Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2020 Nov 30;22(12):1363.
doi: 10.3390/e22121363.

Functional Kernel Density Estimation: Point and Fourier Approaches to Time Series Anomaly Detection

Affiliations

Functional Kernel Density Estimation: Point and Fourier Approaches to Time Series Anomaly Detection

Michael R Lindstrom et al. Entropy (Basel). .

Abstract

We present an unsupervised method to detect anomalous time series among a collection of time series. To do so, we extend traditional Kernel Density Estimation for estimating probability distributions in Euclidean space to Hilbert spaces. The estimated probability densities we derive can be obtained formally through treating each series as a point in a Hilbert space, placing a kernel at those points, and summing the kernels (a "point approach"), or through using Kernel Density Estimation to approximate the distributions of Fourier mode coefficients to infer a probability density (a "Fourier approach"). We refer to these approaches as Functional Kernel Density Estimation for Anomaly Detection as they both yield functionals that can score a time series for how anomalous it is. Both methods naturally handle missing data and apply to a variety of settings, performing well when compared with an outlyingness score derived from a boxplot method for functional data, with a Principal Component Analysis approach for functional data, and with the Functional Isolation Forest method. We illustrate the use of the proposed methods with aviation safety report data from the International Air Transport Association (IATA).

Keywords: anomaly detection; kernel density estimation; missing data; time series; unsupervised learning.

PubMed Disclaimer

Conflict of interest statement

The authors declare no conflict of interest.

Figures

Figure 1
Figure 1
A visual depiction of the Point method. The curves are time series in a Hilbert space H but after applying KDE, there is a score associated to each point in H. In the cartoon, curves 1 and 2 are similar and curve 3 is anomalous. (Left): the time series. (Right): a representation of them with associated scores in the color scale. In reality, the space is infinite dimensional and this is only a conceptual illustration.
Figure 2
Figure 2
Plot of 63 normal curves and the 7 anomalous curves Ci(t), i=1,,7. Left: un-normalized. Right: normalized.
Figure 3
Figure 3
Histogram of scores for Point and Fourier methods for Type A Point (top-left), Type A Fourier(top-right), Type B Point (bottom-left) and Type B Fourier (bottom-right). The dashed vertical line represents the division we chose between anomalous (left of line) and normal (right of line). The Sturges estimate was used to set bin widths [30].
Figure 4
Figure 4
Plots of the time series for Type A and Type B events. Anomalous are dotted curves with markers in the legend; normal curves are solid black curves.

References

    1. Cleophas T.J., Zwinderman A.H., Cleophas-Allers H.I. Machine Learning in Medicine. Volume 9 Springer; Berlin/Heidelberg, Germany: 2013.
    1. Howedi A., Lotfi A., Pourabdollah A. An Entropy-Based Approach for Anomaly Detection in Activities of Daily Living in the Presence of a Visitor. Entropy. 2020;22:845. doi: 10.3390/e22080845. - DOI - PMC - PubMed
    1. Chen X., Li Z., Wang Y., Tang J., Zhu W., Shi C., Wu H. Anomaly detection and cleaning of highway elevation data from google earth using ensemble empirical mode decomposition. J. Transp. Eng. Part Syst. 2018;144:04018015. doi: 10.1061/JTEPBS.0000138. - DOI
    1. Siboni S., Cohen A. Anomaly Detection for Individual Sequences with Applications in Identifying Malicious Tools. Entropy. 2020;22:649. doi: 10.3390/e22060649. - DOI - PMC - PubMed
    1. Bernikova O., Granichin O., Lemberg D., Redkin O., Volkovich Z. Entropy-Based Approach for the Detection of Changes in Arabic Newspapers’ Content. Entropy. 2020;22:441. doi: 10.3390/e22040441. - DOI - PMC - PubMed

LinkOut - more resources