms. We collected and re-implemented 71 anomaly detection algorithms from different domains and evaluated them on 976 time series datasets. The algorithms have been selected from different algorithm families and detection approaches to represent the entire spectrum of anomaly detection techniques. In the paper, we provide a concise overview of the techniques and their commonalities; we evaluate their individual strengths and weaknesses and, thereby, consider factors, such as effectiveness, efficiency, and robustness. Our experimental results should ease the algorithm selection problem and open up new research directions.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.4
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据