An empirical study of two approaches to sequence learning for anomaly detection

被引:70
|
作者
Lane, T [1 ]
Brodley, CE
机构
[1] Univ New Mexico, Dept Comp Sci, Albuquerque, NM 87131 USA
[2] Purdue Univ, Sch Elect & Comp Engn, W Lafayette, IN 47907 USA
关键词
anomaly detection; application; instance-based learning; hidden Markov models; computer security;
D O I
10.1023/A:1021830128811
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper introduces the computer security domain of anomaly detection and formulates it as a machine learning task on temporal sequence data. In this domain, the goal is to develop a model or profile of the normal working state of a system user and to detect anomalous conditions as long-term deviations from the expected behavior patterns. We introduce two approaches to this problem: one employing instance-based learning (IBL) and the other using hidden Markov models (HMMs). Though not suitable for a comprehensive security solution, both approaches achieve anomaly identification performance sufficient for a low-level "focus of attention" detector in a multitier security system. Further, we evaluate model scaling techniques for the two approaches: two clustering techniques for the IBL approach and variation of the number of hidden states for the HMM approach. We find that over both model classes and a wide range of model scales, there is no significant difference in performance at recognizing the profiled user. We take this invariance as evidence that, in this security domain, limited memory models (e.g., fixed-length instances or low-order Markov models) can learn only part of the user identity information in which we're interested and that substantially different models will be necessary if dramatic improvements in user-based anomaly detection are to be achieved.
引用
收藏
页码:73 / 107
页数:35
相关论文
共 50 条
  • [1] An Empirical Study of Two Approaches to Sequence Learning for Anomaly Detection
    Terran Lane
    Carla E. Brodley
    Machine Learning, 2003, 51 : 73 - 107
  • [2] A Comparative Study of Transfer Learning Approaches for Video Anomaly Detection
    Gutoski, Matheus
    Ribeiro, Manasses
    Hattori, Leandro T.
    Romero, Marcelo
    Lazzaretti, Andre E.
    Lopes, Heitor S.
    INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2021, 35 (05)
  • [3] An empirical investigation into the capabilities of anomaly detection approaches for test smell detection
    Pontillo, Valeria
    Martins, Luana
    Machado, Ivan
    Palomba, Fabio
    Ferrucci, Filomena
    Journal of Systems and Software, 222
  • [4] Building consumption anomaly detection: A comparative study of two probabilistic approaches
    Stjelja, Davor
    Kuzmanovski, Vladimir
    Kosonen, Risto
    Jokisalo, Juha
    ENERGY AND BUILDINGS, 2024, 313
  • [5] Machine Learning Approaches to Maritime Anomaly Detection
    Obradovic, Ines
    Milicevic, Mario
    Zubrinic, Krunoslav
    NASE MORE, 2014, 61 (5-6): : 96 - 101
  • [6] An Empirical Evaluation of Deep Learning for Network Anomaly Detection
    Malaiya, Ritesh K.
    Kwon, Donghwoon
    Suh, Sang C.
    Kim, Hyunjoo
    Kim, Ikkyun
    Kim, Jinoh
    IEEE ACCESS, 2019, 7 : 140806 - 140817
  • [7] A Study on Machine Learning Based Anomaly Detection Approaches in Wireless Sensor Network
    Dwivedi, Rajendra Kumar
    Rai, Arun Kumar
    Kumar, Rakesh
    PROCEEDINGS OF THE CONFLUENCE 2020: 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING, 2020, : 194 - 199
  • [8] An Empirical Evaluation of Deep Learning for Network Anomaly Detection
    Malaiya, Ritesh K.
    Kwon, Donghwoon
    Kim, Jinoh
    Suh, Sang C.
    Kim, Hyunjoo
    Kim, Ikkyun
    2018 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2018, : 893 - 898
  • [9] Pattern Anomaly Detection based on Sequence-to-Sequence Regularity Learning
    Cheng, Yuzhen
    LI, Min
    TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2023, 30 (04): : 1112 - 1117
  • [10] Road Anomaly Detection Through Deep Learning Approaches
    Luo, Dawei
    Lu, Jianbo
    Guo, Gang
    IEEE ACCESS, 2020, 8 : 117390 - 117404