Time Series Anomaly Detection Model Based on Hierarchical Temporal Memory

被引:0
|
作者
Zeng W.-R. [1 ]
Wu J. [1 ]
Yan F. [2 ]
机构
[1] School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, 610054, Sichuan
[2] School of Information Science and Technology, Southwest Jiaotong University, Chengdu, 611756, Sichuan
来源
| 2018年 / Chinese Institute of Electronics卷 / 46期
关键词
Anomaly detection; Hierarchical temporal memory; Neuron network; Sparse distributed representation;
D O I
10.3969/j.issn.0372-2112.2018.02.010
中图分类号
学科分类号
摘要
Time series anomaly detection is an important area of data mining.Traditional methods of time series anomaly detection usually find the surprise, outlier, etc., by comparing the data with the historical data.However, there are some limits with these methods, such as the inaccurate separation of the sequence, the false decision of the state and the window size or the incorrect definition and judgement of the anomaly.This paper proposes a time series anomaly detection model based on hierarchical temporal memory (HTM) to overcome the shortages of the traditional methods.This method can recognize and learn the intrinsic patterns in the time series and build a prediction model to determine an anomaly by comparing the real value with the predicted one.First, sparse distributed representation (SDR) is used to represent the raw data; then, the SDR is entered into the HTM model to make prediction; lastly, the proposed model evaluates the data by computing the difference of the actual value and the predicted one.The experiments on the artificial data and the real data show that HTM can detect anomalies accurately and quickly. © 2018, Chinese Institute of Electronics. All right reserved.
引用
收藏
页码:325 / 332
页数:7
相关论文
共 17 条
  • [1] Weiss G.M., Mining with rarity: a unifying framework, ACM SIGKDD Explorations Newsletter, 6, 1, pp. 7-19, (2004)
  • [2] Basu M., Gaussian-based edge-detection methods-a survey, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 32, 3, pp. 252-260, (2002)
  • [3] Scholkopf B., Williamson R.C., Smola A.J., Et al., Support vector method for novelty detection, NIPS, pp. 582-588, (1999)
  • [4] Cheng G., Et al., A real-time anomaly detection model on sampling measurement in a high-speed network, Journal of Software, 13, 4, pp. 594-599, (2002)
  • [5] Skyline, (2017)
  • [6] Esling P., Agon C., Time-series data mining, ACM Computing Surveys (CSUR), 45, 1, (2012)
  • [7] Salvador S., Chan P., Brodie J., Learning states and rules for time series anomaly detection, FLAIRS Conference, pp. 306-311, (2004)
  • [8] Gers F.A., Schmidhuber J., Cummins F., Learning to forget: Continual prediction with LSTM, Neural Computation, 12, 10, pp. 2451-2471, (2000)
  • [9] Hawkins J., Ahmad S., Why neurons have thousands of synapses, a theory of sequence memory in neocortex, (2015)
  • [10] Hebb D.O., The Organization of Behavior: A Neuropsychological Theory, (2005)