An analyst applies an anomaly detection algorithm to a data set and finds a set of anomalies. Being curious, the analyst then applies the anomaly detection algorithm to the set of anomalies.

(a) Discuss the behavior of each of the anomaly detection techniques de-
scribed in this chapter. (If possible, try this for real data sets and
algorithms.)
(b) What do you think the behavior of an anomaly detection algorithm
should be when applied to a set of anomalous objects?


In some cases, such as the statistically-based anomaly detection techniques,

it would not be valid to apply the technique a second time, since the assump-
tions would no longer hold. This could also be true for other model-based

approaches. The behavior of the proximity- and density-based approaches
would depend on the particular techniques. Interestingly, the approaches
that use absolute thresholds of distance or density would likely classify the
set of anomalies as anomalies, at least if the original parameters were kept.
The relative approaches would likely classify most of the anomalies as normal
and some as anomalies.
Whether an object is anomalous depends on the the entire group of objects,
and thus, it is probably unreasonable to expect that an anomaly detection
technique will identify a set of anomalies as such in the absence of the original
data set.

Computer Science & Information Technology

You might also like to view...

What type of report lists field names in a row across the page with the corresponding data below?

A. detailed columnar B. detailed tabular C. unbound D. multiple-column

Computer Science & Information Technology

When text wrapping is set to something other than ________, the object will be anchored to a paragraph

A) Top and Bottom B) In Line with Text C) Square D) Tight

Computer Science & Information Technology

By default, tracked changes are indicated by ________ on the right side of the document

A) blue squares B) check marks C) small balloons D) red dots

Computer Science & Information Technology

Each dot in a bitmap image is called a(n) ____.

A. imagecell B. dotcell C. pixel D. piecell

Computer Science & Information Technology