Anomaly Detection in Hierarchical Data Streams under Unknown Models

نویسندگان

  • Sattar Vakili
  • Qing Zhao
  • Chang Liu
  • Chen-Nee Chuah
چکیده

We consider the problem of detecting a few targets among a large number of hierarchical data streams. The data streams are modeled as random processes with unknown and potentially heavy-tailed distributions. The objective is an active inference strategy that determines, sequentially, which data stream to collect samples from in order to minimize the sample complexity under a reliability constraint. We propose an active inference strategy that induces a biased random walk on the tree-structured hierarchy based on confidence bounds of sample statistics. We then establish its order optimality in terms of both the size of the search space (i.e., the number of data streams) and the reliability requirement. The results find applications in hierarchical heavy hitter detection, noisy group testing, and adaptive sampling for active learning, classification, and stochastic root finding.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Online and adaptive anomaly Detection: detecting intrusions in unlabelled audit data streams

Intrusion detection has become a widely studied topic in computer security in recent years. Anomaly detection is an intensive focus in intrusion detection research because of its capability of detecting unknown attacks. Current anomaly IDSs (Intrusion Detection System) have some difficulties for practical use. First, a large amount of precisely labeled data is very difficult to obtain in practi...

متن کامل

Machine Learning Techniques for the Domain of Anomaly Detection for Computer Security

In this proposal, we examine the machine learning issues raised by the domain of anomaly detection for computer security. The anomaly detection task is to recognize the presence of an unusual (and potentially hazardous) state within the behaviors or activities of a computer user, system, or network with respect to some model of `normal' behavior which may be either hard-coded or learned from ob...

متن کامل

SNMiner: A Rapid Evaluator of Anomaly Detection Accuracy in Sensor Networks

Modeling faults and malicious activities in sensor networks can be challenging. Designing and re-evaluating a “good” classifier to detect abnormalities imposes yet another challenge once the sensor network is deployed in the field. Common approaches among researchers involve obtaining publicly accessible labeled datasets, generating synthetic sensor data, or collecting sensor readings from a re...

متن کامل

A Relevance Weighted Ensemble Model for Anomaly Detection in Switching Data Streams

Anomaly detection in data streams plays a vital role in online data mining applications. A major challenge for anomaly detection is the dynamically changing nature of many monitoring environments. This causes a problem for traditional anomaly detection techniques in data streams, which assume a relatively static monitoring environment. In an environment that is intermittently changing (known as...

متن کامل

Traffic Scene Analysis using Hierarchical Sparse Topical Coding

Analyzing motion patterns in traffic videos can be exploited directly to generate high-level descriptions of the video contents. Such descriptions may further be employed in different traffic applications such as traffic phase detection and abnormal event detection. One of the most recent and successful unsupervised methods for complex traffic scene analysis is based on topic models. In this pa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1709.03573  شماره 

صفحات  -

تاریخ انتشار 2017