Bayesian Anomaly Detection (BAD v0.1)

نویسندگان

  • Tim Menzies
  • David Allen
  • Andres Orrego
چکیده

Prior experiments with Bayesian rule generation produced a scalable anytime learner. At its core, that tool computes the likelihood of new events as the product of frequencies of old events. Orrego and Menzies applied that tool to logs of an F-15 flight simulator and showed that the same tool can detect anomalous events which have not been seen previously. This paper checks the external validity of that prior experiment. In twenty-five data sets, anomalous new situations could be identified with high probabilities of detection (average pd over 80%) and low probabilities of false alarm (usually, pf ≤ 5%). These results strongly suggest that we can detect anomalous events, even among very large data sets.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Safeguarding SCADA Systems with Anomaly Detection

This paper will show how the accuracy and security of SCADA systems can be improved by using anomaly detection to identify bad values caused by attacks and faults. The performance of invariant induction and ngram anomaly-detectors will be compared and this paper will also outline plans for taking this work further by integrating the output from several anomalydetecting techniques using Bayesian...

متن کامل

Bayesian parentage analysis with systematic accountability of genotyping error, missing data and false matching

We show the software SOLOMON is improved by using the likelihood ratio instead of an ad hoc statistic. CODE:  github.com/eriqande/solidmon/releases/tag/v0.1-bioinformatics

متن کامل

Hybrid Fuzzy Based Intrusion Detection System for Wireless Local Area Networks (HFIDS)

ISSN 2250 – 110X | © 2011 Bonfring Abstract--The drawback of the anomaly based intrusion detection in a wireless network is the high rate of false positive. By designing a hybrid intrusion detection system can solve this by connecting a misuse detection module to the anomaly detection module. In this paper, we propose to develop a hybrid intrusion detection system for wireless local area networ...

متن کامل

Security Protocols Protection Based on Anomaly Detection

Security protocols flaws represent a substantial portion of security exposures of data networks. In order to evaluate security protocols against any attack, formal methods are equipped with a number of techniques. Unfortunately, formal methods are applicable for static state only, and don’t guarantee detecting all possible flaws. Therefore, formal methods should be complemented with dynamic pro...

متن کامل

Low Latency Anomaly Detection and Bayesian Network Prediction of Anomaly Likelihood

We develop a supervised machine learning model that detects anomalies in systems in real time. Our model processes unbounded streams of data into time series which then form the basis of a low-latency anomaly detection model. Moreover, we extend our preliminary goal of just anomaly detection to simultaneous anomaly prediction. We approach this very challenging problem by developing a Bayesian N...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006