Skip to main content
Top
Published in: Cluster Computing 3/2019

20-10-2017

An anomaly detection method based on Lasso

Authors: Shanxiong Chen, Maoling Peng, Hailing Xiong, Sheng Wu

Published in: Cluster Computing | Special Issue 3/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In many research and application fields, anomaly detection always is an important issue. In the article, a method of anomaly detection is presented which based on Lasso on the basis of variable linear regression solution of the Lasso problem. We transform the process of anomaly detection into a linear regression model, meanwhile, take the detection parameter as regression variables and establish the model of the regression variables and the dependent variable. Due to estimation of Lasso parameter own stable regression coefficient, can compress parameters of the model and reduce the number of parameters. Those characteristics accord with the requirement of stability, high-speed and simplicity which are needful for anomaly detection. Experimental results show that our method has higher detection accuracy and more rapid convergence ability under the constraints of the appropriate threshold.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference V, C., A, B., V, K.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 15 (2009) V, C., A, B., V, K.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 15 (2009)
2.
go back to reference Huang, J., Kalbarczyk, Z., Nicol, D.M.: Knowledge Discovery from Big Data for Intrusion Detection Using LDA. In: 2014 IEEE International Congress on Big Data (BigData Congress), pp. 760–761 (2014) Huang, J., Kalbarczyk, Z., Nicol, D.M.: Knowledge Discovery from Big Data for Intrusion Detection Using LDA. In: 2014 IEEE International Congress on Big Data (BigData Congress), pp. 760–761 (2014)
3.
go back to reference Li-ming, Z., Peng, Z., Wei-hong, Z., et al.: Anomaly detection in backbone networks using filter-ary-sketch. J. Commun. 32(12), 151–160 (2011) Li-ming, Z., Peng, Z., Wei-hong, Z., et al.: Anomaly detection in backbone networks using filter-ary-sketch. J. Commun. 32(12), 151–160 (2011)
4.
go back to reference M, X., S, H., Tian, B., et al.: Anomaly detection in wireless sensor networks: a survey. J. Netw. Comput. Appl. 34(4), 1302–1325 (2011)CrossRef M, X., S, H., Tian, B., et al.: Anomaly detection in wireless sensor networks: a survey. J. Netw. Comput. Appl. 34(4), 1302–1325 (2011)CrossRef
5.
go back to reference Ye-Kui, Q., Ming, C., Li-Xin, Y., et al.: Network-wide anomaly detection method based on multiscale principal component analysis. J. Softw. 23(2), 361–377 (2012)CrossRef Ye-Kui, Q., Ming, C., Li-Xin, Y., et al.: Network-wide anomaly detection method based on multiscale principal component analysis. J. Softw. 23(2), 361–377 (2012)CrossRef
6.
go back to reference LI-Ming, Z., Peng, Z., Yan, J., et al.: How to extract and train classifier in traffic anomaly detection system. Chin. J. Comput. 35(4), 719–730 (2012)CrossRef LI-Ming, Z., Peng, Z., Yan, J., et al.: How to extract and train classifier in traffic anomaly detection system. Chin. J. Comput. 35(4), 719–730 (2012)CrossRef
7.
go back to reference Eskin, E., Arnold, A., Prerau, M., Portnoy, L., Stolfo, S.A.: Geometric framework for unsupervised anomaly detection. Adv. Inf. Sec. 6, 77–101 (2002) Eskin, E., Arnold, A., Prerau, M., Portnoy, L., Stolfo, S.A.: Geometric framework for unsupervised anomaly detection. Adv. Inf. Sec. 6, 77–101 (2002)
8.
go back to reference C, K., G, V., W, R.: A multi-model approach to the detection of web-based attacks. Comput. Netw. 48(5), 717–738 (2005)CrossRef C, K., G, V., W, R.: A multi-model approach to the detection of web-based attacks. Comput. Netw. 48(5), 717–738 (2005)CrossRef
9.
go back to reference J, S.S., F, A., Eskin, E., et al.: Aapplications of data mining in computer security. J. Comput. Sec. 13(4), 659–693 (2005)CrossRef J, S.S., F, A., Eskin, E., et al.: Aapplications of data mining in computer security. J. Comput. Sec. 13(4), 659–693 (2005)CrossRef
10.
go back to reference R, P., Ariu, D., Fogla, P., et al.: McPAD: a multiple classifier system for accurate payload-based anomaly detection. Comput. Netw. 53(6), 864–881 (2009)MATHCrossRef R, P., Ariu, D., Fogla, P., et al.: McPAD: a multiple classifier system for accurate payload-based anomaly detection. Comput. Netw. 53(6), 864–881 (2009)MATHCrossRef
11.
go back to reference Schölkopf, B., Platt, J.C., Shawe-Taylor, J., et al.: Estimating the support of a high-dimensional distribution. Neural Comput. 13(7), 1443–1471 (2001)MATHCrossRef Schölkopf, B., Platt, J.C., Shawe-Taylor, J., et al.: Estimating the support of a high-dimensional distribution. Neural Comput. 13(7), 1443–1471 (2001)MATHCrossRef
13.
go back to reference Tsang, C.H., Kwong, S., Wang, Hanli: Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection. Pattern Recognit. Lett. 40(9), 2373–2391 (2007)MATHCrossRef Tsang, C.H., Kwong, S., Wang, Hanli: Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection. Pattern Recognit. Lett. 40(9), 2373–2391 (2007)MATHCrossRef
14.
go back to reference Hodge, V.J., Austin, J.: A survey of outlier detection methodologies. Artif. Intell. Rev. 22(2), 85–126 (2004)MATHCrossRef Hodge, V.J., Austin, J.: A survey of outlier detection methodologies. Artif. Intell. Rev. 22(2), 85–126 (2004)MATHCrossRef
15.
go back to reference Burbeck, K.: Current research and use of anomaly detection. In: Proceedings of the Fourteenth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 138–138 (2005) Burbeck, K.: Current research and use of anomaly detection. In: Proceedings of the Fourteenth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 138–138 (2005)
16.
go back to reference Markou, M., Singh, S.: Novelty detection: a review—part 1: statistical approaches. Signal Process. 83(12), 2481–2497 (2003)MATHCrossRef Markou, M., Singh, S.: Novelty detection: a review—part 1: statistical approaches. Signal Process. 83(12), 2481–2497 (2003)MATHCrossRef
17.
go back to reference Bolton, P.: Banking in emerging markets. J. Financ. Intermed. 11, 11362–11365 (2002)CrossRef Bolton, P.: Banking in emerging markets. J. Financ. Intermed. 11, 11362–11365 (2002)CrossRef
18.
go back to reference Tax, D.M.J.: One-Class Classification: Concept-Learning in the Absence of Counter-Examples. Delft University of Technology, Delft (2001) Tax, D.M.J.: One-Class Classification: Concept-Learning in the Absence of Counter-Examples. Delft University of Technology, Delft (2001)
19.
go back to reference Gupta, M., Sharma, A.B., Chen, H.: Context-aware time series anomaly detection for complex systems. In: Workshop Notes, vol. 14 (2013) Gupta, M., Sharma, A.B., Chen, H.: Context-aware time series anomaly detection for complex systems. In: Workshop Notes, vol. 14 (2013)
20.
go back to reference Feng, A., Chen, S.: Study on one-class classifiers based on Kernel method. J. NanJing Normal Univ. 8(4), 1–5 (2008) Feng, A., Chen, S.: Study on one-class classifiers based on Kernel method. J. NanJing Normal Univ. 8(4), 1–5 (2008)
21.
go back to reference Meinshausen, N., Yu, B.: Lasso-type recovery of sparse representations for high-dimensional data. Ann. Stat. 37(1), 246–270 (2009)MathSciNetMATHCrossRef Meinshausen, N., Yu, B.: Lasso-type recovery of sparse representations for high-dimensional data. Ann. Stat. 37(1), 246–270 (2009)MathSciNetMATHCrossRef
22.
go back to reference Bickel, P.J., Ritov, Y.A., Tsybakov, A.B.: Simultaneous analysis of Lasso and Dantzig selector. Ann. Stat. 37(4), 1705–1732 (2009)MathSciNetMATHCrossRef Bickel, P.J., Ritov, Y.A., Tsybakov, A.B.: Simultaneous analysis of Lasso and Dantzig selector. Ann. Stat. 37(4), 1705–1732 (2009)MathSciNetMATHCrossRef
24.
go back to reference Li, F., Lu, Y.-Q., Li, G.: Variable selection of the adaptive LASSO of part the linear model. Chin. J. Appl. Probab. Stat. 28(6), 614–624 (2012)MATH Li, F., Lu, Y.-Q., Li, G.: Variable selection of the adaptive LASSO of part the linear model. Chin. J. Appl. Probab. Stat. 28(6), 614–624 (2012)MATH
27.
go back to reference Fu, S.: Hierarchical Bayesian LASSO for a negative binomial regression. J. Stat. Comput. Simul. 86(11), 2182–2203 (2016)MathSciNetCrossRef Fu, S.: Hierarchical Bayesian LASSO for a negative binomial regression. J. Stat. Comput. Simul. 86(11), 2182–2203 (2016)MathSciNetCrossRef
28.
go back to reference Lu, G., Zou, J., Wang, Y.: L1-norm and maximum margin criterion based discriminant locality preserving projections via trace Lasso. Pattern Recognit. Lett. 55, 207–214 (2016)MATHCrossRef Lu, G., Zou, J., Wang, Y.: L1-norm and maximum margin criterion based discriminant locality preserving projections via trace Lasso. Pattern Recognit. Lett. 55, 207–214 (2016)MATHCrossRef
29.
go back to reference Fosson, S., Matamoros, J., Anton-Haro, C., Magli, E.: Distributed recovery of jointly sparse signals under communication constraints. IEEE Trans. Signal Process. 64(13), 3470–3482 (2016)MathSciNetMATHCrossRef Fosson, S., Matamoros, J., Anton-Haro, C., Magli, E.: Distributed recovery of jointly sparse signals under communication constraints. IEEE Trans. Signal Process. 64(13), 3470–3482 (2016)MathSciNetMATHCrossRef
Metadata
Title
An anomaly detection method based on Lasso
Authors
Shanxiong Chen
Maoling Peng
Hailing Xiong
Sheng Wu
Publication date
20-10-2017
Publisher
Springer US
Published in
Cluster Computing / Issue Special Issue 3/2019
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-017-1255-z

Other articles of this Special Issue 3/2019

Cluster Computing 3/2019 Go to the issue

Premium Partner