LSTM can successfully use the additional campaign
information in a multivariate manner to learn the sud-
den increases in campaign periods. Even if some of
the data points in such periods are labeled as anomaly,
smaller anomaly scores will be produced by the mul-
tivariate LSTM and thus prevent some of the false
alarms depending on the pre-determined sensitivity
level of the system.
Our results suggest that the proposed anomaly de-
tection method is able to accurately detect the anoma-
lies that occur in the predetermined KPIs. Although
a carefully designed labeling process is performed by
four experts in our study, the human bias during the
labeling process can be regarded as a limitation. How-
ever, we should note that this limitation is not specific
to our study but a limitation of the time-series based
anomaly detection studies in general. As a future di-
rection, multiple anomaly detection algorithms can be
used in a hybrid way to improve the general success
rate.
ACKNOWLEDGEMENTS
This study is supported under project number
3170803 by The Scientific and Technological Re-
search Council of Turkey (T
¨
UB
˙
ITAK) Technology
and Innovation Grant Programs Directorate (TEY-
DEB).
REFERENCES
Ahmad, S., Lavin, A., Purdy, S., and Agha, Z. (2017). Un-
supervised real-time anomaly detection for streaming
data. Neurocomputing, 262(June):134–147.
Bhuyan, M. H., Bhattacharyya, D. K., and Kalita, J. K.
(2014). Network anomaly detection: Methods, sys-
tems and tools. IEEE Communications Surveys and
Tutorials, 16(1):303–336.
Chandola, V. (2009). Anomaly Detection : A Survey. ACM
Computing Surveys, 41(3):1–72.
Chevallier, J., Goutte, S., Chevallier, J., and Goutte, S.
(2014). Detecting jumps and regime switches in in-
ternational stock markets returns. Applied Economics
Letters, 22(13):1011–1019.
Evangelist, M., Editor, E., and Land, S. E. (2012). Ad-
vanced web metrics with Google Analytics. John Wi-
ley & Sons.
Goldstein, M. and Uchida, S. (2016). A comparative eval-
uation of unsupervised anomaly detection algorithms
for multivariate data. PLoS ONE, 11(4):1–31.
Hiles, A., Hon, F., et al. (2016). E-Business Service
Level Agreements: Strategies for Service Providers,
E-Commerce and Outsourcing. Rothstein Publishing.
Hochenbaum, J., Vallis, O. S., and Kejariwal, A. (2017).
Automatic Anomaly Detection in the Cloud Via Sta-
tistical Learning. arXiv e-prints. arXiv:1704.07706.
Hochreiter, S. and Urgen Schmidhuber, J. (1997). Long
short-term memory. Neural Computation, 9(8):1735–
1780.
Hyndman, R. J. and Athanasopoulos, G. (2018). Forecast-
ing: Principles and Practice. OText.
Knorn, F. and Leith, D. J. (2008). Adaptive Kalman fil-
tering for anomaly detection in software appliances.
Proceedings - IEEE INFOCOM.
Laudon, K. C. and Traver, C. G. (2016). E-commerce 2016:
business. technology. society. Pearson Education.
Malik, H. and Shakshuki, E. M. (2017). Detecting per-
formance anomalies in large-scale software systems
using entropy. Personal and Ubiquitous Computing,
21(6):1127–1137.
Massa, D. and Valverde, R. (2014). A Fraud Detection Sys-
tem Based on Anomaly Intrusion Detection Systems
for E-Commerce Applications. Computer and Infor-
mation Science, 7(2):117–140.
Raghava-raju, A. (2017). Predicting Fraud in Elec-
tronic Commerce : Fraud Detection Techniques in E-
Commerce. International Journal of Computer Appli-
cations, 171(2):18–22.
Ramakrishnan, J., Shaabani, E., Li, C., and Sustik, M. A.
(2019). Anomaly Detection for an E-commerce Pric-
ing System. arXiv e-prints. arXiv:1902.09566.
Ruiz, C. W., Perapoch, J., Castillo, F., Salcedo, S., and
Gratac
´
os, E. (1994). Learning Long-Term Dependen-
cies with Gradient Descent is Difficult. IEEE TRANS-
ACTIONS ON NEURAL NETWORKS, 5(2):157–166.
Singh, A. (2017). Anomaly Detection for Temporal Data
using Long Short-Term Memory ( LSTM ). Master’s
thesis, KTH Information and Communication Tech-
nology.
Siwoon Son, Myeong-Seon Gil, and Moon, Y.-S. (2017).
Anomaly detection for big log data using a Hadoop
ecosystem. 2017 IEEE International Conference on
Big Data and Smart Computing (BigComp), pages
377–380.
Yang, Z., Cao, S., and Yan, B. (2011). Using linear discrim-
inant analysis and data mining approaches to identify
E-commerce anomaly. Proceedings - 2011 7th Inter-
national Conference on Natural Computation, ICNC
2011, 4:2406–2410.
Yelundur, A. R., Sengamedu, S. H., and Mishra, B. (2018).
E-commerce Anomaly Detection: A Bayesian Semi-
Supervised Tensor Decomposition Approach using
Natural Gradients. arXiv e-prints. arXiv:1804.03836.
DATA 2019 - 8th International Conference on Data Science, Technology and Applications
224