Nearly Optimal Change-Point Detection with an Application to Cybersecurity
نویسندگان
چکیده
We address the sequential change-point detection problem for the Gaussian model where baseline distribution is Gaussian with variance 2 and mean such that 2 = a , where a > 0 is a known constant; the change is in from one known value to another. First, we carry out a comparative performance analysis of four detection procedures: the Cumulative Sum (CUSUM) procedure, the Shiryaev–Roberts (SR) procedure, and two its modifications—the Shiryaev–Roberts–Pollak and Shiryaev–Roberts–r procedures. The performance is benchmarked via Pollak’s maximal average delay to detection and Shiryaev’s stationary average delay to detection, each subject to a fixed average run length to false alarm. The analysis shows that in practically interesting cases the accuracy of asymptotic approximations is “reasonable” to “excellent”. We also consider an application of changepoint detection to cybersecurity for rapid anomaly detection in computer networks. Using real network data we show that statistically traffic’s intensity can be well described by the proposed Gaussian model with 2 = a instead of the traditional Poisson model, which requires 2 = . By successively devising the SR and CUSUM procedures to “catch” a low-contrast network anomaly (caused by an Internet Control Message Protocol reflector attack), we then show that the SR rule is quicker. We conclude that the SR procedure is a better cyber “watch dog” than the popular CUSUM procedure.
منابع مشابه
Application of adjusted-receiver operating characteristic curve analysis in combination of biomarkers for early detection of gestational diabetes mellitus
Introduction: In medical diagnostic field, evaluation of diagnostic accuracy of biomarkers or tests has always been a matter of concern. In some situations, one biomarker alone may not be sufficiently sensitive and specific for prediction of a disease. However, combining multiple biomarkers may lead to better diagnostic. The aim of this study was to assess the performance of combination of bio...
متن کاملDetection and Attribution of Changing in Seasonal variability cause of climate change (Case study: Hillsides of Central Southern Alborz Mountains)
.Detection and Attribution of Changing in Seasonal variability cause of climate change (Case study: Hillsides of Central Southern Alborz Mountains) Abstract One of the most important challenges for the human communities is Global Warming. This vital problem affected by Climate Change and corresponding effects. Thus this article attempted to assess the trend of real climate variables from syno...
متن کاملChange detection from satellite images based on optimal asymmetric thresholding the difference image
As a process to detect changes in land cover by using multi-temporal satellite images, change detection is one of the practical subjects in field of remote sensing. Any progress on this issue increase the accuracy of results as well as facilitating and accelerating the analysis of multi-temporal data and reducing the cost of producing geospatial information. In this study, an unsupervised chang...
متن کاملDesign of the optimal magnetic field in application of functionalized CNT-based drug delivery toward the cell membrane: Computational Analysis
Recently, Carbon Nano (CN) structures are widely used in medical applications, especially the detection and treatment of cancer disease. Among various types of CNs, Carbone Nano Tubes (CNTs) attracted many researchers' attention to consider them toward clinical application. Regarding the intrinsic structure of CNTs, they can be used widely in drug delivery applications. Functionalized CNTs and ...
متن کاملImproving Accuracy in Intrusion Detection Systems Using Classifier Ensemble and Clustering
Recently by developing the technology, the number of network-based servicesis increasing, and sensitive information of users is shared through the Internet.Accordingly, large-scale malicious attacks on computer networks could causesevere disruption to network services so cybersecurity turns to a major concern fornetworks. An intrusion detection system (IDS) could be cons...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012