Synergistic Classifier Fusion for Security Applications

نویسندگان

  • Paul F. Evangelista
  • Mark J. Embrechts
  • Boleslaw K. Szymanski
چکیده

Unbalanced, high-dimensional, binary classifications create challenges in a variety of systems and environments, most notably within physical security and computer security domains. The imbalance within these problems consists of a significant majority of the negative (healthy, non-intruding) class and a minority (unhealthy, intruding) positive class. Any system that needs protection from malicious activity, intruders, theft, or other types of breaches in security must address this type of problem. Given numerical data that represent observations or instances which require classification, many practitioners apply state of the art machine learning algorithms to aid in solving unbalanced classification problems. The unbalanced and high-dimensional structure of the data can trouble these learning methods. High-dimensional data poses a ``curse of dimensionality'' which can be overcome through subspace modeling and intelligent fusion. A fundamental method for evaluation of the binary classification model is the receiver operating characteristic (ROC) curve and the area under the curve (AUC), and the intelligent fusion employed ties directly with the properties of this evaluation method. This work exposes the underlying statistics involved with ROC curves and leverages these properties to create synergistic classifier fusion through rankings. Decision ROC charts are a novel illustration that augment the ROC curve to provide a more complete representation of the classifier performance. Pseudo-ROC curves, created from simulated rankings utilizing principles based on the Wilcoxon-Rank sum or Mann-Whitney U statistic, provide novel insight into the behavior of classifier rankings. The critical finding involves the unique behavior of rankings for unbalanced classification problems and methods to capitalize on this behavior to improve classifier accuracy for unbalanced problems. Arguments presented include theoretical discussion, proof of principle through simulated classifier rankings examined with a factorial design, and experimental results with actual data including host-based and network-based intrusion detection datasets.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

High Security Fingerprint Verification by Perceptron-Based Fusion of Multiple Matchers

Recent works about perceptron-based fusion of multiple fingerprint matchers showed the effectiveness of such approach in improving the performance of personal identity verification systems. However, to the best of our knowledge, no previous work investigated such fusion approach when stringent requirements in terms of verification errors are given, and the number of available samples for percep...

متن کامل

Designing a Home Security System using Sensor Data Fusion with DST and DSMT Methods

Today due to the importance and necessity of implementing security systems in homes and other buildings, systems with higher certainty, lower cost and with sensor fusion methods are more attractive, as an applicable and high performance methods for the researchers. In this paper, the application of Dempster-Shafer evidential theory and also the newer, more general one Dezert-Smarandache theory ...

متن کامل

MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security

Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

متن کامل

Classification using Synergistic Teams

In this paper, we study the performance of a team of classifiers. First, we propose a performance model for a single classifier based on its confusion matrix and prior information. Building upon this model, we propose a supervisor-aided classifier and analyze the performance in comparison to the single classifier. Second, we consider the performance of a team of two classifiers. Since the decis...

متن کامل

Speaker recognition - general classifier approaches and data fusion methods

Speaker recognition refers to the concept of recognizing a speaker by his=her voice or speech samples. Some of the important applications of speaker recognition include customer veri cation for bank transactions, access to bank accounts through telephones, control on the use of credit cards, and for security purposes in the army, navy and airforce. This paper is purely a tutorial that presents ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007