{"id":8769,"date":"2025-10-20T04:44:00","date_gmt":"2025-10-20T09:44:00","guid":{"rendered":"https:\/\/www.icesi.edu.co\/editorial\/?p=8769"},"modified":"2025-10-28T10:25:02","modified_gmt":"2025-10-28T15:25:02","slug":"deteccion-anomalias","status":"publish","type":"post","link":"https:\/\/www.icesi.edu.co\/editorial\/deteccion-anomalias\/","title":{"rendered":"Introducci\u00f3n a la detecci\u00f3n de anomal\u00edas empleando R"},"content":{"rendered":"<p><a href=\"https:\/\/repository.icesi.edu.co\/bitstreams\/87e3e3ab-f939-43cc-8c38-2889644e42ea\/download\" target=\"_blank\" rel=\"noopener\">Download\/Descargar<\/a> | <a href=\"https:\/\/www.icesi.edu.co\/editorial\/deteccion-anomalias-web\/\" target=\"_blank\" rel=\"noopener\">Leer en l\u00ednea<\/a><br \/>\n<strong>T\u00edtulo completo:<\/strong> Introducci\u00f3n a la detecci\u00f3n de anomal\u00edas empleando R.<br \/>\n<strong>Autores:<\/strong> Julio C\u00e9sar Alonso C. y Estefan\u00eda Serrano Izquierdo.<br \/>\n<strong>Colecci\u00f3n:<\/strong> Herramientas del Big Data y Analytics | <strong>N\u00famero:<\/strong> 8.<br \/>\n<strong>Editorial:<\/strong> Universidad Icesi.<br \/>\n<strong>ISBN:<\/strong> 978-628-7814-18-9 (eBook).<br \/>\n<strong>A\u00f1o de edici\u00f3n:<\/strong> 2025.<br \/>\n<span id=\"post-ratings-8769\" class=\"post-ratings\" data-nonce=\"ed4f90b133\"><img decoding=\"async\" id=\"rating_8769_1\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/wp-postratings\/images\/stars_crystal\/rating_on.gif\" alt=\"1 estrella\" title=\"1 estrella\" onmouseover=\"current_rating(8769, 1, '1 estrella');\" onmouseout=\"ratings_off(5, 0, 0);\" onclick=\"rate_post();\" onkeypress=\"rate_post();\" style=\"cursor: pointer; border: 0px;\" \/><img decoding=\"async\" id=\"rating_8769_2\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/wp-postratings\/images\/stars_crystal\/rating_on.gif\" alt=\"2 estrellas\" title=\"2 estrellas\" onmouseover=\"current_rating(8769, 2, '2 estrellas');\" onmouseout=\"ratings_off(5, 0, 0);\" onclick=\"rate_post();\" onkeypress=\"rate_post();\" style=\"cursor: pointer; border: 0px;\" \/><img decoding=\"async\" id=\"rating_8769_3\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/wp-postratings\/images\/stars_crystal\/rating_on.gif\" alt=\"3 estrellas\" title=\"3 estrellas\" onmouseover=\"current_rating(8769, 3, '3 estrellas');\" onmouseout=\"ratings_off(5, 0, 0);\" onclick=\"rate_post();\" onkeypress=\"rate_post();\" style=\"cursor: pointer; border: 0px;\" \/><img decoding=\"async\" id=\"rating_8769_4\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/wp-postratings\/images\/stars_crystal\/rating_on.gif\" alt=\"4 estrellas\" title=\"4 estrellas\" onmouseover=\"current_rating(8769, 4, '4 estrellas');\" onmouseout=\"ratings_off(5, 0, 0);\" onclick=\"rate_post();\" onkeypress=\"rate_post();\" style=\"cursor: pointer; border: 0px;\" \/><img decoding=\"async\" id=\"rating_8769_5\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/wp-postratings\/images\/stars_crystal\/rating_on.gif\" alt=\"5 estrellas\" title=\"5 estrellas\" onmouseover=\"current_rating(8769, 5, '5 estrellas');\" onmouseout=\"ratings_off(5, 0, 0);\" onclick=\"rate_post();\" onkeypress=\"rate_post();\" style=\"cursor: pointer; border: 0px;\" \/> (<strong>6<\/strong> votos, promedio: <strong>5,00<\/strong> sobre 5)<br \/><span class=\"post-ratings-text\" id=\"ratings_8769_text\"><\/span><\/span><span id=\"post-ratings-8769-loading\" class=\"post-ratings-loading\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/wp-postratings\/images\/loading.gif\" width=\"16\" height=\"16\" class=\"post-ratings-image\" \/>Loading...<\/span>\n<table style=\"border: none;\">\n<tbody style=\"border: none;\">\n<tr valign=\"top\">\n<td valign=\"top\" style=\"border: none; vertical-align: top; height: 50%; width: 125px;\"><script type=\"text\/javascript\" src=\"\/\/cdn.plu.mx\/widget-popup.js\"><\/script><a href=\"https:\/\/plu.mx\/plum\/a\/?doi=10.18046\/EUI\/bda.h.8\" data-popup=\"right\" data-size=\"large\" class=\"plumx-plum-print-popup\" data-site=\"plum\" data-hide-when-empty=\"true\" data-lang=\"es\" target=\"_blank\" rel=\"noopener\">Introducci\u00f3n a la detecci\u00f3n de anomal\u00edas empleando R<\/a>\n<\/td>\n<td style=\"border: none; vertical-align: top; height: 50%; width: 125px;\"><script type=\"text\/javascript\" src=\"https:\/\/d1bxh8uas1mnw7.cloudfront.net\/assets\/embed.js\"><\/script><\/p>\n<div class=\"altmetric-embed\" data-badge-type=\"donut\" data-altmetric-id=\"\"><\/div>\n<\/td>\n<td style=\"border: none; vertical-align: middle;\"><span class=\"__dimensions_badge_embed__\" data-doi=\"10.18046\/EUI\/bda.h.8\" data-hide-zero-citations=\"true\" data-legend=\"hover-right\" data-style=\"small_circle\"><\/span><script async=\"\" src=\"https:\/\/badge.dimensions.ai\/badge.js\" charset=\"utf-8\"><\/script><\/td>\n<\/tr>\n<\/table>\n<div class=\"osc-res-tab tabbable   osc-tabs-left\"><div style=\"clear:both;width: 100%;\"><ul class=\"nav osc-res-nav nav-pills osc-tabs-left-ul\" id=\"oscitas-restabs-1-deteccion-anomalias-60967\"><li class=\"active\"><a href=\"#ert_pane1-0\" data-toggle=\"tab\">Descripci\u00f3n<\/a><\/li><li class=\"\"><a href=\"#ert_pane1-1\" data-toggle=\"tab\">Contenido<\/a><\/li><li class=\"\"><a href=\"#ert_pane1-2\" data-toggle=\"tab\">Descargables<\/a><\/li><li class=\"\"><a href=\"#ert_pane1-3\" data-toggle=\"tab\">Autor(es)<\/a><\/li><li class=\"\"><a href=\"#ert_pane1-4\" data-toggle=\"tab\">Catalogaci\u00f3n<\/a><\/li><\/ul><\/div><div style=\"clear:both;width: 100%;\"><ul class=\"tab-content\" id=\"oscitas-restabcontent-1-deteccion-anomalias-60967\"><li class=\"tab-pane active\" id=\"ert_pane1-0\"><p style=\"text-align: justify;\">La tarea de detecci\u00f3n de anomal\u00edas tiene como finalidad encontrar al individuo (observaci\u00f3n) que se comporta de manera diferente a los dem\u00e1s. En otras palabras, se emplea para encontrar aquel caso que no sigue el patr\u00f3n de las otras observaciones. En el mundo del <i>business analytics<\/i> nos enfrentamos a preguntas de negocios que implican identificar lo inesperado, lo excepcional, lo que se desv\u00eda de lo habitual. Este desaf\u00edo es fundamental en muchas \u00e1reas de las organizaciones: por ejemplo, en la planta de producci\u00f3n se desea detectar el producto an\u00f3malo y en el \u00e1rea contable se desea encontrar fraudes. La identificaci\u00f3n de lo inesperado, lo excepcional, lo que se desv\u00eda de lo habitual, se conoce como la tarea de detecci\u00f3n de anomal\u00edas.<\/p>\n<p style=\"text-align: justify;\"><strong>C\u00f3mo citar (APA):<\/strong> Alonso, J.C.; Serrano Izquierdo, E. (2025). <i>Introducci\u00f3n a la detecci\u00f3n de anomal\u00edas empleando R<\/i>. Cali: Editorial Universidad Icesi. DOI: <a href=\"https:\/\/doi.org\/10.18046\/EUI\/bda.h.8\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/doi.org\/10.18046\/EUI\/bda.h.8<\/a><\/p><\/li><li class=\"tab-pane \" id=\"ert_pane1-1\"><strong>Tabla de contenido:<\/strong><\/p>\n<p>Prefacio<\/p>\n<p><strong><u>I. Definici\u00f3n y tipos de anomal\u00edas<\/u><\/strong><\/p>\n<p><strong>1 \/ Introducci\u00f3n<\/strong><\/p>\n<p><strong><u>II. M\u00e9todos de origen estad\u00edstico<\/u><\/strong><\/p>\n<p><strong>2 \/ Estad\u00edsticas descriptivas para detectar anomal\u00edas univariadas<\/strong><\/p>\n<p><strong>3 \/ Pruebas estad\u00edsticas para encontrar <i>outliers<\/i><\/strong><\/p>\n<p><strong>4 \/ T\u00e9cnicas estad\u00edsticas para detectar <i>outliers<\/i> multivariados<\/strong><\/p>\n<p><strong>5 \/ Empleando PCA para detectar anomal\u00edas<\/strong><\/p>\n<p><strong>6 \/ Detecci\u00f3n de fraudes y la Ley de Benford<\/strong><\/p>\n<p><strong><u>III. M\u00e9todos de origen en el <i>Machine learning<\/i> no supervisado<\/u><\/strong><\/p>\n<p><strong>7 \/ \u00bfQu\u00e9 es el <i>Machine Learning<\/i> (ML)?<\/strong><\/p>\n<p><strong>8 \/ M\u00e9tricas de origen en el ML: distancia kNN y LOF<\/strong><\/p>\n<p><strong>9 \/ Modelo DBSCAN para detectar anomal\u00edas<\/strong><\/p>\n<p><strong>10 \/ Modelo de <i>Isolation Forest<\/i> para detectar anomal\u00edas<\/strong><\/p>\n<p><strong><u>IV. Reflexiones finales<\/u><\/strong><\/p>\n<p><strong>11 \/ Reflexiones finales<\/strong><\/p>\n<p>Bibliograf\u00eda<\/p>\n<p>\u00cdndice alfab\u00e9tico<br \/><\/li><li class=\"tab-pane \" id=\"ert_pane1-2\"><ul>\n<li style=\"text-align: justify;\">BDA_H_08 \u2013 datosBenford (txt) | <a href=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/uploads\/2025\/10\/datosBenford.txt\" target=\"_blank\" rel=\"noopener\">Descargar<\/a>.<\/li>\n<li style=\"text-align: justify;\">BDA_H_08 \u2013 datos_credito (Rdata) | <a href=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/uploads\/2025\/10\/datos_credito.zip\" target=\"_blank\" rel=\"noopener\">Descargar<\/a>.<\/li>\n<\/ul><\/li><li class=\"tab-pane \" id=\"ert_pane1-3\"><ul>\n<li style=\"text-align: justify;\"><a href=\"https:\/\/orcid.org\/0000-0003-4890-7122\" target=\"_blank\" title=\"ORCID iD\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1012\" src=\"http:\/\/www.icesi.edu.co\/editorial\/wp-content\/uploads\/2020\/06\/ORCIDiD_icon16x16.png\" style=\"margin-right: 6px;\" alt=\"Icono ORCID\" width=\"16\" height=\"16\"><\/a><b>Julio C\u00e9sar Alonso Cifuentes<\/b>, Universidad Icesi (Cali, Colombia)<\/li>\n<li style=\"text-align: justify;\"><a href=\"https:\/\/orcid.org\/0009-0003-6651-1022\" target=\"_blank\" title=\"ORCID iD\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1012\" src=\"http:\/\/www.icesi.edu.co\/editorial\/wp-content\/uploads\/2020\/06\/ORCIDiD_icon16x16.png\" style=\"margin-right: 6px;\" alt=\"Icono ORCID\" width=\"16\" height=\"16\"><\/a><b>Estefan\u00eda Serrano Izquierdo<\/b>, Universidad Icesi (Cali, Colombia)<\/li>\n<\/ul><\/li><li class=\"tab-pane \" id=\"ert_pane1-4\"><table>\n<tbody>\n<tr class=\"first odd\">\n<th width=\"160\">\n<p style=\"text-align: left;\">T\u00edtulo (ingl\u00e9s):<\/p>\n<\/th>\n<td class=\"data last\">Introduction to anomaly detection using R.<\/td>\n<\/tr>\n<tr class=\"even\">\n<th>\n<p style=\"text-align: left;\">DOI\/URL:<\/p>\n<\/th>\n<td class=\"data last\"><a href=\"https:\/\/doi.org\/10.18046\/EUI\/bda.h.8\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/doi.org\/10.18046\/EUI\/bda.h.8<\/a><\/td>\n<\/tr>\n<tr class=\"odd\">\n<th>\n<p style=\"text-align: left;\">Editorial(es):<\/p>\n<\/th>\n<td class=\"data last\">Universidad Icesi.<\/td>\n<\/tr>\n<tr class=\"even\">\n<th>\n<p style=\"text-align: left;\">Autores:<\/p>\n<\/th>\n<td class=\"data last\">Julio C\u00e9sar Alonso C. y Estefan\u00eda Serrano I.<\/td>\n<\/tr>\n<tr class=\"odd\">\n<th>\n<p style=\"text-align: left;\">Palabras clave:<\/p>\n<\/th>\n<td class=\"data last\">R, Anomal\u00edas, Lenguaje estad\u00edstico, Big Data Analytics.<\/td>\n<\/tr>\n<tr class=\"even\">\n<th>\n<p style=\"text-align: left;\">ISBN:<\/p>\n<\/th>\n<td class=\"data last\">978-628-7814-18-9 (eBook).<\/td>\n<\/tr>\n<tr class=\"odd\">\n<th>\n<p style=\"text-align: left;\">Fecha de edici\u00f3n:<\/p>\n<\/th>\n<td class=\"data last\">Octubre de 2025.<\/td>\n<\/tr>\n<tr class=\"even\">\n<th>\n<p style=\"text-align: left;\">No. de p\u00e1ginas:<\/p>\n<\/th>\n<td class=\"data last\">184.<\/td>\n<\/tr>\n<tr class=\"odd\">\n<th>\n<p style=\"text-align: left;\">Idioma(s):<\/p>\n<\/th>\n<td class=\"data last\">Espa\u00f1ol.<\/td>\n<\/tr>\n<tr class=\"even\">\n<th>\n<p style=\"text-align: left;\">Formato(s):<\/p>\n<\/th>\n<td class=\"data last\">Libro electr\u00f3nico (eBook).<\/td>\n<\/tr>\n<tr class=\"odd\">\n<th>\n<p style=\"text-align: left;\">Alto x ancho:<\/p>\n<\/th>\n<td class=\"data last\">27,9 x 21,5 cm.<\/td>\n<\/tr>\n<tr class=\"even\">\n<th>\n<p style=\"text-align: left;\">Colecci\u00f3n:<\/p>\n<\/th>\n<td class=\"data last\">Herramientas del Big Data y Analytics (8).<\/td>\n<\/tr>\n<tr class=\"odd\">\n<th>\n<p style=\"text-align: left;\">Producto:<\/p>\n<\/th>\n<td class=\"data last\">Libro de texto.<\/td>\n<\/tr>\n<tr class=\"last even\">\n<th>\n<p style=\"text-align: left;\">Observaciones:<\/p>\n<\/th>\n<td class=\"data last\">Incluye referencias bibliogr\u00e1ficas.<\/td>\n<\/tr>\n<tr class=\"last odd\">\n<th>\n<p style=\"text-align: left;\">Registro DSpace:<\/p>\n<\/th>\n<td class=\"data last\"><a href=\"https:\/\/hdl.handle.net\/10906\/130480\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1012\" src=\"http:\/\/www.icesi.edu.co\/editorial\/wp-content\/uploads\/2016\/04\/downloadIcon-e1460499009176.png\" alt=\"Icono de Repositorio - Contenido en la Nube\" width=\"25\" height=\"25\"><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/li><\/ul><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Download\/Descargar | Leer en l\u00ednea T\u00edtulo completo: Introducci\u00f3n a la detecci\u00f3n de anomal\u00edas empleando R. Autores: Julio C\u00e9sar Alonso C. y Estefan\u00eda Serrano Izquierdo. Colecci\u00f3n: Herramientas del Big Data y Analytics | N\u00famero: 8. Editorial: Universidad Icesi. ISBN: 978-628-7814-18-9 (eBook). A\u00f1o de edici\u00f3n: 2025. Introducci\u00f3n a la detecci\u00f3n de anomal\u00edas empleando R<\/p>\n","protected":false},"author":3,"featured_media":8778,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[728,814],"tags":[325,442,462,465,732,736,737,811,869,929,973,974,998,999,1032],"class_list":["post-8769","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-big-data","category-herramientas","tag-libro-de-texto","tag-julio-cesar-alonso","tag-lenguaje-de-programacion","tag-descarga-gratuita","tag-analytics","tag-big-data-analytics","tag-machine-learning","tag-lenguaje-estadistico","tag-rstudio","tag-fne","tag-973","tag-analisis-de-datos","tag-business-analytics","tag-cientificos-de-datos","tag-filcali-2025"],"_links":{"self":[{"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/posts\/8769","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/comments?post=8769"}],"version-history":[{"count":10,"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/posts\/8769\/revisions"}],"predecessor-version":[{"id":8839,"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/posts\/8769\/revisions\/8839"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/media\/8778"}],"wp:attachment":[{"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/media?parent=8769"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/categories?post=8769"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/tags?post=8769"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}