Anomaly detection
The importance of recognizing
ANOMALIES IN COMPANY DATA
Whether it's human behavior or measurements from IoT devices, in the field of data science, there can always be deviations from the expected results.
These unexpected deviations are called anomalies and can indicate potential problems, the identification of which can be of great importance in numerous business areas:
- Recognizing attempts at fraud in orders
- Monitoring IoT sensor data and log files
- Ensuring compliance with purchasing processes
What is the core issue?
ANOMALIES REQUIRE SWIFT ACTION
- Think of a bug in software as an anomaly.
- The graph illustrates the relationship between the discovery of a bug in a software project and the cost of fixing it.
—that do not conform to expected behavior.
OUR SHOWCASE
Anomalies in machine log data
In our showcase, we use a concrete example to demonstrate how anomalies can be detected using artificial intelligenceand deep learning models.
The detection of data anomalies in a business context is complex.
Different forms &
TYPES OF ANOMALIES
A data record is considered abnormal when compared with the rest of the data.
A data record is considered abnormal in a specific context.
Several data sets are considered abnormal when compared with the rest of the data.
Not all roads lead to Rome
FROM DATA TO MODEL ARCHITECTURE
- Are the causal relationships in the data known?
- Is there training data with already detected anomalies?
- What types of anomalies can be expected?
The most important insights from our showcase "
" SUMMARIZED FOR YOU
In our showcase, we demonstrate how anomalies can be identified using modern deep learning models . Our solution has proven itself in practice and has been able to detect even anomalies that are difficult to detect. The ISR solution approach can be used immediately and can also be adapted to your requirements with little effort.
The algorithm achieves adetection rate of 90% in identifying artificial anomalies in the test data set.
Real anomalies could also be detected, but their rarity precludes reliable evaluation.
Combining different machine learning methods can further increase accuracy.
We see the biggest advantage in the fact that no labeled anomalies are required in advance for reliable detection. This saves a large amount of effort compared to other approaches.
The ISR balance sheet to date
59
5
59
6
In the area of anomaly detection in particular, these algorithms can provide insights into interesting business transactions and reveal security gaps for Getinge.
Take advantage of our expertise
ANOMALY DETECTION AS PART OF YOUR DATA SCIENCE PORTFOLIO
Data analysis & problem identification
Uncover problematic anomalies before they can cause damage to your business.
model training
Benefit from our experience—from the theoretical concept to the finished implementation.
end-to-end integration
Don't start from scratch – with our showcase, we have a framework that can be adapted to your use case.
Data analysis & problem identification
Uncover problematic anomalies before they can cause damage to your business.
model training
Benefit from our experience—from the theoretical concept to the finished implementation.
end-to-end integration
Don't start from scratch – with our showcase, we have a framework that can be adapted to your use case.
Our data science toolkit in the area of
DATA ANOMALIES
You might also be interested in
Our Showcase
Silvio Bergmann
Senior Manager
Analytics & Insights
silvio.bergmann@isr.de
+49(0)151 422 05 418