DeepSynth: A Robust Multi-Layer Neural Detection of Coordinated Latent Anomalies in High-Dimensional Identity Systems

Authors

  • Suman Kumar Sanjeev Prasanna, Xiaojun Ruan

Keywords:

Coordinated anomaly detection, Deep neural networks, Ensemble robustness, High-dimensional data, Identity systems, Latent representation learning

Abstract

The proliferation of high-dimensional, multi-modal behavioral signals in modern digital identity ecosystems has been accompanied by the evolution of adversarial strategies from isolated point anomalies to coordinated deviations across correlated feature subspaces.  Existing anomaly detection frameworks primarily model marginal feature deviations, which limits their sensitivity to the higher-order dependency structures that characterize coordinated attacks. This research introduces DeepSynth, a coordination-aware multi-layer neural framework to detect synchronized latent anomalies in complex identity ecosystems. The framework integrates hierarchical representation learning with covariance-informed latent modeling to explicitly capture inter-feature dependencies. Anomaly scoring integrates reconstruction residuals, Euclidean latent deviation, Mahalanobis distance, and a normalized covariance-based coordination metric to quantify coordinated deviations across latent features. A latent-level ensemble aggregation coupled with theoretical variance-reduction enhances robustness against noise, imbalance, and adversarial variability. Empirical evaluation on heterogeneous identity datasets comprising behavioral logs, transactional records, and synthetic attack simulations demonstrates the efficacy of the framework. DeepSynth achieves a peak detection accuracy of 93.8% and an AUC-ROC of 95.1%, significantly outperforming strong baselines including Deep SVDD, Isolation Forest, and LSTM encoder-decoders ($p < 0.01$, paired bootstrap test). Furthermore, component-wise analysis confirms that explicit latent coordination modeling provides measurable gains beyond reconstruction-only objectives. These findings establish that resolving higher-order latent dependency structures is critical for robust anomaly detection in high-dimensional identity ecosystems. Future work includes deriving theoretical generalization bounds for coordination-aware anomaly detection under evolving covariance structures

Downloads

Download data is not yet available.

References

Y. Ye, T. Li, D. Adjeroh, and S. S. Iyengar, “A survey on malware detection using data mining techniques,” ACM Comput. Surv., vol. 50, no. 3, May 2018, doi: 10.1145/3073559.

M. Kang, “Machine Learning: Anomaly Detection,” in Prognostics and Health Management of Electronics: Fundamentals, Machine Learning, and the Internet of Things. Wiley, 2018, pp. 131–162, doi: 10.1002/9781119515326.ch6.

A. Basharat, A. Gritai, and M. Shah, “Learning object motion patterns for anomaly detection,” in Proc. IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR), 2008.

S. Kumar, S. Prasanna, and X. Ruan, “A unified hybrid machine learning architecture for robust identity anomaly detection in large-scale digital ecosystems,” J. Electr. Syst., vol. 14, no. 1, pp. 160–173, 2018.

N. Papernot et al., “Scalable private learning with PATE,” in Proc. Int. Conf. Learn. Represent. (ICLR), 2018.

X. Zhu and Y. Badr, “Identity management systems for the internet of things: A survey towards blockchain solutions,” Sensors, vol. 18, no. 12, 2018, doi: 10.3390/s18124215.

N. Papernot et al., “Scalable private learning with PATE,” in Proc. Int. Conf. Learn. Represent. (ICLR), 2018.

M. Iturbe, I. Garitano, U. Zurutuza, and R. Uribeetxeberria, “Towards large-scale, heterogeneous anomaly detection systems in industrial networks: A survey of current trends,” Hindawi, 2017, doi: 10.1155/2017/9150965.

W. G. Hatcher and W. Yu, “A survey of deep learning: Platforms, applications and emerging research trends,” IEEE Access, vol. 6, pp. 24411–24432, 2018, doi: 10.1109/ACCESS.2018.2830661.

N. Souly, C. Spampinato, and M. Shah, “Semi-supervised semantic segmentation using generative adversarial network,” in Proc. IEEE Int. Conf. Comput. Vis. (ICCV), 2017, pp. 5689–5697, doi: 10.1109/ICCV.2017.606.

Y. Ikeda, K. Tajiri, Y. Nakano, K. Watanabe, and K. Ishibashi, “Estimation of dimensions contributing to detected anomalies with variational autoencoders,” Nov. 2018. [Online]. Available: https://arxiv.org/pdf/1811.04576

H. Zenati, M. Romain, C. S. Foo, B. Lecouat, and V. Chandrasekhar, “Adversarially learned anomaly detection,” in Proc. IEEE Int. Conf. Data Mining (ICDM), 2018, pp. 727–736, doi: 10.1109/ICDM.2018.00088.

S. K. Lim, Y. Loo, N. T. Tran, N. M. Cheung, G. Roig, and Y. Elovici, “DOPING: Generative data augmentation for unsupervised anomaly detection with GAN,” in Proc. IEEE Int. Conf. Data Mining (ICDM), 2018, pp. 1122–1127, doi: 10.1109/ICDM.2018.00146.

Y. Thu, K. Takabuchi, K. Fukai, and N. Iwahashi, “Robot language acquisition based on sequence-to-sequence learning,” 2017. [Online]. Available: https://meral.edu.mm/record/5000/files/proceeding_total-pages-461-472.pdf

J. Ker, L. Wang, J. Rao, and T. Lim, “Deep learning applications in medical image analysis,” IEEE Access, vol. 6, pp. 9375–9379, 2017, doi: 10.1109/ACCESS.2017.2788044.

L. Ruff et al., “Deep one-class classification,” in Proc. Int. Conf. Mach. Learn. (ICML), 2018. [Online]. Available: https://proceedings.mlr.press/v80/ruff18a.html

B. Zong et al., “Deep autoencoding Gaussian mixture model for unsupervised anomaly detection,” in Proc. Int. Conf. Learn. Represent. (ICLR), 2018. [Online]. Available: https://openreview.net/forum?id=BJJLHbb0-

N. Chawla and W. Wang, “Front matter,” in Proc. SIAM Int. Conf. Data Mining, 2017, pp. 1–10, doi: 10.1137/1.9781611974973. fm.

Z. I. Skordilis et al., “Multichannel speech enhancement using MEMS microphones,” in Proc. IEEE Int. Conf. Acoust., Speech Signal Process. (ICASSP), 2015, pp. 2729–2733, doi: 10.1109/ICASSP.2015.7178467.

S. Byon et al., “Network connectivity of IPTV STB low power mode,” in Proc. Int. Conf. Platform Technol. Service (PlatCon), 2016, doi: 10.1109/PlatCon.2016.7456809.

S. M. Erfani, S. Rajasegarar, S. Karunasekera, and C. Leckie, “High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning,” Pattern Recognit., vol. 58, pp. 121–134, 2016, doi: 10.1016/j.patcog.2016.03.028.

P. Malhotra et al., “LSTM-based encoder-decoder for multi-sensor anomaly detection,” Jul. 2016.

B. R. Kiran, D. M. Thomas, and R. Parakkal, “An overview of deep learning based methods for unsupervised and semi-supervised anomaly detection in videos,” 2018, doi: 10.3390/jimaging4020036.

D. Xu, E. Ricci, Y. Yan, J. Song, and N. Sebe, “Learning deep representations of appearance and motion for anomalous event detection,” in BMVC, 2015, pp. 8.1–8.12, doi: 10.5244/c.29.8.

C. Shen, Y. Qi, J. Wang, G. Cai, and Z. Zhu, “An automatic and robust feature learning method for rotating machinery fault diagnosis based on contractive autoencoder,” Eng. Appl. Artif. Intell., vol. 76, pp. 170–184, 2018, doi: 10.1016/j.engappai.2018.09.010.

S. Rayana and L. Akoglu, “Less is more: Building selective anomaly ensembles,” ACM Trans. Knowl. Discov. Data, vol. 10, no. 4, May 2016, doi: 10.1145/2890508.

A. Singh, “Anomaly detection for temporal data using long short-term memory (LSTM),” 2017. [Online]. Available: https://www.diva-portal.org/smash/record.jsf?pid=diva2:1149130

Y. Guo et al., “Multidimensional time series anomaly detection: A GRU-based Gaussian mixture variational autoencoder approach,” in Proc. Mach. Learn. Res., 2018, pp. 97–112. [Online]. Available: http://proceedings.mlr.press/v95/guo18a.html

Q. Leng, H. Qi, J. Miao, W. Zhu, and G. Su, “One-class classification with extreme learning machine,” Math. Probl. Eng., vol. 2015, 2015, doi: 10.1155/2015/412957.

Downloads

Published

20.03.2019

How to Cite

Suman Kumar Sanjeev Prasanna. (2019). DeepSynth: A Robust Multi-Layer Neural Detection of Coordinated Latent Anomalies in High-Dimensional Identity Systems . International Journal of Intelligent Systems and Applications in Engineering, 7(1), 66–77. Retrieved from https://www.ijisae.org/index.php/IJISAE/article/view/8101

Issue

Section

Research Article