Research on cost-sensitive learning in one-class anomaly detection algorithms

作者: Jun Luo , Li Ding , Zhisong Pan , Guiqiang Ni , Guyu Hu

DOI: 10.1007/978-3-540-73547-2_27

关键词:

摘要: According to the Cost-Sensitive Learning Method, two improved One-Class Anomaly Detection Models using Support Vector Data Description (SVDD) are put forward in this paper. Improved Algorithm is included Frequency-Based SVDD (F-SVDD) Model while Input data division method used Write-Related (W-SVDD) Model. Experimental results show that both of new models have a low false positive rate compared with traditional one. The true positives increased by 22% and 23% False Positives decreased 58% 94%, which reaches nearly 100% 0% respectively. And hence, adjusting some parameters can make better. So Problems may be future orientation Trusted Computing area.

参考文章(15)
D.M.J. Tax, One-class classification TU Delft, Delft University of Technology. ,(2001)
M. Bishop, A standard audit trail format National information systems security conference, Baltimore, MD (United States), 10-13 Oct 1995. ,(1995)
PJ Bentley, J Kim, An artificial immune model for network intrusion detection soft computing. ,(1999)
Wenke Lee, S.J. Stolfo, K.W. Mok, A data mining framework for building intrusion detection models ieee symposium on security and privacy. pp. 120- 132 ,(1999) , 10.1109/SECPRI.1999.766909
Kazuo Hattori, Masahito Takahashi, A new nearest-neighbor rule in the pattern classification problem Pattern Recognition. ,vol. 32, pp. 425- 432 ,(1999) , 10.1016/S0031-3203(98)00097-1
Yunqiang Chen, Xiang Sean Zhou, T.S. Huang, One-class SVM for learning in image retrieval international conference on image processing. ,vol. 1, pp. 34- 37 ,(2001) , 10.1109/ICIP.2001.958946
Kristin P. Bennett, Colin Campbell, A Linear Programming Approach to Novelty Detection neural information processing systems. ,vol. 13, pp. 395- 401 ,(2000)
Anil Somayaji, Steven A. Hofmeyr, Thomas A. Longstaff, Stephanie Forrest, A sense of self for Unix processes ieee symposium on security and privacy. pp. 120- 128 ,(1996) , 10.5555/525080.884258
C. Warrender, S. Forrest, B. Pearlmutter, Detecting intrusions using system calls: alternative data models ieee symposium on security and privacy. pp. 133- 145 ,(1999) , 10.1109/SECPRI.1999.766910