A formal framework for positive and negative detection schemes

被引:87
作者
Esponda, F [1 ]
Forrest, S [1 ]
Helman, P [1 ]
机构
[1] Univ New Mexico, Dept Comp Sci, Albuquerque, NM 87131 USA
来源
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS | 2004年 / 34卷 / 01期
基金
美国国家科学基金会;
关键词
anamoly detection; artificial immune systems; intrusion detection; negative detection;
D O I
10.1109/TSMCB.2003.817026
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In anomaly detection, the normal behavior of a process is characterized by a model, and deviations from the model are called anomalies. In behavior-based approaches to anomaly detection, the model of normal behavior is constructed from an observed sample of normally occurring patterns. Models of normal behavior can represent either the set of allowed patterns (positive detection) or the set of anomalous patterns (negative detection). A formal framework is given for analyzing the tradeoffs between positive and negative detection schemes in terms of the number of detectors needed to maximize coverage. For realistically sized problems, the universe of possible patterns is too large to represent exactly (in either the positive or negative scheme). Partial matching rules generalize the set of allowable (or unallowable) patterns, and the choice of matching rule affects the tradeoff between positive and negative detection. A new match rule is introduced, called r-chunks, and the generalizations induced by different partial matching rules are characterized in terms of the crossover closure. Permutations of the representation can be used to achieve more precise discrimination between normal and anomalous patterns. Quantitative results are given for the recognition ability of contiguous-bits matching together with permutations.
引用
收藏
页码:357 / 373
页数:17
相关论文
共 70 条
[1]  
[Anonymous], [No title captured], DOI DOI 10.2514/1.C033646
[2]  
[Anonymous], P IEEE S RES SEC PRI
[3]  
[Anonymous], 1998, Encyclopedia of Biostatistics
[4]  
[Anonymous], 1999, IMMUNOLOGICAL MODEL
[5]  
[Anonymous], 1997, ALGORITHMS STRINGS T, DOI DOI 10.1017/CBO9780511574931
[6]  
Arning A., 1996, KDD-96 Proceedings. Second International Conference on Knowledge Discovery and Data Mining, P164
[7]  
BALTHROP J, 2002, P C EV COMP
[8]  
BALTHROP J, 2002, P GEN EV COMP C
[9]  
Barnett V., 1984, Outliers in Statistical Data, V2nd
[10]   Immunotronics - Novel finite-state-machine architectures with built-in self-test using self-nonself differentiation [J].
Bradley, DW ;
Tyrrell, AM .
IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2002, 6 (03) :227-238