Real-time Sentiment-Based Anomaly Detection in Twitter Data Streams

Similar documents
Believe it Today or Tomorrow? Detecting Untrustworthy Information from Dynamic Multi-Source Data

DM-Group Meeting. Subhodip Biswas 10/16/2014

Behavioral Data Mining. Lecture 2

Using HDDT to avoid instances propagation in unbalanced and evolving data streams

1 [15 points] Frequent Itemsets Generation With Map-Reduce

A Framework of Detecting Burst Events from Micro-blogging Streams

Predicting New Search-Query Cluster Volume

An Entropy-based Method for Assessing the Number of Spatial Outliers

Online Estimation of Discrete Densities using Classifier Chains

Beating Social Pulse: Understanding Information Propagation via Online Social Tagging Systems 1

Introduction to Randomized Algorithms III

A Novel Concept Drift Detection Method in Data Streams Using Ensemble Classifiers

Data Analytics Beyond OLAP. Prof. Yanlei Diao

CS246: Mining Massive Datasets Jure Leskovec, Stanford University

A Deterministic Algorithm for Summarizing Asynchronous Streams over a Sliding Window

Exploring Spatial Relationships for Knowledge Discovery in Spatial Data

8. Classifier Ensembles for Changing Environments

Test and Evaluation of an Electronic Database Selection Expert System

Yahoo! Labs Nov. 1 st, Liangjie Hong, Ph.D. Candidate Dept. of Computer Science and Engineering Lehigh University

Learning from Time-Changing Data with Adaptive Windowing

CS341 info session is on Thu 3/1 5pm in Gates415. CS246: Mining Massive Datasets Jure Leskovec, Stanford University

Discovering Geographical Topics in Twitter

Streaming multiscale anomaly detection

43400 Serdang Selangor, Malaysia Serdang Selangor, Malaysia 4

A Framework for Adaptive Anomaly Detection Based on Support Vector Data Description

An Optimized Interestingness Hotspot Discovery Framework for Large Gridded Spatio-temporal Datasets

Distributed Mining of Frequent Closed Itemsets: Some Preliminary Results

Information Retrieval and Organisation

Clustering non-stationary data streams and its applications

December 3, Dipartimento di Informatica, Università di Torino. Felicittà. Visualizing and Estimating Happiness in

CS4445 Data Mining and Knowledge Discovery in Databases. B Term 2014 Solutions Exam 2 - December 15, 2014

A MULTISCALE APPROACH TO DETECT SPATIAL-TEMPORAL OUTLIERS

Liangjie Hong, Ph.D. Candidate Dept. of Computer Science and Engineering Lehigh University Bethlehem, PA

Università di Pisa A.A Data Mining II June 13th, < {A} {B,F} {E} {A,B} {A,C,D} {F} {B,E} {C,D} > t=0 t=1 t=2 t=3 t=4 t=5 t=6 t=7

Spatial Data Science. Soumya K Ghosh

Exploring spatial decay effect in mass media and social media: a case study of China

Using Social Media for Geodemographic Applications

Aberrant Behavior Detection in Time Series for Monitoring Business-Critical Metrics (DRAFT)

Detecting Anomalous and Exceptional Behaviour on Credit Data by means of Association Rules. M. Delgado, M.D. Ruiz, M.J. Martin-Bautista, D.

Comparison of the NCEP and DTC Verification Software Packages

Identification of Bursts in a Document Stream

CS5112: Algorithms and Data Structures for Applications

Crowd-Learning: Improving the Quality of Crowdsourcing Using Sequential Learning

5. Simulated Annealing 5.2 Advanced Concepts. Fall 2010 Instructor: Dr. Masoud Yaghini

Algorithmic Methods of Data Mining, Fall 2005, Course overview 1. Course overview

Concept Drift. Albert Bifet. March 2012

P leiades: Subspace Clustering and Evaluation

Training the linear classifier

Forecasting Using Time Series Models

Time-Series Analysis Prediction Similarity between Time-series Symbolic Approximation SAX References. Time-Series Streams

Supplementary Information for Emotional persistence in online chatting communities

Predictive analysis on Multivariate, Time Series datasets using Shapelets

Adaptively Detecting Changes in Autonomic Grid Computing

A REVIEW ARTICLE ON NAIVE BAYES CLASSIFIER WITH VARIOUS SMOOTHING TECHNIQUES

CS570 Data Mining. Anomaly Detection. Li Xiong. Slide credits: Tan, Steinbach, Kumar Jiawei Han and Micheline Kamber.

Evaluating Electricity Theft Detectors in Smart Grid Networks. Group 5:

TREND DETECTION IN SOCIAL DATA

Unsupervised Anomaly Detection for High Dimensional Data

Adaptive Learning and Mining for Data Streams and Frequent Patterns

The AAFCO Proficiency Testing Program Statistics and Reporting

Mining Approximate Top-K Subspace Anomalies in Multi-Dimensional Time-Series Data

The Changing Landscape of Land Administration

Reducing Computation Time for the Analysis of Large Social Science Datasets

DANIEL WILSON AND BEN CONKLIN. Integrating AI with Foundation Intelligence for Actionable Intelligence

The effect on accuracy of tweet sample size for hashtag segmentation dictionary construction

Generalisation and Multiple Representation of Location-Based Social Media Data

Robust and Rapid Adaption for Concept Drift in Software System Anomaly Detection

Finding Robust Solutions to Dynamic Optimization Problems

Detecting Origin-Destination Mobility Flows From Geotagged Tweets in Greater Los Angeles Area

Construction and Analysis of Climate Networks

Clustering. CSL465/603 - Fall 2016 Narayanan C Krishnan

Whom to Ask? Jury Selection for Decision Making Tasks on Micro-blog Services

Data Mining Prof. Pabitra Mitra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur

Anomaly Detection for the CERN Large Hadron Collider injection magnets

Optimizing Abstaining Classifiers using ROC Analysis. Tadek Pietraszek / 'tʌ dek pɪe 'trʌ ʃek / ICML 2005 August 9, 2005

Measurement of Burst Topic in Microblog

Some Mathematical Models to Turn Social Media into Knowledge

AN INTERNATIONAL SOLAR IRRADIANCE DATA INGEST SYSTEM FOR FORECASTING SOLAR POWER AND AGRICULTURAL CROP YIELDS

Fast Comparison of Software Birthmarks for Detecting the Theft with the Search Engine

A Post-Aggregation Error Record Extraction Based on Naive Bayes for Statistical Survey Enumeration

Mining State Dependencies Between Multiple Sensor Data Sources

Processing Count Queries over Event Streams at Multiple Time Granularities

State of the Art on Mass Spectrometry : Focus and Critical Quality Issues

Exploring Climate Patterns Embedded in Global Climate Change Datasets

Glossary. The ISI glossary of statistical terms provides definitions in a number of different languages:

How to Read 100 Million Blogs (& Classify Deaths Without Physicians)

Click Prediction and Preference Ranking of RSS Feeds

Chapter 6. Frequent Pattern Mining: Concepts and Apriori. Meng Jiang CSE 40647/60647 Data Science Fall 2017 Introduction to Data Mining

Frank C Porter and Ilya Narsky: Statistical Analysis Techniques in Particle Physics Chap. c /9/9 page 331 le-tex

Machine Learning Analyses of Meteor Data

GLOBAL NEEDS TO BE ADDRESSED IN A STRATEGIC PLAN FOR SPACE WEATHER. Developing products and services in space weather: Space Weather Channel in China

WMO Aeronautical Meteorology Scientific Conference 2017

Classification Based on Logical Concept Analysis

Machine Learning Ensemble Learning I Hamid R. Rabiee Jafar Muhammadi, Alireza Ghasemi Spring /

CS246 Final Exam, Winter 2011

Ontology-Based News Recommendation

4/26/2017. More algorithms for streams: Each element of data stream is a tuple Given a list of keys S Determine which tuples of stream are in S

Reductionist View: A Priori Algorithm and Vector-Space Text Retrieval. Sargur Srihari University at Buffalo The State University of New York

Supplementary Information Activity driven modeling of time varying networks

COMS 4721: Machine Learning for Data Science Lecture 20, 4/11/2017

Transcription:

Real-time Sentiment-Based Anomaly Detection in Twitter Data Streams Khantil Patel, Orland Hoeber, and Howard J. Hamilton Department of Computer Science University of Regina, Canada patel26k@uregina.ca, orland.hoeber@uregina.ca, howard.hamilton@uregina.ca Abstract. We propose an approach for real-time sentiment-based anomaly detection (RSAD) in Twitter data streams. Sentiment classification is used to split the data into independent streams (positive, neutral, and negative), which are then analyzed for anomalous spikes in the number of tweets. Four approaches for evaluating the data streams are studied, along with the parameters that adjust their sensitivity. Results from an evaluation show the effectiveness of a probabilistic exponentially weighted moving average (PEWMA) coupled with a sliding window that uses median absolute deviation (MAD). 1 Introduction Time-series data streams have become a popular way of characterizing the data generated by real-time applications with a temporal attribute. Since such data can introduce new patterns very quickly, data stream mining has drawn interest from many researchers, with a focus on developing anomaly detection techniques that are both computationally efficient and memory efficient [4, 5, 10]. Anomaly detection in time-series data streams is challenging in three aspects [11]: (1) the dynamic nature of the data streams may result in changes in the data distributions over time (called concept drift); (2) storing the data for further analysis is not feasible given the high-velocity and infinite nature the data; and (3) the analysis must happen sufficiently quickly to be able to operate in real-time. Twitter has become a popular micro-blogging platform where millions of users express their opinions on a wide range of topics on a daily basis via tweets, producing large amounts of data every second that can be modelled as time-series data streams and analyzed for anomalies. Twitter allows real-time collection of streams of tweets related to any specified topic keywords, hash tags, or user names through their public streams service [13]. This easy access to the data has enabled researchers to study and propose a broad range of techniques, including visual analytics [6, 8], sentiment analysis [2, 12], and anomaly detection [5]. The work in this paper is motivated by the challenge of providing users with timely information about different opinions relevant to topics of interest without requiring continual observation. In order to derive public opinions, tweets can

be subjected to sentiment classification, resulting in a labelling of individual tweets as positive, neutral, or negative [2]. A visual analytics based approach has been used in our prior work to discover and analyze the temporally changing sentiment of tweets posted by fans in response to micro-events occurring during a multi-day sporting event [6]. However, with this approach, in order to discover emerging micro-events that are causing significant increases in positive, neutral, or negative tweets, one must analyze data continuously. The goal of the research described in this paper is to detect in real-time anomalies in Twitter sentiment data streams, providing alerts to the analysts of the change, and enabling them to conduct further analysis immediately. Real-time sentiment-based anomaly detection (RSAD) starts by classifying the tweets and aggregating them in temporal bins of a fixed interval (e.g., 15 minutes). Candidate anomalies are detected based on their deviation from the distribution of recent data; these are then compared to other previously seen anomalies within a sliding window to identify legitimate anomalies. This approach is resilient to concept drift, makes use of an incrementally updatable model, and is efficient enough to handle high-velocity data streams. 2 Methodology We consider a data point to be an anomaly if it deviates sufficiently from nearby data points or a specified group of data points in the past. We define a candidate anomaly to be a data point that deviates from the local or nearby data points. Moreover, if this candidate anomaly deviates from the group of other previously detected candidate anomalies in some limited timeframe, we consider it a legitimate anomaly. In the remainder of this section, we explain the approach used in RSAD to detect these types of anomalies. 2.1 Pre-Processing A unique feature of RSAD is the detection of anomalies within pre-classified data streams. The rationale for this is to allow for the independent detection of anomalous increases in tweets that are positive, neutral, or negative in nature. From the perspective of anomaly detection, we can consider the classification process as a pre-processing step. We use an online sentiment analysis service called Sentiment140 [12], which was designed specifically to address the short and cryptic nature of English language tweets. In order to turn the streams of tweets into time-series data, we aggregate them over a pre-determined interval of time (e.g., 15 minutes). The granularity of this binning will affect the sensitivity to small-scale vs. large-scale anomalies and can be set based on an expectation of the velocity patterns of the tweets for the given query. Since the goal is to analyze these data streams only based on the tweet frequency, once the classification and temporal binning are performed, the actual contents of the tweets are forgotten. All that remains is the number of positive, neutral, and negative tweets that were seen in each time period. These frequency counts serve as the data points (d t ) for anomaly detection stage.

2.2 Candidate Anomaly Detection To detect the candidate anomalies from among the local context of data points, we consider a deviation-based approach using two possible methods for determining the average of the previously seen data points: exponentially weighted moving average (EWMA) [9] and probabilistic exponentially weighted moving average (PEWMA) [3]. While each of both these approaches have been used to detect outliers in streaming data in two separate contexts [3, 8], it is not clear which is most appropriate for the RDAS approach and Twitter data. An anomaly score of a data point d t is calculated to represent its deviation from the mean of the data points in its neighbourhood. The candidate anomaly score (CAS) is evaluated using following formula: CAS(d t ) = d t µ c(t 1) µ c(t 1) (1) where t is the time of current bin, and µ c(t 1) = N i=(t 1) d i is the mean of recent data points. CAS was adapted from the A-ODDS technique [10], in which the neighbourhood density of each data point is determined using a probability density estimator and then the anomaly score of a data point is computed in terms of the relative distance between its neighbourhood density and the average neighbourhood density of recent data points. In the A-ODDS approach, the neighbourhood consists of a set of data points up to radius r on both sides of the data point. In the streaming context, the local neighbours of an newly arrived data point are the ones that recently arrived because the following data points have not yet been received. Thus, in our work, CAS is the relative distance of d t to the mean of the recent data points. If the CAS of the current data point is near zero; the point is close to the other data points. If the CAS of the current data point is a large value, then it is significantly larger or smaller than the other data points. In order to label the current data point as a candidate anomaly, the CAS should be larger than the standard deviation of the previously seen data points by some factor. The threshold condition for a data point d t to be so labeled is given as: CAS(d t ) > τ c σ c(t 1) (2) 1 N where σ c(t 1) = N i=(t 1) (d i µ c(t 1) ) 2 is the standard deviation of the of recent data points, and τ c is a threshold factor for candidate anomalies. τ c can be set by a domain expert according to the particular features of the data stream. A lower value of τ c increases sensitively to clustered anomalies, whereas a higher value increases sensitivity to dispersed anomalies. With each new data point, it is necessary to update µ c(t) and σ c(t). A naïve approach is to maintain all the data points in the N previous steps, and use the standard formulation to evaluate µ c(t) and σ c(t). However, it would be difficult to determine an appropriate value for N that would be feasible in the streaming context without losing accuracy. Another approach is to use an exponentially

weighted moving average (EWMA) [9] and incrementally update µ c(t+1) and σ c(t+1) as given in the equations: µ c(t) = α EW MA µ c(t 1) + (1 α EW MA ) d t (3) σ c(t) = α EW MA σ c(t 1) + (1 α EW MA ) d t µ c(t 1) (4) Here 0 < α EW MA < 1 is the decay weighting factor. The α EW MA parameter controls the weight distribution between the new data point d t and the old mean µ l(t 1) ; a value of 0 implies no weight on the history, while a value of 1 implies all weight on the history. An inherent assumption with the EWMA approach is that the mean is changing gradually with respect to the exponential weighting parameter α EW MA, as shown in equation 3. Thus, a significant change in d t will result in a significant increase in µ c(t) and an even greater increase in σ c(t). To increase resiliency against such changes in d t, the value of weighting parameter α EW MA can be dynamically adjusted. More precisely, if d t changes with respect to recent data points, then a higher weight (α EW MA close to 1) should be given to the recent data points; otherwise more weight should be given to d t. Probabilistic EWMA [3] adjusts the weighting parameter based on the probability of the occurrence of the value of the current data point. The probabilistic weighting parameter is given as α P EW MA = α EW MA (1 βp t ), where P t is the probability of occurrence of d t and β is the weight placed on P t. The parameter α EW MA is multiplied by (1 βp t ) to reduce the influence of abrupt change in d t on the moving average. The probability density estimator equation with the standard normal distribution for P t is given as P t = 1 2π exp ( Z2 t 2 ). While evaluating P t for the current data point d t, it may happen that P t 0, if σ c(t 1). To avoid such situations, normalization is applied to the input data points to obtain a zero-mean and unit standard deviation random variable Z t = (d t µ l ) /σ l. The factor 1 2π is the constant height and it is selected to normalize P t such that 0 < P t < 1 2π. The drawback of considering the standard normal distribution is that for larger value of d t, P t 0. However, our approach does not require that the deviation of d t be large, as long as it is sufficiently deviated from the underlying data distribution. By adjusting equation 3, with the probabilistic weighting factor [3], we get: µ c(t) = α P EW MA µ c(t 1) + (1 α P EW MA ) d t (5) 2.3 Legitimate Anomaly Detection To detect whether a candidate anomaly should be considered a legitimate anomaly, we use a one-sided sliding window of length W t (e.g., 6 days). In contrast to the conventional method of maintaining all past data points in the sliding window, we maintain only those data points that are identified as candidate anomalies. We consider a window-based deviation approach using two possible methods for determining the deviation of the data points in the window: standard deviation

(STD), based on the simple arithmetic mean, and median absolute deviation (MAD), based on the median. While each approach has been used to detect outliers in static time series data, it is not clear which is most appropriate for a sliding window. To determine whether a candidate anomaly should be considered as legitimate, the legitimate anomaly score (LAS) is calculated. The LAS of a data point represents its deviation from the mean of the candidate anomalies in the window. For the current data point d t, the equation for LAS is computed as: LAS(d t ) = d t µ w(t 1) µ w(t 1) (6) where µ w(t 1) = W t i=(t 1) A c(i) and W t is the window length. LAS gives the relative distance of d t with respect to the mean of the candidate anomalies in the window. The significance of LAS is similar to that of CAS in equation 1. Thus, the value of LAS for data point d t should be sufficiently large in order to label it as a legitimate anomaly. The cutoff condition is given as: LAS(D t ) > τ l σ w(t 1) (7) 1 Wt where σ w(t) = W t i=(t 1) (d i µ w(t 1) ) 2, the standard deviation (STD) estimated from the simple arithmetic mean of the recent candidate anomalies in the window. τ l, is a threshold factor for legitimate anomalies. At each step of the algorithm we update the mean µ w(t) and standard deviation σ w(t) with respect to the sliding window. Since only candidate anomalies are maintained in the window, the number of data points is relatively small. In such small data cases, the standard deviation technique is strongly affected by presence of extreme values [7]. As a result, statistical techniques that are robust against extreme anomalies are recommended, such as median and median absolute deviation (MAD) [7]. The median of the sliding window of previously detected candidate anomalies is given as: µ w(t) ˆ = median(w t ). The median absolute deviation (MAD) is calculated as, σ w(t) ˆ = median i ( d t median j (W t ) ). 3 Preliminary Experimental Evaluation In order to evaluate and compare the different alternatives for identifying candidate and legitimate anomalies, we performed anomaly detection experiments using Twitter data streams collected during 2013 Le Tour de France cycling races [6]. This event was held from June 29 - July 21, 2013, and is the premier race in professional cycling. The data set contains 449,077 English tweets retrieved from the Twitter public stream that were posted using the official hash tag ( #tdf ) during the event period. Since the event is no longer live, for the purposes of this evaluation, we simulated an artificial data stream using these tweets. Given the features of this data, the aggregation period was set to 15 minutes, and the sliding window length was set to 6 days.

The combination of the two models that can be applied to detect candidate anomalies (EWMA and PEWMA) and the two models that summarize the statistical properties of the sliding window (STD and MAD) result in four approaches to be evaluated. The threshold parameters for the candidate and legitimate anomaly detection steps (τ c and τ l, respectively) were independently manipulated in the range [1, 5]. The decay factor for both EWMA and PEWMA was fixed at α EW MA = 0.97 and α P EW MA = 0.99 respectively, which are optimal minimum mean square error parameters in many settings [3]. For the experiments, we leveraged an open source, real-time distributed stream processing framework, called Apache Storm [1]. The four approaches were implemented in the Storm framework independently and then evaluated with the input of the simulated data stream. In the absence of classification labels indicating known anomalies in the tweets data stream, we worked with domain experts to assess the false positives and false negatives identified in the data. For each experimental setting, precision and recall were calculated, along with the F-score. Furthermore, since our goal was to discover an approach that works well across all three sentiment classes, we averaged the F-score over the positive, neutral, and negative data streams for each experimental setting. 3.1 Results and Analysis Given the combination of the two alternatives in the candidate anomaly step with the two alternatives in the legitimate anomaly step, we arrived at four approaches to evaluate: EWMA-STD, EWMA-MAD, PEWMA-STD, and PEWMA-MAD. The results of the experiments in the manipulation of the threshold parameters τ c and τ l are provided in Figure 1. The first item of note from these experiments is that the STD approach (Figures 1a and 1c) is very sensitive to the value of τ l. As this parameter is increased, the method for determining if a candidate anomaly is considered a legitimate anomaly will be more strict. While this resulted in high precision (those that met this criteria were clearly anomalies), the recall was adversely affected with many actual anomalies not being detected. This pattern held for both the EWMA and PEWMA approaches. Considering the MAD approach, a similar pattern of the F-score decreasing as τ l increases holds for the EWMA approach (Figure 1b). Furthermore, as τ c increases, there is also a general pattern of the F-score decreasing. This is due to extreme anomalies having an significant impact on the mean value, making it difficult to discover additional anomalies in the local context when the threshold value is high. As a result, this produced a high precision and a low recall. For the PEWMA approach (Figure 1d), it is clear that this method was more resilient to the settings of the parameters. This was due to the more effective approach for calculating the mean value within the local context, which also made the candidate anomalies within the sliding window more representative of the true anomalies. The highest F-score achieved across all 100 experimental settings was 0.80 (PEWMA-MAD, τ c = 4, τ l = 4). While the other methods approached this

F score 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.0 τ l = 1 τ l = 2 τ l = 3 τ l = 4 τ l = 5 1 2 3 4 5 threshold τ c (a) EWMA STD F score 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.0 τ l = 1 τ l = 2 τ l = 3 τ l = 4 τ l = 5 1 2 3 4 5 threshold τ c (b) EWMA MAD F score 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.0 τ l = 1 τ l = 2 τ l = 3 τ l = 4 τ l = 5 1 2 3 4 5 threshold τ c (c) PEWMA STD F score 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.0 τ l = 1 τ l = 2 τ l = 3 τ l = 4 τ l = 5 1 2 3 4 5 threshold τ c (d) PEWMA MAD Fig. 1. Candidate anomalies identified as legitimate using STD and MAD, estimated wit mean and the median respectively. (Tweets aggregated at 15 minutes interval) value for certain settings, given the resilience of PEWMA-MAD to the threshold parameters, we conclude that it is the superior approach for our purposes. 3.2 Real-Time Performance In terms of computational complexity, the calculations used to determine the candidate anomalies are linear due to the incremental nature of calculating the EWMA and PEWMA. When determining whether a candidate anomaly is a legitimate anomaly, it is necessary to loop over all of the candidate anomalies within the current window. As such, this step has a complexity of O(n), where n is the maximum number of potential candidate anomalies. Given a window size of 6 days and an aggregation interval of 15 minutes, the worst-case value for n is 576. Clearly, with these settings, the approach can be considered to run in real-time. Even with an extremely high velocity data stream, as long as the aggregation interval is kept in the minute-range, the approach will be able to keep up on a sufficiently fast computer system. 4 Conclusion and Future Work In this paper we have highlighted the problem of real-time detection of changes in the sentiment in Twitter data steams. We showed that the proposed RSAD

approach can efficiently detect anomalies in presence of temporal drift when used with PEWMA-MAD technique. In the experimental evaluation of the candidate algorithms for detecting anomalies within the 2013 Le Tour de France data set, we found that the PEWMA-MAD approach was accurate and resilient to the settings of threshold parameters. Future work will focus on evaluating the RSAD approach over multiple datasets and compare it to other approaches from the literature. Furthermore, we wish to expand this approach to identify cyclical patterns in the data, in order to exclude these from being detected as anomalies. References 1. Apache Storm. https://storm.apache.org/, (accessed January 1, 2015) 2. Bifet, A., Frank, E.: Sentiment knowledge discovery in twitter streaming data. In: Pfahringer, B., Holmes, G., Hoffmann, A. (eds.) Discovery Science, Lecture Notes in Computer Science, vol. 6332, pp. 1 15. Springer Berlin Heidelberg (2010) 3. Carter, K.M., Streilein, W.W.: Probabilistic reasoning for streaming anomaly detection. In: Proceedings of the Statistical Signal Processing Workshop (SSP). pp. 377 380. IEEE (2012) 4. Gupta, M., Gao, J., Aggarwal, C.C., Han, J.: Outlier detection for temporal data: A survey. Knowledge and Data Engineering, IEEE Transactions on 26(9), 2250 2267 (Sept 2014) 5. Guzman, J., Poblete, B.: On-line relevant anomaly detection in the twitter stream: an efficient bursty keyword detection model. In: Proceedings of the ACM SIGKDD Workshop on Outlier Detection and Description. pp. 31 39. ACM (2013) 6. Hoeber, O., Hoeber, L., Wood, L., Snelgrove, R., Hugel, I., Wagner, D.: Visual twitter analytics: Exploring fan and organizer sentiment during Le Tour de France. In: Proceedings of the VIS Workshop on Sports Data Visualization. pp. 1 7. IEEE (2013) 7. Leys, C., Ley, C., Klein, O., Bernard, P., Licata, L.: Detecting outliers: Do not use standard deviation around the mean, use absolute deviation around the median. Journal of Experimental Social Psychology 49(4), 764 766 (2013) 8. Marcus, A., Bernstein, M.S., Badar, O., Karger, D.R., Madden, S., Miller, R.C.: Twitinfo: Aggregating and visualizing microblogs for event exploration. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. pp. 227 236. ACM (2011) 9. Münz, G., Carle, G.: Application of forecasting techniques and control charts for traffic anomaly detection. In: Proceedings of the ITC Specialist Seminar on Network Usage and Traffic. Logos Verlag (2008) 10. Sadik, S., Gruenwald, L.: Online outlier detection for data streams. In: Proceedings of the Symposium on International Database Engineering & Applications. pp. 88 96. ACM (2011) 11. Sadik, S., Gruenwald, L.: Research issues in outlier detection for data streams. SIGKDD Explor. Newsl. 15(1), 33 40 (Mar 2014) 12. Sentiment140. http://www.sentiment140.com/, (accessed December 10, 2014) 13. Twitter Public Streams. https://dev.twitter.com/streaming/public, (accessed December 10, 2014)