An empirical study of two approaches to sequence learning for anomaly detection

被引:70
|
作者
Lane, T [1 ]
Brodley, CE
机构
[1] Univ New Mexico, Dept Comp Sci, Albuquerque, NM 87131 USA
[2] Purdue Univ, Sch Elect & Comp Engn, W Lafayette, IN 47907 USA
关键词
anomaly detection; application; instance-based learning; hidden Markov models; computer security;
D O I
10.1023/A:1021830128811
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper introduces the computer security domain of anomaly detection and formulates it as a machine learning task on temporal sequence data. In this domain, the goal is to develop a model or profile of the normal working state of a system user and to detect anomalous conditions as long-term deviations from the expected behavior patterns. We introduce two approaches to this problem: one employing instance-based learning (IBL) and the other using hidden Markov models (HMMs). Though not suitable for a comprehensive security solution, both approaches achieve anomaly identification performance sufficient for a low-level "focus of attention" detector in a multitier security system. Further, we evaluate model scaling techniques for the two approaches: two clustering techniques for the IBL approach and variation of the number of hidden states for the HMM approach. We find that over both model classes and a wide range of model scales, there is no significant difference in performance at recognizing the profiled user. We take this invariance as evidence that, in this security domain, limited memory models (e.g., fixed-length instances or low-order Markov models) can learn only part of the user identity information in which we're interested and that substantially different models will be necessary if dramatic improvements in user-based anomaly detection are to be achieved.
引用
收藏
页码:73 / 107
页数:35
相关论文
共 50 条
  • [41] Anomaly Rule Detection in Sequence Data
    Gan, Wensheng
    Chen, Lili
    Wan, Shicheng
    Chen, Jiahui
    Chen, Chien-Ming
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2023, 35 (12) : 12095 - 12108
  • [42] Approaches for Anomaly Detection in Network : A Survey
    Sawant, Anuja A.
    Game, Pravin S.
    2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
  • [43] Anomaly Detection Approaches for Semiconductor Manufacturing
    Susto, Gian Antonio
    Terzi, Matteo
    Beghi, Alessandro
    27TH INTERNATIONAL CONFERENCE ON FLEXIBLE AUTOMATION AND INTELLIGENT MANUFACTURING, FAIM2017, 2017, 11 : 2018 - 2024
  • [44] Anomaly Detection Using Behavioral Approaches
    Benferhat, Salem
    Tabia, Karim
    SOFTWARE AND DATA TECHNOLOGIES, 2009, 47 : 217 - 230
  • [45] New statistical approaches for anomaly detection
    Callegari, Christian
    Giordano, Stefano
    Pagano, Michele
    SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (06) : 611 - 634
  • [46] Detection of Learning Strategies: A Comparison of Process, Sequence and Network Analytic Approaches
    Matcha, Wannisa
    Gasevic, Dragan
    Uzir, Nora'ayu Ahmad
    Jovanovic, Jelena
    Pardo, Abelardo
    Maldonado-Mahauad, Jorge
    Perez-Sanagustin, Mar
    TRANSFORMING LEARNING WITH MEANINGFUL TECHNOLOGIES, EC-TEL 2019, 2019, 11722 : 525 - 540
  • [47] ToCoAD: Two-Stage Contrastive Learning for Industrial Anomaly Detection
    Liang, Yun
    Hu, Zhiguang
    Huang, Junjie
    Di, Donglin
    Su, Anyang
    Fan, Lei
    IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2025, 74
  • [48] Anomaly Detection Procedures in a Real World Dataset by Using Deep-Learning Approaches
    Ali, Alabbas Alhaj
    Rasheeq, Abdul
    Logofatu, Doina
    Badica, Costin
    INTELLIGENT INFORMATION AND DATABASE SYSTEMS, ACIIDS 2019, PT I, 2019, 11431 : 303 - 314
  • [49] Comparative Analysis of Machine Learning-Based Approaches for Anomaly Detection in Vehicular Data
    Demestichas, Konstantinos
    Alexakis, Theodoros
    Peppes, Nikolaos
    Adamopoulou, Evgenia
    VEHICLES, 2021, 3 (02): : 171 - 186
  • [50] Investigating of Deep Learning-based Approaches for Anomaly Detection in IoT Surveillance Systems
    Huang, Jianchang
    Cai, Yakun
    Sun, Tingting
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (12) : 768 - 778