Hypergraph-Based Anomaly Detection in Very Large Networks
نویسنده
چکیده
This paper addresses the problem of detecting anomalous interactions or traffic within a very large network using a limited number of unlabeled observations. In particular, consider n recorded interactions among p nodes, where p may be very large relative to n. A novel method based on using a hypergraph representation of the data is proposed to deal with this very high-dimensional, “big p, small n” problem. Hypergraphs constitute an important extension of graphs which allows edges to connect more than two vertices simultaneously. An algorithm for detecting anomalies directly on the corresponding discrete space, without any feature selection or dimensionality reduction, is presented. The algorithm has O(np) computational complexity, making it ideally suited for very large networks, and requires no tuning, bandwidth or regularization parameters. The distribution of the data is modeled as a two-component mixture, consisting of a “nominal” and an “anomalous” component. The deviance of each observation from nominal behavior, as well as the mixture parameters, are learned using ExpectationMaximization (EM), assuming a multivariate Bernoulli variational approximation. This approach is related to probability mass function level set estimation and is shown to allow False Discovery Rate control. The identifiability of the underlying distribution, the local consistency of the EM algorithm, and the avoidance of singular solutions are proved. The proposed approach is validated on high-dimensional synthetic data and it is shown that, for a useful class of data distributions, it can outperform other state-of-the-art methods.
منابع مشابه
Evaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks
Wireless Sensor Networks (WSNs) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. However,security is a major challenge for WSNs because they areusually setup in unprotected environments. Our goal in thisstudy is to simulate an Intrusion Detection System (IDS)that monitors the WSN and report intrusions accurately andeffectively. We have thus...
متن کاملDynamic anomaly detection by using incremental approximate PCA in AODV-based MANETs
Mobile Ad-hoc Networks (MANETs) by contrast of other networks have more vulnerability because of having nature properties such as dynamic topology and no infrastructure. Therefore, a considerable challenge for these networks, is a method expansion that to be able to specify anomalies with high accuracy at network dynamic topology alternation. In this paper, two methods proposed for dynamic anom...
متن کاملA Survey of Anomaly Detection Approaches in Internet of Things
Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...
متن کاملDetection of Mo geochemical anomaly in depth using a new scenario based on spectrum–area fractal analysis
Detection of deep and hidden mineralization using the surface geochemical data is a challenging subject in the mineral exploration. In this work, a novel scenario based on the spectrum–area fractal analysis (SAFA) and the principal component analysis (PCA) has been applied to distinguish and delineate the blind and deep Mo anomaly in the Dalli Cu–Au porphyry mineralization area. The Dalli miner...
متن کاملADAPTIVE ORDERED WEIGHTED AVERAGING FOR ANOMALY DETECTION IN CLUSTER-BASED MOBILE AD HOC NETWORKS
In this paper, an anomaly detection method in cluster-based mobile ad hoc networks with ad hoc on demand distance vector (AODV) routing protocol is proposed. In the method, the required features for describing the normal behavior of AODV are defined via step by step analysis of AODV and independent of any attack. In order to learn the normal behavior of AODV, a fuzzy averaging method is used fo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007