Kickoff: Anomaly Detection Challenges
|
|
- Dylan Stone
- 8 years ago
- Views:
Transcription
1 Kickoff: Anomaly Detection Challenges A Practical Course in SS2014 Huang Xiao Han Xiao Chair of IT Security (I20) Department of Informatics Technische Universität München January 31, 2014 Huang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17
2 Overview Motivation 1 Motivation 2 How to challenge 3 Evaluation 4 References uang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17
3 Motivation What is Anomaly Detection Definition Anomaly Detection is a process of discovering patterns in data which do not comply with their expected behavior. Similar terms can also be referred as outlier detection, novelty detection and so on. uang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17
4 Motivation What is Anomaly Detection Definition Anomaly Detection is a process of discovering patterns in data which do not comply with their expected behavior. Similar terms can also be referred as outlier detection, novelty detection and so on. Anomalies are... Rare Harmful Confusing *NOT* noises Huang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17
5 Motivation Curse of Anomalies Anomalous behaviors intend to compromise a system or service by maximizing certain interest. Fraudulent transactions of credit cards caused tremendous financial lost per year. Suspicious MRI images are possibly indicative of malicious existence of tumor. Anomalous network traffic measurement during a certain period might indicate a network hacking-through Unusual noises in motorcycle may also refer to some damage of the engine which could be fatal. Huang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17
6 Motivation Curse of Anomalies Anomalous behaviors intend to compromise a system or service by maximizing certain interest. Fraudulent transactions of credit cards caused tremendous financial lost per year. Suspicious MRI images are possibly indicative of malicious existence of tumor. Anomalous network traffic measurement during a certain period might indicate a network hacking-through Unusual noises in motorcycle may also refer to some damage of the engine which could be fatal. We need to do something with the anomalies. uang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17
7 Motivation General Course Information Type Practical Course (Praktikum) Credits 6 SWS / 10,0 ECTS-Credits Time Di, 14:00 to 15:30 Uhr Start-End Start from , ends at Where Lab room Advisors Huang Xiao & Han Xiao Language English Required Registered Master or Diplom of Informatik at TUM Home page Website of Chair Huang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17
8 Overview How to challenge 1 Motivation 2 How to challenge 3 Evaluation 4 References uang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17
9 How to challenge Objective We aim at... providing challengers a set of learning tasks, in which they are assigned with a certain data set including some anomalies. In the learning tasks, challengers are about to detect those anomalies using their own proposed methods. That is Anomaly detecion in teams Assigned data sets Apply own algorithms Benchmarks on data sets Ranking of detection performance uang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17
10 Process How to challenge Huang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17
11 Process How to challenge 1. Team up + Task assignment Team up with max. 2 persons, and we assign a well designed data set to all the teams. Huang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17
12 Process How to challenge 1. Team up + Task assignment Team up with max. 2 persons, and we assign a well designed data set to all the teams. 2. Do your homework Apply your own algorithms, e.g., statistics based, machine learning based, on the data set to find anomalies. Huang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17
13 Process How to challenge 1. Team up + Task assignment Team up with max. 2 persons, and we assign a well designed data set to all the teams. 2. Do your homework Apply your own algorithms, e.g., statistics based, machine learning based, on the data set to find anomalies. 3. Upload your results Upload the results on our Kaggle competition platform (TbA) for evaluation (Accuracy, False positive/negative). Huang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17
14 Process How to challenge 1. Team up + Task assignment Team up with max. 2 persons, and we assign a well designed data set to all the teams. 2. Do your homework Apply your own algorithms, e.g., statistics based, machine learning based, on the data set to find anomalies. 3. Upload your results Upload the results on our Kaggle competition platform (TbA) for evaluation (Accuracy, False positive/negative). 4. Report Present your work flow and results in class. Huang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17
15 More information How to challenge Team work You are expected to work on data sets in a team with maximal two persons. Of course, to work alone is also acceptable. Huang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17
16 How to challenge More information Team work You are expected to work on data sets in a team with maximal two persons. Of course, to work alone is also acceptable. Data sets All the data sets are real-world data in certain applied domain, e.g., network intrusion, credit card. Huang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17
17 How to challenge More information Team work You are expected to work on data sets in a team with maximal two persons. Of course, to work alone is also acceptable. Data sets All the data sets are real-world data in certain applied domain, e.g., network intrusion, credit card. Methods Algorithms are not limited in any category, you can use any anomaly detection methods, if you think it is relevant. Huang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17
18 How to challenge More information Team work You are expected to work on data sets in a team with maximal two persons. Of course, to work alone is also acceptable. Data sets All the data sets are real-world data in certain applied domain, e.g., network intrusion, credit card. Methods Algorithms are not limited in any category, you can use any anomaly detection methods, if you think it is relevant. Tools You can use any programming tools (frameworks) you like. We will give practical lectures in Matlab. Huang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17
19 How to challenge More information Team work You are expected to work on data sets in a team with maximal two persons. Of course, to work alone is also acceptable. Data sets All the data sets are real-world data in certain applied domain, e.g., network intrusion, credit card. Methods Algorithms are not limited in any category, you can use any anomaly detection methods, if you think it is relevant. Tools You can use any programming tools (frameworks) you like. We will give practical lectures in Matlab. Kaggle Kaggle is an online competition platform, our page will be opened very soon. Huang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17
20 How to challenge More information Team work You are expected to work on data sets in a team with maximal two persons. Of course, to work alone is also acceptable. Data sets All the data sets are real-world data in certain applied domain, e.g., network intrusion, credit card. Methods Algorithms are not limited in any category, you can use any anomaly detection methods, if you think it is relevant. Tools You can use any programming tools (frameworks) you like. We will give practical lectures in Matlab. Kaggle Kaggle is an online competition platform, our page will be opened very soon. Benchmarks Note that as a binary classification problem, your results will be evaluated for detection accuracy, false positive/negative. Huang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17
21 How to challenge More information Team work You are expected to work on data sets in a team with maximal two persons. Of course, to work alone is also acceptable. Data sets All the data sets are real-world data in certain applied domain, e.g., network intrusion, credit card. Methods Algorithms are not limited in any category, you can use any anomaly detection methods, if you think it is relevant. Tools You can use any programming tools (frameworks) you like. We will give practical lectures in Matlab. Kaggle Kaggle is an online competition platform, our page will be opened very soon. Benchmarks Note that as a binary classification problem, your results will be evaluated for detection accuracy, false positive/negative. Report You will present your results after a 2-weeks work in 15 min and hand in a report in A4 within 2 pages for each task. Huang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17
22 How to challenge You will also learn... During your work on the data set, we will also introduce... Classical machine learning algorithms in practice. Implement your own machine learning algorithms. Matlab tutorials in Machine learning. Schedule and topics are now available online. Huang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17
23 How to challenge Possible data sets KDD99 Intrusion Detection data set German credit card fraud detection data set The Paper-Author data set containing incorrect paper-author assignments NASA disk defect data set containing faults on disks Crowded scenes data sets consisting videos of a crowded pedestrian walkway and so on... Huang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17
24 How to challenge Possible data sets KDD99 Intrusion Detection data set German credit card fraud detection data set The Paper-Author data set containing incorrect paper-author assignments NASA disk defect data set containing faults on disks Crowded scenes data sets consisting videos of a crowded pedestrian walkway and so on... Other suggestions are warmly welcome! uang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17
25 Overview Evaluation 1 Motivation 2 How to challenge 3 Evaluation 4 References uang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17
26 Evaluation Evaluation of your credits There is no oral or written exams for practical course Your credits are evaluated as follows Credits C=0.3 T R P B, where T Talk for the results R Report for the results P Performance in class B Benchmarks (ranking) on Kaggle uang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17
27 Call for Data Sets Evaluation We announce each data set and learning task in class. But... If you have any interesting data sets for anomaly detection, they are extremely welcome! Simply contact us without hesitation. Huang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17
28 Evaluation Miscellaneous Register in Kaggle.com to be able to upload your results. We encourage using latex for the report. Bring your own laptop, possibly with Matlab Licence 1. Any feedback for the course is welcome. Teams are supposed to work independently. 1 You can inquire a student licence from Matlab RGB: uang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17
29 Overview References 1 Motivation 2 How to challenge 3 Evaluation 4 References uang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17
30 Reading list References Varun Chandola, et al. Anomaly detection: A survey. Journal ACM Computing Surveys (CSUR), July Nico Görnitz, et al. Toward Supervised Anomaly Detection. Journal of Articial Intelligence Research, Feb Victoria Hodge, et al. A Survey of Outlier Detection Methodologies. Journal Artificial Intelligence Review, Oct Simon Rogers, et al. A First Course in Machine Learning. CRC Press, Inc., Chris Bishop. Pattern recognition and Machine Learning. Springer, Huang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17
CS 2750 Machine Learning. Lecture 1. Machine Learning. http://www.cs.pitt.edu/~milos/courses/cs2750/ CS 2750 Machine Learning.
Lecture Machine Learning Milos Hauskrecht milos@cs.pitt.edu 539 Sennott Square, x5 http://www.cs.pitt.edu/~milos/courses/cs75/ Administration Instructor: Milos Hauskrecht milos@cs.pitt.edu 539 Sennott
More informationAnomaly detection. Problem motivation. Machine Learning
Anomaly detection Problem motivation Machine Learning Anomaly detection example Aircraft engine features: = heat generated = vibration intensity Dataset: New engine: (vibration) (heat) Density estimation
More informationSystem Specification. Author: CMU Team
System Specification Author: CMU Team Date: 09/23/2005 Table of Contents: 1. Introduction...2 1.1. Enhancement of vulnerability scanning tools reports 2 1.2. Intelligent monitoring of traffic to detect
More information203.4770: Introduction to Machine Learning Dr. Rita Osadchy
203.4770: Introduction to Machine Learning Dr. Rita Osadchy 1 Outline 1. About the Course 2. What is Machine Learning? 3. Types of problems and Situations 4. ML Example 2 About the course Course Homepage:
More informationAUTO CLAIM FRAUD DETECTION USING MULTI CLASSIFIER SYSTEM
AUTO CLAIM FRAUD DETECTION USING MULTI CLASSIFIER SYSTEM ABSTRACT Luis Alexandre Rodrigues and Nizam Omar Department of Electrical Engineering, Mackenzie Presbiterian University, Brazil, São Paulo 71251911@mackenzie.br,nizam.omar@mackenzie.br
More informationSeminar TK: Ubiquitous Computing
Seminar TK: Ubiquitous Computing Seminar 4 CP, Summer Term 2014 Immanuel Schweizer schweizer@tk.informatik.tu-darmstadt.de Based on slides by Dr. Leonardo Martucci, Florian Volk General Information What?
More informationSome Research Challenges for Big Data Analytics of Intelligent Security
Some Research Challenges for Big Data Analytics of Intelligent Security Yuh-Jong Hu hu at cs.nccu.edu.tw Emerging Network Technology (ENT) Lab. Department of Computer Science National Chengchi University,
More informationAgreement on. Dual Degree Master Program in Computer Science KAIST. Technische Universität Berlin
Agreement on Dual Degree Master Program in Computer Science between KAIST Department of Computer Science and Technische Universität Berlin Fakultät für Elektrotechnik und Informatik (Fakultät IV) 1 1 Subject
More informationExample application (1) Telecommunication. Lecture 1: Data Mining Overview and Process. Example application (2) Health
Lecture 1: Data Mining Overview and Process What is data mining? Example applications Definitions Multi disciplinary Techniques Major challenges The data mining process History of data mining Data mining
More informationGraduate School of Informatics
Graduate School of Informatics Admissions Policy '( ) ' ' - Master's Degree Program Major Enrollment Capacity 40 40 Doctor's Degree Program Major Enrollment Capacity 8 1 M. Entrance examination for international
More informationInformation Management course
Università degli Studi di Milano Master Degree in Computer Science Information Management course Teacher: Alberto Ceselli Lecture 01 : 06/10/2015 Practical informations: Teacher: Alberto Ceselli (alberto.ceselli@unimi.it)
More informationDATA MINING FOR BUSINESS INTELLIGENCE. Data Mining For Business Intelligence: MIS 382N.9/MKT 382 Professor Maytal Saar-Tsechansky
DATA MINING FOR BUSINESS INTELLIGENCE PROFESSOR MAYTAL SAAR-TSECHANSKY Data Mining For Business Intelligence: MIS 382N.9/MKT 382 Professor Maytal Saar-Tsechansky This course provides a comprehensive introduction
More informationMACHINE LEARNING & INTRUSION DETECTION: HYPE OR REALITY?
MACHINE LEARNING & INTRUSION DETECTION: 1 SUMMARY The potential use of machine learning techniques for intrusion detection is widely discussed amongst security experts. At Kudelski Security, we looked
More informationEfficient Security Alert Management System
Efficient Security Alert Management System Minoo Deljavan Anvary IT Department School of e-learning Shiraz University Shiraz, Fars, Iran Majid Ghonji Feshki Department of Computer Science Qzvin Branch,
More informationOUTLIER ANALYSIS. Data Mining 1
OUTLIER ANALYSIS Data Mining 1 What Are Outliers? Outlier: A data object that deviates significantly from the normal objects as if it were generated by a different mechanism Ex.: Unusual credit card purchase,
More informationInsider Threat Detection Using Graph-Based Approaches
Cybersecurity Applications & Technology Conference For Homeland Security Insider Threat Detection Using Graph-Based Approaches William Eberle Tennessee Technological University weberle@tntech.edu Lawrence
More informationDan French Founder & CEO, Consider Solutions
Dan French Founder & CEO, Consider Solutions CONSIDER SOLUTIONS Mission Solutions for World Class Finance Footprint Financial Control & Compliance Risk Assurance Process Optimization CLIENTS CONTEXT The
More informationData Mining and Exploration. Data Mining and Exploration: Introduction. Relationships between courses. Overview. Course Introduction
Data Mining and Exploration Data Mining and Exploration: Introduction Amos Storkey, School of Informatics January 10, 2006 http://www.inf.ed.ac.uk/teaching/courses/dme/ Course Introduction Welcome Administration
More informationAn Introduction to Data Mining. Big Data World. Related Fields and Disciplines. What is Data Mining? 2/12/2015
An Introduction to Data Mining for Wind Power Management Spring 2015 Big Data World Every minute: Google receives over 4 million search queries Facebook users share almost 2.5 million pieces of content
More informationSteven C.H. Hoi School of Information Systems Singapore Management University Email: chhoi@smu.edu.sg
Steven C.H. Hoi School of Information Systems Singapore Management University Email: chhoi@smu.edu.sg Introduction http://stevenhoi.org/ Finance Recommender Systems Cyber Security Machine Learning Visual
More informationAn Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus
An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus Tadashi Ogino* Okinawa National College of Technology, Okinawa, Japan. * Corresponding author. Email: ogino@okinawa-ct.ac.jp
More informationCOMP3420: Advanced Databases and Data Mining. Classification and prediction: Introduction and Decision Tree Induction
COMP3420: Advanced Databases and Data Mining Classification and prediction: Introduction and Decision Tree Induction Lecture outline Classification versus prediction Classification A two step process Supervised
More informationCPSC 340: Machine Learning and Data Mining. Mark Schmidt University of British Columbia Fall 2015
CPSC 340: Machine Learning and Data Mining Mark Schmidt University of British Columbia Fall 2015 Outline 1) Intro to Machine Learning and Data Mining: Big data phenomenon and types of data. Definitions
More informationAzure Machine Learning, SQL Data Mining and R
Azure Machine Learning, SQL Data Mining and R Day-by-day Agenda Prerequisites No formal prerequisites. Basic knowledge of SQL Server Data Tools, Excel and any analytical experience helps. Best of all:
More informationComputational intelligence in intrusion detection systems
Computational intelligence in intrusion detection systems --- An introduction to an introduction Rick Chang @ TEIL Reference The use of computational intelligence in intrusion detection systems : A review
More informationApplication of Data Mining Techniques in Intrusion Detection
Application of Data Mining Techniques in Intrusion Detection LI Min An Yang Institute of Technology leiminxuan@sohu.com Abstract: The article introduced the importance of intrusion detection, as well as
More informationAnomaly and Fraud Detection with Oracle Data Mining 11g Release 2
Oracle 11g DB Data Warehousing ETL OLAP Statistics Anomaly and Fraud Detection with Oracle Data Mining 11g Release 2 Data Mining Charlie Berger Sr. Director Product Management, Data
More informationSecure Because Math: Understanding ML- based Security Products (#SecureBecauseMath)
Secure Because Math: Understanding ML- based Security Products (#SecureBecauseMath) Alex Pinto Chief Data Scientist Niddel / MLSec Project @alexcpsec @MLSecProject @NiddelCorp MLSec Project / Niddel MLSec
More informationClassification and Prediction
Classification and Prediction Slides for Data Mining: Concepts and Techniques Chapter 7 Jiawei Han and Micheline Kamber Intelligent Database Systems Research Lab School of Computing Science Simon Fraser
More informationKnowledge Discovery from Data Bases Proposal for a MAP-I UC
Knowledge Discovery from Data Bases Proposal for a MAP-I UC P. Brazdil 1, João Gama 1, P. Azevedo 2 1 Universidade do Porto; 2 Universidade do Minho; 1 Knowledge Discovery from Data Bases We are deluged
More informationCredit Card Fraud Detection Using Self Organised Map
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 13 (2014), pp. 1343-1348 International Research Publications House http://www. irphouse.com Credit Card Fraud
More informationTIETS34 Seminar: Data Mining on Biometric identification
TIETS34 Seminar: Data Mining on Biometric identification Youming Zhang Computer Science, School of Information Sciences, 33014 University of Tampere, Finland Youming.Zhang@uta.fi Course Description Content
More informationThis translation is provided for convenience only; in case of discrepancy, the German version shall prevail.
This translation is provided for convenience only; in case of discrepancy, the German version shall prevail. Supervision Agreement in the context of a doctoral project at the Technische Universität München
More informationResource-bounded Fraud Detection
Resource-bounded Fraud Detection Luis Torgo LIAAD-INESC Porto LA / FEP, University of Porto R. de Ceuta, 118, 6., 4050-190 Porto, Portugal ltorgo@liaad.up.pt http://www.liaad.up.pt/~ltorgo Abstract. This
More informationDATA MINING TECHNOLOGY. Keywords: data mining, data warehouse, knowledge discovery, OLAP, OLAM.
DATA MINING TECHNOLOGY Georgiana Marin 1 Abstract In terms of data processing, classical statistical models are restrictive; it requires hypotheses, the knowledge and experience of specialists, equations,
More informationSubject Examination and Academic Regulations for the Research on Teaching and Learning Master s Programme at the Technische Universität München
Page 1 The version is provided merely as a convenience and is not intended to be a legally binding document. Subject Examination and Academic Regulations for the Research on Teaching and Learning Master
More informationGovernment of Russian Federation. Faculty of Computer Science School of Data Analysis and Artificial Intelligence
Government of Russian Federation Federal State Autonomous Educational Institution of High Professional Education National Research University «Higher School of Economics» Faculty of Computer Science School
More informationIntrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. s.l.yasakethu@surrey.ac.uk J. Jiang Department
More informationPractical Data Science with Azure Machine Learning, SQL Data Mining, and R
Practical Data Science with Azure Machine Learning, SQL Data Mining, and R Overview This 4-day class is the first of the two data science courses taught by Rafal Lukawiecki. Some of the topics will be
More informationHealthcare Measurement Analysis Using Data mining Techniques
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 03 Issue 07 July, 2014 Page No. 7058-7064 Healthcare Measurement Analysis Using Data mining Techniques 1 Dr.A.Shaik
More informationAdaptive Anomaly Detection for Network Security
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 5, Number 1 (2013), pp. 1-9 International Research Publication House http://www.irphouse.com Adaptive Anomaly Detection for
More informationProfit from Big Data flow. Hospital Revenue Leakage: Minimizing missing charges in hospital systems
Profit from Big Data flow Hospital Revenue Leakage: Minimizing missing charges in hospital systems Hospital Revenue Leakage White Paper 2 Tapping the hidden assets in hospitals data Missed charges on patient
More information95-791 Data Mining Carnegie Mellon University Mini 2, Fall 2015. Syllabus
95-791 Data Mining Carnegie Mellon University Mini 2, Fall 2015 Syllabus Instructor Dr. Artur Dubrawski awd@cs.cmu.edu, Newell-Simon Hall 3121 Mondays, 4:45pm-5:55pm (advance notice please). Head Teaching
More informationUsing Predictive Analytics to Detect Contract Fraud, Waste, and Abuse Case Study from U.S. Postal Service OIG
Using Predictive Analytics to Detect Contract Fraud, Waste, and Abuse Case Study from U.S. Postal Service OIG MACPA Government & Non Profit Conference April 26, 2013 Isaiah Goodall, Director of Business
More informationA Survey on Outlier Detection Techniques for Credit Card Fraud Detection
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. VI (Mar-Apr. 2014), PP 44-48 A Survey on Outlier Detection Techniques for Credit Card Fraud
More informationWisconsin Rural Water Association Identity Theft Prevention Program Compliance Model
Wisconsin Rural Water Association Identity Theft Prevention Program Compliance Model All utilities are required to comply with this regulation. The Red Flag Rule requires any entity where there is a risk
More informationIntroduction. A. Bellaachia Page: 1
Introduction 1. Objectives... 3 2. What is Data Mining?... 4 3. Knowledge Discovery Process... 5 4. KD Process Example... 7 5. Typical Data Mining Architecture... 8 6. Database vs. Data Mining... 9 7.
More informationSURVEY OF INTRUSION DETECTION SYSTEM
SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT
More informationData Mining Application for Cyber Credit-card Fraud Detection System
, July 3-5, 2013, London, U.K. Data Mining Application for Cyber Credit-card Fraud Detection System John Akhilomen Abstract: Since the evolution of the internet, many small and large companies have moved
More informationMaschinelles Lernen mit MATLAB
Maschinelles Lernen mit MATLAB Jérémy Huard Applikationsingenieur The MathWorks GmbH 2015 The MathWorks, Inc. 1 Machine Learning is Everywhere Image Recognition Speech Recognition Stock Prediction Medical
More informationIntroduction to Data Mining
Introduction to Data Mining 1 Why Data Mining? Explosive Growth of Data Data collection and data availability Automated data collection tools, Internet, smartphones, Major sources of abundant data Business:
More informationStatistics W4240: Data Mining Columbia University Spring, 2014
Statistics W4240: Data Mining Columbia University Spring, 2014 Version: January 30, 2014. The syllabus is subject to change, so look for the version with the most recent date. Course Description Massive
More informationAMIS 7640 Data Mining for Business Intelligence
The Ohio State University The Max M. Fisher College of Business Department of Accounting and Management Information Systems AMIS 7640 Data Mining for Business Intelligence Autumn Semester 2013, Session
More informationData Mining and Business Intelligence CIT-6-DMB. http://blackboard.lsbu.ac.uk. Faculty of Business 2011/2012. Level 6
Data Mining and Business Intelligence CIT-6-DMB http://blackboard.lsbu.ac.uk Faculty of Business 2011/2012 Level 6 Table of Contents 1. Module Details... 3 2. Short Description... 3 3. Aims of the Module...
More informationMA2823: Foundations of Machine Learning
MA2823: Foundations of Machine Learning École Centrale Paris Fall 2015 Chloé-Agathe Azencot Centre for Computational Biology, Mines ParisTech chloe agathe.azencott@mines paristech.fr TAs: Jiaqian Yu jiaqian.yu@centralesupelec.fr
More informationDomain Classification of Technical Terms Using the Web
Systems and Computers in Japan, Vol. 38, No. 14, 2007 Translated from Denshi Joho Tsushin Gakkai Ronbunshi, Vol. J89-D, No. 11, November 2006, pp. 2470 2482 Domain Classification of Technical Terms Using
More informationMachine Learning and Data Mining. Fundamentals, robotics, recognition
Machine Learning and Data Mining Fundamentals, robotics, recognition Machine Learning, Data Mining, Knowledge Discovery in Data Bases Their mutual relations Data Mining, Knowledge Discovery in Databases,
More informationData Mining for Security Applications
2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing Data Mining for Security Applications Bhavani Thuraisingham, Latifur Khan, Mohammad M. Masud, Kevin W. Hamlen The University
More informationBusiness Analytics. 0. Overview. Lars Schmidt-Thieme. Information Systems and Machine Learning Lab (ISMLL) University of Hildesheim, Germany
Business Analytics 0. Overview Lars Schmidt-Thieme Information Systems and Machine Learning Lab (ISMLL) University of Hildesheim, Germany 1 / 19 Outline 1. What is Business Analytics? 3. Organizational
More informationBig Data and Cyber Security A bibliometric study Jacky Akoka, Isabelle Comyn-Wattiau, Nabil Laoufi Workshop SCBC - 2015 (ER 2015) 1 Big Data a new generation of technologies and architectures, designed
More informationA Knowledge-Based Intrusion Detection Engine to detect attacks on security protocols
The International Journal Of Engineering And Science (IJES) Volume 3 Issue 3 Pages 30-36 2014 ISSN (e): 2319 1813 ISSN (p): 2319 1805 A Knowledge-Based Intrusion Detection Engine to detect attacks on security
More informationSubject Description Form
Subject Description Form Subject Code Subject Title COMP417 Data Warehousing and Data Mining Techniques in Business and Commerce Credit Value 3 Level 4 Pre-requisite / Co-requisite/ Exclusion Objectives
More informationSpam detection with data mining method:
Spam detection with data mining method: Ensemble learning with multiple SVM based classifiers to optimize generalization ability of email spam classification Keywords: ensemble learning, SVM classifier,
More informationUsing Artificial Intelligence in Intrusion Detection Systems
Using Artificial Intelligence in Intrusion Detection Systems Matti Manninen Helsinki University of Technology mimannin@niksula.hut.fi Abstract Artificial Intelligence could make the use of Intrusion Detection
More informationIntegration Misuse and Anomaly Detection Techniques on Distributed Sensors
Integration Misuse and Anomaly Detection Techniques on Distributed Sensors Shih-Yi Tu Chung-Huang Yang Kouichi Sakurai Graduate Institute of Information and Computer Education, National Kaohsiung Normal
More informationDiscover Viterbi: New Programs in Computer Science
Discover Viterbi: New Programs in Computer Science Gaurav S. Sukhatme Professor and Chairman USC Computer Science Department Meghan McKenna Balding Graduate & Professional Programs April 23, 2013 WebEx
More informationUsing Random Forest to Learn Imbalanced Data
Using Random Forest to Learn Imbalanced Data Chao Chen, chenchao@stat.berkeley.edu Department of Statistics,UC Berkeley Andy Liaw, andy liaw@merck.com Biometrics Research,Merck Research Labs Leo Breiman,
More informationEvaluating Online Payment Transaction Reliability using Rules Set Technique and Graph Model
Evaluating Online Payment Transaction Reliability using Rules Set Technique and Graph Model Trung Le 1, Ba Quy Tran 2, Hanh Dang Thi My 3, Thanh Hung Ngo 4 1 GSR, Information System Lab., University of
More informationThe Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack
The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack Asnita Hashim, University of Technology MARA, Malaysia April 14-15, 2011 The Integration of SNORT with K-Means Clustering
More informationData Mining Solutions for the Business Environment
Database Systems Journal vol. IV, no. 4/2013 21 Data Mining Solutions for the Business Environment Ruxandra PETRE University of Economic Studies, Bucharest, Romania ruxandra_stefania.petre@yahoo.com Over
More informationTextbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2.
CSET 4850 Computer Network Security (4 semester credit hours) CSET Elective IT Elective Current Catalog Description: Theory and practice of network security. Topics include firewalls, Windows, UNIX and
More informationKnowledge-based systems and the need for learning
Knowledge-based systems and the need for learning The implementation of a knowledge-based system can be quite difficult. Furthermore, the process of reasoning with that knowledge can be quite slow. This
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering
More informationA Survey on Intrusion Detection System with Data Mining Techniques
A Survey on Intrusion Detection System with Data Mining Techniques Ms. Ruth D 1, Mrs. Lovelin Ponn Felciah M 2 1 M.Phil Scholar, Department of Computer Science, Bishop Heber College (Autonomous), Trichirappalli,
More informationOrientation Program for Students of Our MSc. Programs Business Administration, Economics and MEMS. Information Systems. Prof. Dr.
Orientation Program for Students of Our MSc. Programs Business Administration, Economics and MEMS Information Systems Prof. Dr. Stefan Lessmann Agenda What it is about Information Systems Who we are What
More informationDetecting Anomalies in Network Traffic Using Maximum Entropy Estimation
Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation Yu Gu, Andrew McCallum, Don Towsley Department of Computer Science, University of Massachusetts, Amherst, MA 01003 Abstract We develop
More informationWeb Mining Seminar CSE 450. Spring 2008 MWF 11:10 12:00pm Maginnes 113
CSE 450 Web Mining Seminar Spring 2008 MWF 11:10 12:00pm Maginnes 113 Instructor: Dr. Brian D. Davison Dept. of Computer Science & Engineering Lehigh University davison@cse.lehigh.edu http://www.cse.lehigh.edu/~brian/course/webmining/
More informationCourse 395: Machine Learning
Course 395: Machine Learning Lecturers: Maja Pantic (maja@doc.ic.ac.uk) Stavros Petridis (sp104@doc.ic.ac.uk) Goal (Lectures): To present basic theoretical concepts and key algorithms that form the core
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
More informationOnline Credit Card Application and Identity Crime Detection
Online Credit Card Application and Identity Crime Detection Ramkumar.E & Mrs Kavitha.P School of Computing Science, Hindustan University, Chennai ABSTRACT The credit cards have found widespread usage due
More informationBUSINESS INTELLIGENCE WITH DATA MINING FALL 2012 PROFESSOR MAYTAL SAAR-TSECHANSKY
BUSINESS INTELLIGENCE WITH DATA MINING FALL 2012 PROFESSOR MAYTAL SAAR-TSECHANSKY Data Mining: MIS 373/MKT 372 Professor Maytal Saar-Tsechansky UTC 1.146 For every leader in the company, not just for me,
More informationECE 697J Advanced Topics in Computer Networking
ECE 697J Advanced Topics in Computer Networking September 5 th, 2002 ECE 697J 1 Welcome! Research course: Active and Programmable Networks Network processor design Classes: Tuesday & Thursday 2:30 3:45,
More informationCSci 538 Articial Intelligence (Machine Learning and Data Analysis)
CSci 538 Articial Intelligence (Machine Learning and Data Analysis) Course Syllabus Fall 2015 Instructor Derek Harter, Ph.D., Associate Professor Department of Computer Science Texas A&M University - Commerce
More informationFRAUD DETECTION IN ELECTRIC POWER DISTRIBUTION NETWORKS USING AN ANN-BASED KNOWLEDGE-DISCOVERY PROCESS
FRAUD DETECTION IN ELECTRIC POWER DISTRIBUTION NETWORKS USING AN ANN-BASED KNOWLEDGE-DISCOVERY PROCESS Breno C. Costa, Bruno. L. A. Alberto, André M. Portela, W. Maduro, Esdras O. Eler PDITec, Belo Horizonte,
More informationIntroduction to Engineering Using Robotics Experiments Lecture 17 Big Data
Introduction to Engineering Using Robotics Experiments Lecture 17 Big Data Yinong Chen 2 Big Data Big Data Technologies Cloud Computing Service and Web-Based Computing Applications Industry Control Systems
More informationObservation and Findings
Chapter 6 Observation and Findings 6.1. Introduction This chapter discuss in detail about observation and findings based on survey performed. This research work is carried out in order to find out network
More informationUtility-Based Fraud Detection
Proceedings of the Twenty-Second International Joint Conference on Artificial Intelligence Utility-Based Fraud Detection Luis Torgo and Elsa Lopes Fac. of Sciences / LIAAD-INESC Porto LA University of
More informationCSC574 - Computer and Network Security Module: Intrusion Detection
CSC574 - Computer and Network Security Module: Intrusion Detection Prof. William Enck Spring 2013 1 Intrusion An authorized action... that exploits a vulnerability... that causes a compromise... and thus
More informationNetwork Intrusion Detection using Data Mining Technique
Network Intrusion Detection using Data Mining Technique Abstract - In recent years, most of the research has been done in the field of Intrusion Detection System (IDS) to detect attacks in network traffic
More informationIdentity Theft Prevention Program Compliance Model
September 29, 2008 State Rural Water Association Identity Theft Prevention Program Compliance Model Contact your State Rural Water Association www.nrwa.org Ed Thomas, Senior Environmental Engineer All
More informationData Mining Applications in Higher Education
Executive report Data Mining Applications in Higher Education Jing Luan, PhD Chief Planning and Research Officer, Cabrillo College Founder, Knowledge Discovery Laboratories Table of contents Introduction..............................................................2
More informationCHAPTER VII CONCLUSIONS
CHAPTER VII CONCLUSIONS To do successful research, you don t need to know everything, you just need to know of one thing that isn t known. -Arthur Schawlow In this chapter, we provide the summery of the
More informationSpeaker: Prof. Mubarak Shah, University of Central Florida. Title: Representing Human Actions as Motion Patterns
Speaker: Prof. Mubarak Shah, University of Central Florida Title: Representing Human Actions as Motion Patterns Abstract: Automatic analysis of videos is one of most challenging problems in Computer vision.
More informationThe Cyber Threat Profiler
Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are
More informationThe Data Mining Process
Sequence for Determining Necessary Data. Wrong: Catalog everything you have, and decide what data is important. Right: Work backward from the solution, define the problem explicitly, and map out the data
More informationData Mining System, Functionalities and Applications: A Radical Review
Data Mining System, Functionalities and Applications: A Radical Review Dr. Poonam Chaudhary System Programmer, Kurukshetra University, Kurukshetra Abstract: Data Mining is the process of locating potentially
More informationStudy and examination regulations (SPO) for the. International Master Geomatics. Degree awarded: Master of Science (M.Sc.)
SPO Geomatics Master s Degree Program Part B and C Study and examination regulations (SPO) for the International Master Geomatics Degree awarded: Master of Science (M.Sc.) Version 6 40-GMCM Program structure
More informationFuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson (jedicker@iastate.edu) and Julie A. Dickerson (julied@iastate.edu) Electrical and Computer Engineering Department Iowa State University
More informationA survey on Data Mining based Intrusion Detection Systems
International Journal of Computer Networks and Communications Security VOL. 2, NO. 12, DECEMBER 2014, 485 490 Available online at: www.ijcncs.org ISSN 2308-9830 A survey on Data Mining based Intrusion
More informationEndpoint Threat Detection without the Pain
WHITEPAPER Endpoint Threat Detection without the Pain Contents Motivated Adversaries, Too Many Alerts, Not Enough Actionable Information: Incident Response is Getting Harder... 1 A New Solution, with a
More information