12.03.2016 Views

Anomaly Detection for Monitoring

anomaly-detection-monitoring

anomaly-detection-monitoring

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

A Real Example of <strong>Anomaly</strong> <strong>Detection</strong><br />

Around the year 2008, Evan Miller published a paper describing<br />

real-time anomaly detection in operation at IMVU. 1 This was<br />

Baron’s first exposure to anomaly detection:<br />

At approximately 5 AM Friday, it first detects a problem [in the<br />

number of IMVU users who invited their Hotmail contacts to open<br />

an account], which persists most of the day. In fact, an external service<br />

provider had changed an interface early Friday morning,<br />

affecting some but not all of our users.<br />

The following images from that paper show the metric and its deviation<br />

from the usual behavior.<br />

They detected an unusual change in a really erratic signal. Mind.<br />

Blown. Magic!<br />

The anomaly detection method was Holt-Winters <strong>for</strong>ecasting. It is<br />

relatively crude by some standards, but nevertheless can be applied<br />

with good results to carefully selected metrics that follow predictable<br />

patterns. Miller went on to mention other examples where the same<br />

technique had helped engineers find problems and solve them<br />

quickly.<br />

1 “Aberrant Behavior <strong>Detection</strong> in Time Series <strong>for</strong> <strong>Monitoring</strong> Business-Critical Metrics”<br />

10 | Chapter 2: A Crash Course in <strong>Anomaly</strong> <strong>Detection</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!