Regression Tree Based Explanation for Anomaly Detection Algorithm
نویسندگان
چکیده
منابع مشابه
Anomaly Based Intrusion Detection Based on the Junction Tree Algorithm
The aim of this paper is to present a methodology for the attacks recognition during the normal activities in the system. Since the proposed approach uses the graphical representation method, we apply the junction tree algorithm (JTA). Some results from the accomplished simulation experiments are submitted as well.
متن کاملCounterexample Explanation by Anomaly Detection
Since counterexamples generated by model checking tools are only symptoms of faults in the model, a significant amount of manual work is required in order to locate the fault that is the root cause for the presence of counterexamples in the model. In this paper, we propose an automated method for explaining counterexamples that are symptoms of the occurrence of deadlocks in concurrent systems. ...
متن کاملAn Algorithm for Anomaly-based Botnet Detection
We present an anomaly-based algorithm for detecting IRC-based botnet meshes. The algorithm combines an IRC mesh detection component with a TCP scan detection heuristic called the TCP work weight. The IRC component produces two tuples, one for determining the IRC mesh based on IP channel names, and a sub-tuple which collects statistics (including the TCP work weight) on individual IRC hosts in c...
متن کاملAnomaly Detection using Decision Tree based Classifiers
as we know that with the help of Data mining techniques we can find out knowledge in terms of various characteristics and patterns. In this regard this paper presents finding out of anomalies/ outliers using various decision tree based classifiers viz. Best-first Decision Tree, Functional Tree, Logistic Model Tree, J48 and Random Forest decision tree. Three real world datasets has been used in ...
متن کاملIncorporating Feedback into Tree-based Anomaly Detection
ABSTRACT Anomaly detectors are often used to produce a ranked list of statistical anomalies, which are examined by human analysts in order to extract the actual anomalies of interest. Unfortunately, in realworld applications, this process can be exceedingly difficult for the analyst since a large fraction of high-ranking anomalies are false positives and not interesting from the application per...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings
سال: 2020
ISSN: 2504-3900
DOI: 10.3390/proceedings2020054007