Skip to main content

2016 | OriginalPaper | Buchkapitel

Robust Data Model for Enhanced Anomaly Detection

verfasst von : R. Ravinder Reddy, Y. Ramadevi, K. V. N. Sunitha

Erschienen in: Proceedings of the International Congress on Information and Communication Technology

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

As the volume of network usage increases, inexorably, the proportions of threats are also increasing. Various approaches to anomaly detection are currently being in use with each one has its own merits and demerits. Anomaly detection is the process of analyzing the users data either normal or anomaly, most of the records are normal records only. When analyzing these imbalanced types of datasets with machine learning algorithms the performance degradation is high and cannot predict the class label accurately. In this paper, we proposed a hybrid approach to address these problems. Here we combine the class balancing and rough set theory (RST). This approach enhances the anomaly detection rate and empirical results show that considerable performance improvements.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Lee, W., Stolfo, S., Chan, P., Eskin, E., Fan, W., Miller, M., Hershkop, S., & Zhang, J. (2001). Real time data mining-based intrusion detection. In: DARPA information survivability conference & exposition II, 2001, DISCEX’01, Proceedings (Vol. 1, pp. 89–100). Lee, W., Stolfo, S., Chan, P., Eskin, E., Fan, W., Miller, M., Hershkop, S., & Zhang, J. (2001). Real time data mining-based intrusion detection. In: DARPA information survivability conference & exposition II, 2001, DISCEX’01, Proceedings (Vol. 1, pp. 89–100).
2.
Zurück zum Zitat V. Chandola, A. Banerjee, and V. Kumar, “Anomaly Detection: A Survey,” ACM Computing Surveys, vol. 41, no. 3, pp. 15:1–15:58, September 2009. V. Chandola, A. Banerjee, and V. Kumar, “Anomaly Detection: A Survey,” ACM Computing Surveys, vol. 41, no. 3, pp. 15:1–15:58, September 2009.
3.
Zurück zum Zitat M. V. Joshi, R. C. Agarwal, and V. Kumar, “Mining needle in a haystack: classifying rare classes via two-phase rule induction,” in Proc. of the 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 2001, pp. 293–298. M. V. Joshi, R. C. Agarwal, and V. Kumar, “Mining needle in a haystack: classifying rare classes via two-phase rule induction,” in Proc. of the 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 2001, pp. 293–298.
4.
Zurück zum Zitat P. N. Tan, M. Steinbach, and V. Kumar, Introduction to Data Mining. Addison-Wesley, 2005. P. N. Tan, M. Steinbach, and V. Kumar, Introduction to Data Mining. Addison-Wesley, 2005.
5.
Zurück zum Zitat Z. Pawlak, Rough Sets: Theoretical Aspects of Reasoning About Data, Kluwer Academic Publishers, Dordrecht, MA, 1991. Z. Pawlak, Rough Sets: Theoretical Aspects of Reasoning About Data, Kluwer Academic Publishers, Dordrecht, MA, 1991.
6.
Zurück zum Zitat Nitesh V. Chawla Chapter on data mining for imbalanced datasets: An overview, Springer. Nitesh V. Chawla Chapter on data mining for imbalanced datasets: An overview, Springer.
7.
Zurück zum Zitat Nitesh V. Chawla, Nathalie Japkowicz, “Data Mining for Imbalanced Datasets: An Overview” A journal on special issue on learning from imbalanced datasets, volume 6, Issue 1 pp: 853–857. Nitesh V. Chawla, Nathalie Japkowicz, “Data Mining for Imbalanced Datasets: An Overview” A journal on special issue on learning from imbalanced datasets, volume 6, Issue 1 pp: 853–857.
8.
Zurück zum Zitat Han, Jiawei, Micheline Kamber, and Jian Pei. “Classification”, Data Mining, 2012. Han, Jiawei, Micheline Kamber, and Jian Pei. “Classification”, Data Mining, 2012.
9.
Zurück zum Zitat Pawlak Z: Rough Sets and Intelligent Data Analysis, Information Sciences, 2002, 147:1–12. Pawlak Z: Rough Sets and Intelligent Data Analysis, Information Sciences, 2002, 147:1–12.
11.
Zurück zum Zitat R. P. Lippmann, D. J. Fried, I. Graf, J. W. Haines, K. Kendall, D. McClung, D. Webber, S. Webster, D. Wyschograd, R. Cunninghan, and M. Zissman. Evaluating Intrusion Detection Systems: The 1998 DARPA offline intrusion detection evaluation. In Proc. of DARPA Information Survivability Conference and Exposition (DISCEX00), Hilton Head, South Carolina, January 2527. IEEE Computer Society Press, Los Alamitos, CA, 1226 (2000). R. P. Lippmann, D. J. Fried, I. Graf, J. W. Haines, K. Kendall, D. McClung, D. Webber, S. Webster, D. Wyschograd, R. Cunninghan, and M. Zissman. Evaluating Intrusion Detection Systems: The 1998 DARPA offline intrusion detection evaluation. In Proc. of DARPA Information Survivability Conference and Exposition (DISCEX00), Hilton Head, South Carolina, January 2527. IEEE Computer Society Press, Los Alamitos, CA, 1226 (2000).
12.
Zurück zum Zitat R. Lippmann, J. W. Haines, D. J. Fried, J. Korba and K. Das. The 1999 DARPA OffLine Intrusion Detection Evaluation. In Proc. Recent Advances in Intrusion Detection (RAID2000). H. Debar, L. Me, and S. F. Wu, Eds. Springer-Verlag, New York, NY, 162182 (2000). R. Lippmann, J. W. Haines, D. J. Fried, J. Korba and K. Das. The 1999 DARPA OffLine Intrusion Detection Evaluation. In Proc. Recent Advances in Intrusion Detection (RAID2000). H. Debar, L. Me, and S. F. Wu, Eds. Springer-Verlag, New York, NY, 162182 (2000).
13.
Zurück zum Zitat J. McHugh. Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory. In Proc. of ACM Transactions on Information and System Security (TISSEC) 3(4), pp. 262294 (2000). J. McHugh. Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory. In Proc. of ACM Transactions on Information and System Security (TISSEC) 3(4), pp. 262294 (2000).
14.
Zurück zum Zitat Chawla, N. V., Bowyer, K. W., Hall, L. O., and Kegelmeyer, W. P. (2002). SMOTE: Synthetic Minority Oversampling Technique. Journal of Artificial Intelligence Research, 16:321–357. Chawla, N. V., Bowyer, K. W., Hall, L. O., and Kegelmeyer, W. P. (2002). SMOTE: Synthetic Minority Oversampling Technique. Journal of Artificial Intelligence Research, 16:321–357.
15.
Zurück zum Zitat Enislay Ramentol, Yaile Caballero, A journal on SMOTE-RSB, 23 December 2009. Enislay Ramentol, Yaile Caballero, A journal on SMOTE-RSB, 23 December 2009.
16.
Zurück zum Zitat Jan G. Bazan, Marcin Szczuka, “The rough set exploration system (2005)” Transactions on Rough Sets III, Springer. Jan G. Bazan, Marcin Szczuka, “The rough set exploration system (2005)” Transactions on Rough Sets III, Springer.
Metadaten
Titel
Robust Data Model for Enhanced Anomaly Detection
verfasst von
R. Ravinder Reddy
Y. Ramadevi
K. V. N. Sunitha
Copyright-Jahr
2016
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-0755-2_47

Neuer Inhalt