Anomaly Detection Based on Compressed Data: An Information Theoretic Characterization

Alex Marchioni, Andriy Enttsel, Mauro Mangia, Riccardo Rovatti, Gianluca Setti

Research output: Contribution to journalArticlepeer-review

5 Scopus citations

Abstract

Large monitoring systems produce data that is often compressed to be transmitted over the network. For latency or security reasons, compressed data may be processed at the edge, i.e., along the path from sensors to the cloud, for some purposes such as anomaly detection. However, the performance of a detector distinguishing between normal and anomalous behavior may be affected by the loss of information due to compression. We here analyze how lossy compression affects the performance of a generic anomaly detector. This relationship is formalized in terms of information-theoretic quantities. Within such a framework we leverage a Gaussian assumption to derive analytical results regarding the importance of white noise as a representative of both the average and asymptotic anomalies. Moreover, in an anomaly-agnostic scenario, we also show the existence of a level of compression for which an anomaly is undetectable though compression is not completely destructive. Numerical evidence confirms that the proposed information-theoretic quantities anticipate the performance of practical compressors and detectors in the case of Gaussian and non-Gaussian signals allowing an assessment of the tradeoff between compression and detection.
Original languageEnglish (US)
Pages (from-to)1-16
Number of pages16
JournalIEEE Transactions on Systems, Man, and Cybernetics: Systems
DOIs
StatePublished - Aug 28 2023

Bibliographical note

KAUST Repository Item: Exported on 2023-09-11
Acknowledgements: This work was supported in part by PNRR-M4C2-Investimento 1.3, Partenariato Esteso— “Future Artificial Intelligence Research (FAIR)”—Spoke 8 “Pervasive AI,” funded by the European Commission through the NextGeneration EU Programme under Grant PE00000013.

Fingerprint

Dive into the research topics of 'Anomaly Detection Based on Compressed Data: An Information Theoretic Characterization'. Together they form a unique fingerprint.

Cite this