Skip to Content
Anomaly Detection for Monitoring
book

Anomaly Detection for Monitoring

by Preetam Jinka, Baron Schwartz
March 2016
Intermediate to advanced
73 pages
1h 33m
English
O'Reilly Media, Inc.
Content preview from Anomaly Detection for Monitoring

Chapter 6. The Broader Landscape

As we’ve mentioned before, there is an extremely broad set of topics and techniques that fall into anomaly detection. In this chapter, we’ll discuss a few, as well as some popular tools that might be useful. Keep in mind that nothing works perfectly out-of-the-box for all situations. Treat the topics in this chapter as hints for further research to do on your own.

When considering the methods in this chapter, we suggest that you try to ask, “what assumptions does this make?” and “how can I assess the meaning and trustworthiness of the results?”

Shape Catalogs

In the book A New Look at Anomaly Detection by Dunning and Friedman, the authors write about a technique that uses shape catalogs. The gist of this technique is as follows. First, you have to start with a sample data set that represents the time series of a metric without any anomalies. You break this data set up into smaller windows, using a window function to mask out all but a specific region, and catalog the resulting shapes. The assumption being made is that any non-anomalous observation of this time series can be reconstructed by rearranging elements from this shape catalog. Anything that doesn’t match up to a reasonable extent is then considered to be an anomaly.

This is nice, but most machine data doesn’t really behave like an EKG chart in our experience. At least, not on a small time scale. Most machine data is much noisier than this on the second-to-second basis.

Mean Shift Analysis ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Read now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

Understanding Anomaly Detection

Understanding Anomaly Detection

Arun Kejariwal

Publisher Resources

ISBN: 9781492042341