Contrastive Learning-Based Anomaly Detection for Actual Corporate Environments
Author:
An Gi-taek12ORCID, Park Jung-min1, Lee Kyung-soon2
Affiliation:
1. Korea Food Research Institute, Wanju-gun 55365, Republic of Korea 2. Division of Computer Science and Artificial Intelligence, CAIIT, Jeonbuk National University, Jeonju 54896, Republic of Korea
Abstract
Information systems play an important role in business management, especially in personnel, budget, and financial management. If an anomaly ensues in an information system, all operations are paralyzed until their recovery. In this study, we propose a method for collecting and labeling datasets from actual operating systems in corporate environments for deep learning. The construction of a dataset from actual operating systems in a company’s information system involves constraints. Collecting anomalous data from these systems is challenging because of the need to maintain system stability. Even with data collected over a long period, the training dataset may have an imbalance of normal and anomalous data. We propose a method that utilizes contrastive learning with data augmentation through negative sampling for anomaly detection, which is particularly suitable for small datasets. To evaluate the effectiveness of the proposed method, we compared it with traditional deep learning models, such as the convolutional neural network (CNN) and long short-term memory (LSTM). The proposed method achieved a true positive rate (TPR) of 99.47%, whereas CNN and LSTM achieved TPRs of 98.8% and 98.67%, respectively. The experimental results demonstrate the method’s effectiveness in utilizing contrastive learning and detecting anomalies in small datasets from a company’s information system.
Funder
Ministry of Science and ICT
Subject
Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry
Reference42 articles.
1. An Practical Study on the Effect of ERP System Introduction Type on the Enterprise’s IT· SW Utilization;Yang;J. Inf. Technol. Serv.,2021 2. Hou, X., and Zhang, L. (2007, January 17–22). Saliency detection: A spectral residual approach. Proceedings of the 2007 IEEE Conference on Computer Vision and Pattern Recognition, Minneapolis, MN, USA. 3. Ensemble Model for Detecting Abnormal Symptoms of IT Infrastructure using Time Series Access Log Data;Kim;J. KIISE,2021 4. Ren, H., Xu, B., Wang, Y., Yi, C., Huang, C., Kou, X., Xing, T., Yang, M., Tong, J., and Zhang, Q. (2019, January 4–8). Time-series anomaly detection service at microsoft. Proceedings of the 25th ACM SIGKDD International Conference on knowledge Discovery & Data Mining, Anchorage, AK, USA. 5. Du, M., Li, F., Zheng, G., and Srikumar, V. (November, January 30). Deeplog: Anomaly detection and diagnosis from system logs through deep learning. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, USA.
|
|