Kickoff: Anomaly Detection Challenges

Size: px
Start display at page:

Download "Kickoff: Anomaly Detection Challenges"

Transcription

1 Kickoff: Anomaly Detection Challenges A Practical Course in SS2014 Huang Xiao Han Xiao Chair of IT Security (I20) Department of Informatics Technische Universität München January 31, 2014 Huang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17

2 Overview Motivation 1 Motivation 2 How to challenge 3 Evaluation 4 References uang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17

3 Motivation What is Anomaly Detection Definition Anomaly Detection is a process of discovering patterns in data which do not comply with their expected behavior. Similar terms can also be referred as outlier detection, novelty detection and so on. uang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17

4 Motivation What is Anomaly Detection Definition Anomaly Detection is a process of discovering patterns in data which do not comply with their expected behavior. Similar terms can also be referred as outlier detection, novelty detection and so on. Anomalies are... Rare Harmful Confusing *NOT* noises Huang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17

5 Motivation Curse of Anomalies Anomalous behaviors intend to compromise a system or service by maximizing certain interest. Fraudulent transactions of credit cards caused tremendous financial lost per year. Suspicious MRI images are possibly indicative of malicious existence of tumor. Anomalous network traffic measurement during a certain period might indicate a network hacking-through Unusual noises in motorcycle may also refer to some damage of the engine which could be fatal. Huang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17

6 Motivation Curse of Anomalies Anomalous behaviors intend to compromise a system or service by maximizing certain interest. Fraudulent transactions of credit cards caused tremendous financial lost per year. Suspicious MRI images are possibly indicative of malicious existence of tumor. Anomalous network traffic measurement during a certain period might indicate a network hacking-through Unusual noises in motorcycle may also refer to some damage of the engine which could be fatal. We need to do something with the anomalies. uang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17

7 Motivation General Course Information Type Practical Course (Praktikum) Credits 6 SWS / 10,0 ECTS-Credits Time Di, 14:00 to 15:30 Uhr Start-End Start from , ends at Where Lab room Advisors Huang Xiao & Han Xiao Language English Required Registered Master or Diplom of Informatik at TUM Home page Website of Chair Huang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17

8 Overview How to challenge 1 Motivation 2 How to challenge 3 Evaluation 4 References uang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17

9 How to challenge Objective We aim at... providing challengers a set of learning tasks, in which they are assigned with a certain data set including some anomalies. In the learning tasks, challengers are about to detect those anomalies using their own proposed methods. That is Anomaly detecion in teams Assigned data sets Apply own algorithms Benchmarks on data sets Ranking of detection performance uang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17

10 Process How to challenge Huang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17

11 Process How to challenge 1. Team up + Task assignment Team up with max. 2 persons, and we assign a well designed data set to all the teams. Huang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17

12 Process How to challenge 1. Team up + Task assignment Team up with max. 2 persons, and we assign a well designed data set to all the teams. 2. Do your homework Apply your own algorithms, e.g., statistics based, machine learning based, on the data set to find anomalies. Huang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17

13 Process How to challenge 1. Team up + Task assignment Team up with max. 2 persons, and we assign a well designed data set to all the teams. 2. Do your homework Apply your own algorithms, e.g., statistics based, machine learning based, on the data set to find anomalies. 3. Upload your results Upload the results on our Kaggle competition platform (TbA) for evaluation (Accuracy, False positive/negative). Huang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17

14 Process How to challenge 1. Team up + Task assignment Team up with max. 2 persons, and we assign a well designed data set to all the teams. 2. Do your homework Apply your own algorithms, e.g., statistics based, machine learning based, on the data set to find anomalies. 3. Upload your results Upload the results on our Kaggle competition platform (TbA) for evaluation (Accuracy, False positive/negative). 4. Report Present your work flow and results in class. Huang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17

15 More information How to challenge Team work You are expected to work on data sets in a team with maximal two persons. Of course, to work alone is also acceptable. Huang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17

16 How to challenge More information Team work You are expected to work on data sets in a team with maximal two persons. Of course, to work alone is also acceptable. Data sets All the data sets are real-world data in certain applied domain, e.g., network intrusion, credit card. Huang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17

17 How to challenge More information Team work You are expected to work on data sets in a team with maximal two persons. Of course, to work alone is also acceptable. Data sets All the data sets are real-world data in certain applied domain, e.g., network intrusion, credit card. Methods Algorithms are not limited in any category, you can use any anomaly detection methods, if you think it is relevant. Huang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17

18 How to challenge More information Team work You are expected to work on data sets in a team with maximal two persons. Of course, to work alone is also acceptable. Data sets All the data sets are real-world data in certain applied domain, e.g., network intrusion, credit card. Methods Algorithms are not limited in any category, you can use any anomaly detection methods, if you think it is relevant. Tools You can use any programming tools (frameworks) you like. We will give practical lectures in Matlab. Huang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17

19 How to challenge More information Team work You are expected to work on data sets in a team with maximal two persons. Of course, to work alone is also acceptable. Data sets All the data sets are real-world data in certain applied domain, e.g., network intrusion, credit card. Methods Algorithms are not limited in any category, you can use any anomaly detection methods, if you think it is relevant. Tools You can use any programming tools (frameworks) you like. We will give practical lectures in Matlab. Kaggle Kaggle is an online competition platform, our page will be opened very soon. Huang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17

20 How to challenge More information Team work You are expected to work on data sets in a team with maximal two persons. Of course, to work alone is also acceptable. Data sets All the data sets are real-world data in certain applied domain, e.g., network intrusion, credit card. Methods Algorithms are not limited in any category, you can use any anomaly detection methods, if you think it is relevant. Tools You can use any programming tools (frameworks) you like. We will give practical lectures in Matlab. Kaggle Kaggle is an online competition platform, our page will be opened very soon. Benchmarks Note that as a binary classification problem, your results will be evaluated for detection accuracy, false positive/negative. Huang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17

21 How to challenge More information Team work You are expected to work on data sets in a team with maximal two persons. Of course, to work alone is also acceptable. Data sets All the data sets are real-world data in certain applied domain, e.g., network intrusion, credit card. Methods Algorithms are not limited in any category, you can use any anomaly detection methods, if you think it is relevant. Tools You can use any programming tools (frameworks) you like. We will give practical lectures in Matlab. Kaggle Kaggle is an online competition platform, our page will be opened very soon. Benchmarks Note that as a binary classification problem, your results will be evaluated for detection accuracy, false positive/negative. Report You will present your results after a 2-weeks work in 15 min and hand in a report in A4 within 2 pages for each task. Huang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17

22 How to challenge You will also learn... During your work on the data set, we will also introduce... Classical machine learning algorithms in practice. Implement your own machine learning algorithms. Matlab tutorials in Machine learning. Schedule and topics are now available online. Huang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17

23 How to challenge Possible data sets KDD99 Intrusion Detection data set German credit card fraud detection data set The Paper-Author data set containing incorrect paper-author assignments NASA disk defect data set containing faults on disks Crowded scenes data sets consisting videos of a crowded pedestrian walkway and so on... Huang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17

24 How to challenge Possible data sets KDD99 Intrusion Detection data set German credit card fraud detection data set The Paper-Author data set containing incorrect paper-author assignments NASA disk defect data set containing faults on disks Crowded scenes data sets consisting videos of a crowded pedestrian walkway and so on... Other suggestions are warmly welcome! uang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17

25 Overview Evaluation 1 Motivation 2 How to challenge 3 Evaluation 4 References uang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17

26 Evaluation Evaluation of your credits There is no oral or written exams for practical course Your credits are evaluated as follows Credits C=0.3 T R P B, where T Talk for the results R Report for the results P Performance in class B Benchmarks (ranking) on Kaggle uang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17

27 Call for Data Sets Evaluation We announce each data set and learning task in class. But... If you have any interesting data sets for anomaly detection, they are extremely welcome! Simply contact us without hesitation. Huang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17

28 Evaluation Miscellaneous Register in Kaggle.com to be able to upload your results. We encourage using latex for the report. Bring your own laptop, possibly with Matlab Licence 1. Any feedback for the course is welcome. Teams are supposed to work independently. 1 You can inquire a student licence from Matlab RGB: uang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17

29 Overview References 1 Motivation 2 How to challenge 3 Evaluation 4 References uang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17

30 Reading list References Varun Chandola, et al. Anomaly detection: A survey. Journal ACM Computing Surveys (CSUR), July Nico Görnitz, et al. Toward Supervised Anomaly Detection. Journal of Articial Intelligence Research, Feb Victoria Hodge, et al. A Survey of Outlier Detection Methodologies. Journal Artificial Intelligence Review, Oct Simon Rogers, et al. A First Course in Machine Learning. CRC Press, Inc., Chris Bishop. Pattern recognition and Machine Learning. Springer, Huang Xiao, Han Xiao (Technische Universität München) Kickoff: Anomaly Detection Challenges January 31, / 17

CS 2750 Machine Learning. Lecture 1. Machine Learning. http://www.cs.pitt.edu/~milos/courses/cs2750/ CS 2750 Machine Learning.

CS 2750 Machine Learning. Lecture 1. Machine Learning. http://www.cs.pitt.edu/~milos/courses/cs2750/ CS 2750 Machine Learning. Lecture Machine Learning Milos Hauskrecht milos@cs.pitt.edu 539 Sennott Square, x5 http://www.cs.pitt.edu/~milos/courses/cs75/ Administration Instructor: Milos Hauskrecht milos@cs.pitt.edu 539 Sennott

More information

Anomaly detection. Problem motivation. Machine Learning

Anomaly detection. Problem motivation. Machine Learning Anomaly detection Problem motivation Machine Learning Anomaly detection example Aircraft engine features: = heat generated = vibration intensity Dataset: New engine: (vibration) (heat) Density estimation

More information

System Specification. Author: CMU Team

System Specification. Author: CMU Team System Specification Author: CMU Team Date: 09/23/2005 Table of Contents: 1. Introduction...2 1.1. Enhancement of vulnerability scanning tools reports 2 1.2. Intelligent monitoring of traffic to detect

More information

203.4770: Introduction to Machine Learning Dr. Rita Osadchy

203.4770: Introduction to Machine Learning Dr. Rita Osadchy 203.4770: Introduction to Machine Learning Dr. Rita Osadchy 1 Outline 1. About the Course 2. What is Machine Learning? 3. Types of problems and Situations 4. ML Example 2 About the course Course Homepage:

More information

AUTO CLAIM FRAUD DETECTION USING MULTI CLASSIFIER SYSTEM

AUTO CLAIM FRAUD DETECTION USING MULTI CLASSIFIER SYSTEM AUTO CLAIM FRAUD DETECTION USING MULTI CLASSIFIER SYSTEM ABSTRACT Luis Alexandre Rodrigues and Nizam Omar Department of Electrical Engineering, Mackenzie Presbiterian University, Brazil, São Paulo 71251911@mackenzie.br,nizam.omar@mackenzie.br

More information

Seminar TK: Ubiquitous Computing

Seminar TK: Ubiquitous Computing Seminar TK: Ubiquitous Computing Seminar 4 CP, Summer Term 2014 Immanuel Schweizer schweizer@tk.informatik.tu-darmstadt.de Based on slides by Dr. Leonardo Martucci, Florian Volk General Information What?

More information

Some Research Challenges for Big Data Analytics of Intelligent Security

Some Research Challenges for Big Data Analytics of Intelligent Security Some Research Challenges for Big Data Analytics of Intelligent Security Yuh-Jong Hu hu at cs.nccu.edu.tw Emerging Network Technology (ENT) Lab. Department of Computer Science National Chengchi University,

More information

Agreement on. Dual Degree Master Program in Computer Science KAIST. Technische Universität Berlin

Agreement on. Dual Degree Master Program in Computer Science KAIST. Technische Universität Berlin Agreement on Dual Degree Master Program in Computer Science between KAIST Department of Computer Science and Technische Universität Berlin Fakultät für Elektrotechnik und Informatik (Fakultät IV) 1 1 Subject

More information

Example application (1) Telecommunication. Lecture 1: Data Mining Overview and Process. Example application (2) Health

Example application (1) Telecommunication. Lecture 1: Data Mining Overview and Process. Example application (2) Health Lecture 1: Data Mining Overview and Process What is data mining? Example applications Definitions Multi disciplinary Techniques Major challenges The data mining process History of data mining Data mining

More information

Graduate School of Informatics

Graduate School of Informatics Graduate School of Informatics Admissions Policy '( ) ' ' - Master's Degree Program Major Enrollment Capacity 40 40 Doctor's Degree Program Major Enrollment Capacity 8 1 M. Entrance examination for international

More information

Information Management course

Information Management course Università degli Studi di Milano Master Degree in Computer Science Information Management course Teacher: Alberto Ceselli Lecture 01 : 06/10/2015 Practical informations: Teacher: Alberto Ceselli (alberto.ceselli@unimi.it)

More information

DATA MINING FOR BUSINESS INTELLIGENCE. Data Mining For Business Intelligence: MIS 382N.9/MKT 382 Professor Maytal Saar-Tsechansky

DATA MINING FOR BUSINESS INTELLIGENCE. Data Mining For Business Intelligence: MIS 382N.9/MKT 382 Professor Maytal Saar-Tsechansky DATA MINING FOR BUSINESS INTELLIGENCE PROFESSOR MAYTAL SAAR-TSECHANSKY Data Mining For Business Intelligence: MIS 382N.9/MKT 382 Professor Maytal Saar-Tsechansky This course provides a comprehensive introduction

More information

MACHINE LEARNING & INTRUSION DETECTION: HYPE OR REALITY?

MACHINE LEARNING & INTRUSION DETECTION: HYPE OR REALITY? MACHINE LEARNING & INTRUSION DETECTION: 1 SUMMARY The potential use of machine learning techniques for intrusion detection is widely discussed amongst security experts. At Kudelski Security, we looked

More information

Efficient Security Alert Management System

Efficient Security Alert Management System Efficient Security Alert Management System Minoo Deljavan Anvary IT Department School of e-learning Shiraz University Shiraz, Fars, Iran Majid Ghonji Feshki Department of Computer Science Qzvin Branch,

More information

OUTLIER ANALYSIS. Data Mining 1

OUTLIER ANALYSIS. Data Mining 1 OUTLIER ANALYSIS Data Mining 1 What Are Outliers? Outlier: A data object that deviates significantly from the normal objects as if it were generated by a different mechanism Ex.: Unusual credit card purchase,

More information

Insider Threat Detection Using Graph-Based Approaches

Insider Threat Detection Using Graph-Based Approaches Cybersecurity Applications & Technology Conference For Homeland Security Insider Threat Detection Using Graph-Based Approaches William Eberle Tennessee Technological University weberle@tntech.edu Lawrence

More information

Dan French Founder & CEO, Consider Solutions

Dan French Founder & CEO, Consider Solutions Dan French Founder & CEO, Consider Solutions CONSIDER SOLUTIONS Mission Solutions for World Class Finance Footprint Financial Control & Compliance Risk Assurance Process Optimization CLIENTS CONTEXT The

More information

Data Mining and Exploration. Data Mining and Exploration: Introduction. Relationships between courses. Overview. Course Introduction

Data Mining and Exploration. Data Mining and Exploration: Introduction. Relationships between courses. Overview. Course Introduction Data Mining and Exploration Data Mining and Exploration: Introduction Amos Storkey, School of Informatics January 10, 2006 http://www.inf.ed.ac.uk/teaching/courses/dme/ Course Introduction Welcome Administration

More information

An Introduction to Data Mining. Big Data World. Related Fields and Disciplines. What is Data Mining? 2/12/2015

An Introduction to Data Mining. Big Data World. Related Fields and Disciplines. What is Data Mining? 2/12/2015 An Introduction to Data Mining for Wind Power Management Spring 2015 Big Data World Every minute: Google receives over 4 million search queries Facebook users share almost 2.5 million pieces of content

More information

Steven C.H. Hoi School of Information Systems Singapore Management University Email: chhoi@smu.edu.sg

Steven C.H. Hoi School of Information Systems Singapore Management University Email: chhoi@smu.edu.sg Steven C.H. Hoi School of Information Systems Singapore Management University Email: chhoi@smu.edu.sg Introduction http://stevenhoi.org/ Finance Recommender Systems Cyber Security Machine Learning Visual

More information

An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus

An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus Tadashi Ogino* Okinawa National College of Technology, Okinawa, Japan. * Corresponding author. Email: ogino@okinawa-ct.ac.jp

More information

COMP3420: Advanced Databases and Data Mining. Classification and prediction: Introduction and Decision Tree Induction

COMP3420: Advanced Databases and Data Mining. Classification and prediction: Introduction and Decision Tree Induction COMP3420: Advanced Databases and Data Mining Classification and prediction: Introduction and Decision Tree Induction Lecture outline Classification versus prediction Classification A two step process Supervised

More information

CPSC 340: Machine Learning and Data Mining. Mark Schmidt University of British Columbia Fall 2015

CPSC 340: Machine Learning and Data Mining. Mark Schmidt University of British Columbia Fall 2015 CPSC 340: Machine Learning and Data Mining Mark Schmidt University of British Columbia Fall 2015 Outline 1) Intro to Machine Learning and Data Mining: Big data phenomenon and types of data. Definitions

More information

Azure Machine Learning, SQL Data Mining and R

Azure Machine Learning, SQL Data Mining and R Azure Machine Learning, SQL Data Mining and R Day-by-day Agenda Prerequisites No formal prerequisites. Basic knowledge of SQL Server Data Tools, Excel and any analytical experience helps. Best of all:

More information

Computational intelligence in intrusion detection systems

Computational intelligence in intrusion detection systems Computational intelligence in intrusion detection systems --- An introduction to an introduction Rick Chang @ TEIL Reference The use of computational intelligence in intrusion detection systems : A review

More information

Application of Data Mining Techniques in Intrusion Detection

Application of Data Mining Techniques in Intrusion Detection Application of Data Mining Techniques in Intrusion Detection LI Min An Yang Institute of Technology leiminxuan@sohu.com Abstract: The article introduced the importance of intrusion detection, as well as

More information

Anomaly and Fraud Detection with Oracle Data Mining 11g Release 2

Anomaly and Fraud Detection with Oracle Data Mining 11g Release 2 Oracle 11g DB Data Warehousing ETL OLAP Statistics Anomaly and Fraud Detection with Oracle Data Mining 11g Release 2 Data Mining Charlie Berger Sr. Director Product Management, Data

More information

Secure Because Math: Understanding ML- based Security Products (#SecureBecauseMath)

Secure Because Math: Understanding ML- based Security Products (#SecureBecauseMath) Secure Because Math: Understanding ML- based Security Products (#SecureBecauseMath) Alex Pinto Chief Data Scientist Niddel / MLSec Project @alexcpsec @MLSecProject @NiddelCorp MLSec Project / Niddel MLSec

More information

Classification and Prediction

Classification and Prediction Classification and Prediction Slides for Data Mining: Concepts and Techniques Chapter 7 Jiawei Han and Micheline Kamber Intelligent Database Systems Research Lab School of Computing Science Simon Fraser

More information

Knowledge Discovery from Data Bases Proposal for a MAP-I UC

Knowledge Discovery from Data Bases Proposal for a MAP-I UC Knowledge Discovery from Data Bases Proposal for a MAP-I UC P. Brazdil 1, João Gama 1, P. Azevedo 2 1 Universidade do Porto; 2 Universidade do Minho; 1 Knowledge Discovery from Data Bases We are deluged

More information

Credit Card Fraud Detection Using Self Organised Map

Credit Card Fraud Detection Using Self Organised Map International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 13 (2014), pp. 1343-1348 International Research Publications House http://www. irphouse.com Credit Card Fraud

More information

TIETS34 Seminar: Data Mining on Biometric identification

TIETS34 Seminar: Data Mining on Biometric identification TIETS34 Seminar: Data Mining on Biometric identification Youming Zhang Computer Science, School of Information Sciences, 33014 University of Tampere, Finland Youming.Zhang@uta.fi Course Description Content

More information

This translation is provided for convenience only; in case of discrepancy, the German version shall prevail.

This translation is provided for convenience only; in case of discrepancy, the German version shall prevail. This translation is provided for convenience only; in case of discrepancy, the German version shall prevail. Supervision Agreement in the context of a doctoral project at the Technische Universität München

More information

Resource-bounded Fraud Detection

Resource-bounded Fraud Detection Resource-bounded Fraud Detection Luis Torgo LIAAD-INESC Porto LA / FEP, University of Porto R. de Ceuta, 118, 6., 4050-190 Porto, Portugal ltorgo@liaad.up.pt http://www.liaad.up.pt/~ltorgo Abstract. This

More information

DATA MINING TECHNOLOGY. Keywords: data mining, data warehouse, knowledge discovery, OLAP, OLAM.

DATA MINING TECHNOLOGY. Keywords: data mining, data warehouse, knowledge discovery, OLAP, OLAM. DATA MINING TECHNOLOGY Georgiana Marin 1 Abstract In terms of data processing, classical statistical models are restrictive; it requires hypotheses, the knowledge and experience of specialists, equations,

More information

Subject Examination and Academic Regulations for the Research on Teaching and Learning Master s Programme at the Technische Universität München

Subject Examination and Academic Regulations for the Research on Teaching and Learning Master s Programme at the Technische Universität München Page 1 The version is provided merely as a convenience and is not intended to be a legally binding document. Subject Examination and Academic Regulations for the Research on Teaching and Learning Master

More information

Government of Russian Federation. Faculty of Computer Science School of Data Analysis and Artificial Intelligence

Government of Russian Federation. Faculty of Computer Science School of Data Analysis and Artificial Intelligence Government of Russian Federation Federal State Autonomous Educational Institution of High Professional Education National Research University «Higher School of Economics» Faculty of Computer Science School

More information

Intrusion Detection via Machine Learning for SCADA System Protection

Intrusion Detection via Machine Learning for SCADA System Protection Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. s.l.yasakethu@surrey.ac.uk J. Jiang Department

More information

Practical Data Science with Azure Machine Learning, SQL Data Mining, and R

Practical Data Science with Azure Machine Learning, SQL Data Mining, and R Practical Data Science with Azure Machine Learning, SQL Data Mining, and R Overview This 4-day class is the first of the two data science courses taught by Rafal Lukawiecki. Some of the topics will be

More information

Healthcare Measurement Analysis Using Data mining Techniques

Healthcare Measurement Analysis Using Data mining Techniques www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 03 Issue 07 July, 2014 Page No. 7058-7064 Healthcare Measurement Analysis Using Data mining Techniques 1 Dr.A.Shaik

More information

Adaptive Anomaly Detection for Network Security

Adaptive Anomaly Detection for Network Security International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 5, Number 1 (2013), pp. 1-9 International Research Publication House http://www.irphouse.com Adaptive Anomaly Detection for

More information

Profit from Big Data flow. Hospital Revenue Leakage: Minimizing missing charges in hospital systems

Profit from Big Data flow. Hospital Revenue Leakage: Minimizing missing charges in hospital systems Profit from Big Data flow Hospital Revenue Leakage: Minimizing missing charges in hospital systems Hospital Revenue Leakage White Paper 2 Tapping the hidden assets in hospitals data Missed charges on patient

More information

95-791 Data Mining Carnegie Mellon University Mini 2, Fall 2015. Syllabus

95-791 Data Mining Carnegie Mellon University Mini 2, Fall 2015. Syllabus 95-791 Data Mining Carnegie Mellon University Mini 2, Fall 2015 Syllabus Instructor Dr. Artur Dubrawski awd@cs.cmu.edu, Newell-Simon Hall 3121 Mondays, 4:45pm-5:55pm (advance notice please). Head Teaching

More information

Using Predictive Analytics to Detect Contract Fraud, Waste, and Abuse Case Study from U.S. Postal Service OIG

Using Predictive Analytics to Detect Contract Fraud, Waste, and Abuse Case Study from U.S. Postal Service OIG Using Predictive Analytics to Detect Contract Fraud, Waste, and Abuse Case Study from U.S. Postal Service OIG MACPA Government & Non Profit Conference April 26, 2013 Isaiah Goodall, Director of Business

More information

A Survey on Outlier Detection Techniques for Credit Card Fraud Detection

A Survey on Outlier Detection Techniques for Credit Card Fraud Detection IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. VI (Mar-Apr. 2014), PP 44-48 A Survey on Outlier Detection Techniques for Credit Card Fraud

More information

Wisconsin Rural Water Association Identity Theft Prevention Program Compliance Model

Wisconsin Rural Water Association Identity Theft Prevention Program Compliance Model Wisconsin Rural Water Association Identity Theft Prevention Program Compliance Model All utilities are required to comply with this regulation. The Red Flag Rule requires any entity where there is a risk

More information

Introduction. A. Bellaachia Page: 1

Introduction. A. Bellaachia Page: 1 Introduction 1. Objectives... 3 2. What is Data Mining?... 4 3. Knowledge Discovery Process... 5 4. KD Process Example... 7 5. Typical Data Mining Architecture... 8 6. Database vs. Data Mining... 9 7.

More information

SURVEY OF INTRUSION DETECTION SYSTEM

SURVEY OF INTRUSION DETECTION SYSTEM SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT

More information

Data Mining Application for Cyber Credit-card Fraud Detection System

Data Mining Application for Cyber Credit-card Fraud Detection System , July 3-5, 2013, London, U.K. Data Mining Application for Cyber Credit-card Fraud Detection System John Akhilomen Abstract: Since the evolution of the internet, many small and large companies have moved

More information

Maschinelles Lernen mit MATLAB

Maschinelles Lernen mit MATLAB Maschinelles Lernen mit MATLAB Jérémy Huard Applikationsingenieur The MathWorks GmbH 2015 The MathWorks, Inc. 1 Machine Learning is Everywhere Image Recognition Speech Recognition Stock Prediction Medical

More information

Introduction to Data Mining

Introduction to Data Mining Introduction to Data Mining 1 Why Data Mining? Explosive Growth of Data Data collection and data availability Automated data collection tools, Internet, smartphones, Major sources of abundant data Business:

More information

Statistics W4240: Data Mining Columbia University Spring, 2014

Statistics W4240: Data Mining Columbia University Spring, 2014 Statistics W4240: Data Mining Columbia University Spring, 2014 Version: January 30, 2014. The syllabus is subject to change, so look for the version with the most recent date. Course Description Massive

More information

AMIS 7640 Data Mining for Business Intelligence

AMIS 7640 Data Mining for Business Intelligence The Ohio State University The Max M. Fisher College of Business Department of Accounting and Management Information Systems AMIS 7640 Data Mining for Business Intelligence Autumn Semester 2013, Session

More information

Data Mining and Business Intelligence CIT-6-DMB. http://blackboard.lsbu.ac.uk. Faculty of Business 2011/2012. Level 6

Data Mining and Business Intelligence CIT-6-DMB. http://blackboard.lsbu.ac.uk. Faculty of Business 2011/2012. Level 6 Data Mining and Business Intelligence CIT-6-DMB http://blackboard.lsbu.ac.uk Faculty of Business 2011/2012 Level 6 Table of Contents 1. Module Details... 3 2. Short Description... 3 3. Aims of the Module...

More information

MA2823: Foundations of Machine Learning

MA2823: Foundations of Machine Learning MA2823: Foundations of Machine Learning École Centrale Paris Fall 2015 Chloé-Agathe Azencot Centre for Computational Biology, Mines ParisTech chloe agathe.azencott@mines paristech.fr TAs: Jiaqian Yu jiaqian.yu@centralesupelec.fr

More information

Domain Classification of Technical Terms Using the Web

Domain Classification of Technical Terms Using the Web Systems and Computers in Japan, Vol. 38, No. 14, 2007 Translated from Denshi Joho Tsushin Gakkai Ronbunshi, Vol. J89-D, No. 11, November 2006, pp. 2470 2482 Domain Classification of Technical Terms Using

More information

Machine Learning and Data Mining. Fundamentals, robotics, recognition

Machine Learning and Data Mining. Fundamentals, robotics, recognition Machine Learning and Data Mining Fundamentals, robotics, recognition Machine Learning, Data Mining, Knowledge Discovery in Data Bases Their mutual relations Data Mining, Knowledge Discovery in Databases,

More information

Data Mining for Security Applications

Data Mining for Security Applications 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing Data Mining for Security Applications Bhavani Thuraisingham, Latifur Khan, Mohammad M. Masud, Kevin W. Hamlen The University

More information

Business Analytics. 0. Overview. Lars Schmidt-Thieme. Information Systems and Machine Learning Lab (ISMLL) University of Hildesheim, Germany

Business Analytics. 0. Overview. Lars Schmidt-Thieme. Information Systems and Machine Learning Lab (ISMLL) University of Hildesheim, Germany Business Analytics 0. Overview Lars Schmidt-Thieme Information Systems and Machine Learning Lab (ISMLL) University of Hildesheim, Germany 1 / 19 Outline 1. What is Business Analytics? 3. Organizational

More information

Big Data and Cyber Security A bibliometric study Jacky Akoka, Isabelle Comyn-Wattiau, Nabil Laoufi Workshop SCBC - 2015 (ER 2015) 1 Big Data a new generation of technologies and architectures, designed

More information

A Knowledge-Based Intrusion Detection Engine to detect attacks on security protocols

A Knowledge-Based Intrusion Detection Engine to detect attacks on security protocols The International Journal Of Engineering And Science (IJES) Volume 3 Issue 3 Pages 30-36 2014 ISSN (e): 2319 1813 ISSN (p): 2319 1805 A Knowledge-Based Intrusion Detection Engine to detect attacks on security

More information

Subject Description Form

Subject Description Form Subject Description Form Subject Code Subject Title COMP417 Data Warehousing and Data Mining Techniques in Business and Commerce Credit Value 3 Level 4 Pre-requisite / Co-requisite/ Exclusion Objectives

More information

Spam detection with data mining method:

Spam detection with data mining method: Spam detection with data mining method: Ensemble learning with multiple SVM based classifiers to optimize generalization ability of email spam classification Keywords: ensemble learning, SVM classifier,

More information

Using Artificial Intelligence in Intrusion Detection Systems

Using Artificial Intelligence in Intrusion Detection Systems Using Artificial Intelligence in Intrusion Detection Systems Matti Manninen Helsinki University of Technology mimannin@niksula.hut.fi Abstract Artificial Intelligence could make the use of Intrusion Detection

More information

Integration Misuse and Anomaly Detection Techniques on Distributed Sensors

Integration Misuse and Anomaly Detection Techniques on Distributed Sensors Integration Misuse and Anomaly Detection Techniques on Distributed Sensors Shih-Yi Tu Chung-Huang Yang Kouichi Sakurai Graduate Institute of Information and Computer Education, National Kaohsiung Normal

More information

Discover Viterbi: New Programs in Computer Science

Discover Viterbi: New Programs in Computer Science Discover Viterbi: New Programs in Computer Science Gaurav S. Sukhatme Professor and Chairman USC Computer Science Department Meghan McKenna Balding Graduate & Professional Programs April 23, 2013 WebEx

More information

Using Random Forest to Learn Imbalanced Data

Using Random Forest to Learn Imbalanced Data Using Random Forest to Learn Imbalanced Data Chao Chen, chenchao@stat.berkeley.edu Department of Statistics,UC Berkeley Andy Liaw, andy liaw@merck.com Biometrics Research,Merck Research Labs Leo Breiman,

More information

Evaluating Online Payment Transaction Reliability using Rules Set Technique and Graph Model

Evaluating Online Payment Transaction Reliability using Rules Set Technique and Graph Model Evaluating Online Payment Transaction Reliability using Rules Set Technique and Graph Model Trung Le 1, Ba Quy Tran 2, Hanh Dang Thi My 3, Thanh Hung Ngo 4 1 GSR, Information System Lab., University of

More information

The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack

The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack Asnita Hashim, University of Technology MARA, Malaysia April 14-15, 2011 The Integration of SNORT with K-Means Clustering

More information

Data Mining Solutions for the Business Environment

Data Mining Solutions for the Business Environment Database Systems Journal vol. IV, no. 4/2013 21 Data Mining Solutions for the Business Environment Ruxandra PETRE University of Economic Studies, Bucharest, Romania ruxandra_stefania.petre@yahoo.com Over

More information

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2.

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2. CSET 4850 Computer Network Security (4 semester credit hours) CSET Elective IT Elective Current Catalog Description: Theory and practice of network security. Topics include firewalls, Windows, UNIX and

More information

Knowledge-based systems and the need for learning

Knowledge-based systems and the need for learning Knowledge-based systems and the need for learning The implementation of a knowledge-based system can be quite difficult. Furthermore, the process of reasoning with that knowledge can be quite slow. This

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015 RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering

More information

A Survey on Intrusion Detection System with Data Mining Techniques

A Survey on Intrusion Detection System with Data Mining Techniques A Survey on Intrusion Detection System with Data Mining Techniques Ms. Ruth D 1, Mrs. Lovelin Ponn Felciah M 2 1 M.Phil Scholar, Department of Computer Science, Bishop Heber College (Autonomous), Trichirappalli,

More information

Orientation Program for Students of Our MSc. Programs Business Administration, Economics and MEMS. Information Systems. Prof. Dr.

Orientation Program for Students of Our MSc. Programs Business Administration, Economics and MEMS. Information Systems. Prof. Dr. Orientation Program for Students of Our MSc. Programs Business Administration, Economics and MEMS Information Systems Prof. Dr. Stefan Lessmann Agenda What it is about Information Systems Who we are What

More information

Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation

Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation Yu Gu, Andrew McCallum, Don Towsley Department of Computer Science, University of Massachusetts, Amherst, MA 01003 Abstract We develop

More information

Web Mining Seminar CSE 450. Spring 2008 MWF 11:10 12:00pm Maginnes 113

Web Mining Seminar CSE 450. Spring 2008 MWF 11:10 12:00pm Maginnes 113 CSE 450 Web Mining Seminar Spring 2008 MWF 11:10 12:00pm Maginnes 113 Instructor: Dr. Brian D. Davison Dept. of Computer Science & Engineering Lehigh University davison@cse.lehigh.edu http://www.cse.lehigh.edu/~brian/course/webmining/

More information

Course 395: Machine Learning

Course 395: Machine Learning Course 395: Machine Learning Lecturers: Maja Pantic (maja@doc.ic.ac.uk) Stavros Petridis (sp104@doc.ic.ac.uk) Goal (Lectures): To present basic theoretical concepts and key algorithms that form the core

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014 RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer

More information

Online Credit Card Application and Identity Crime Detection

Online Credit Card Application and Identity Crime Detection Online Credit Card Application and Identity Crime Detection Ramkumar.E & Mrs Kavitha.P School of Computing Science, Hindustan University, Chennai ABSTRACT The credit cards have found widespread usage due

More information

BUSINESS INTELLIGENCE WITH DATA MINING FALL 2012 PROFESSOR MAYTAL SAAR-TSECHANSKY

BUSINESS INTELLIGENCE WITH DATA MINING FALL 2012 PROFESSOR MAYTAL SAAR-TSECHANSKY BUSINESS INTELLIGENCE WITH DATA MINING FALL 2012 PROFESSOR MAYTAL SAAR-TSECHANSKY Data Mining: MIS 373/MKT 372 Professor Maytal Saar-Tsechansky UTC 1.146 For every leader in the company, not just for me,

More information

ECE 697J Advanced Topics in Computer Networking

ECE 697J Advanced Topics in Computer Networking ECE 697J Advanced Topics in Computer Networking September 5 th, 2002 ECE 697J 1 Welcome! Research course: Active and Programmable Networks Network processor design Classes: Tuesday & Thursday 2:30 3:45,

More information

CSci 538 Articial Intelligence (Machine Learning and Data Analysis)

CSci 538 Articial Intelligence (Machine Learning and Data Analysis) CSci 538 Articial Intelligence (Machine Learning and Data Analysis) Course Syllabus Fall 2015 Instructor Derek Harter, Ph.D., Associate Professor Department of Computer Science Texas A&M University - Commerce

More information

FRAUD DETECTION IN ELECTRIC POWER DISTRIBUTION NETWORKS USING AN ANN-BASED KNOWLEDGE-DISCOVERY PROCESS

FRAUD DETECTION IN ELECTRIC POWER DISTRIBUTION NETWORKS USING AN ANN-BASED KNOWLEDGE-DISCOVERY PROCESS FRAUD DETECTION IN ELECTRIC POWER DISTRIBUTION NETWORKS USING AN ANN-BASED KNOWLEDGE-DISCOVERY PROCESS Breno C. Costa, Bruno. L. A. Alberto, André M. Portela, W. Maduro, Esdras O. Eler PDITec, Belo Horizonte,

More information

Introduction to Engineering Using Robotics Experiments Lecture 17 Big Data

Introduction to Engineering Using Robotics Experiments Lecture 17 Big Data Introduction to Engineering Using Robotics Experiments Lecture 17 Big Data Yinong Chen 2 Big Data Big Data Technologies Cloud Computing Service and Web-Based Computing Applications Industry Control Systems

More information

Observation and Findings

Observation and Findings Chapter 6 Observation and Findings 6.1. Introduction This chapter discuss in detail about observation and findings based on survey performed. This research work is carried out in order to find out network

More information

Utility-Based Fraud Detection

Utility-Based Fraud Detection Proceedings of the Twenty-Second International Joint Conference on Artificial Intelligence Utility-Based Fraud Detection Luis Torgo and Elsa Lopes Fac. of Sciences / LIAAD-INESC Porto LA University of

More information

CSC574 - Computer and Network Security Module: Intrusion Detection

CSC574 - Computer and Network Security Module: Intrusion Detection CSC574 - Computer and Network Security Module: Intrusion Detection Prof. William Enck Spring 2013 1 Intrusion An authorized action... that exploits a vulnerability... that causes a compromise... and thus

More information

Network Intrusion Detection using Data Mining Technique

Network Intrusion Detection using Data Mining Technique Network Intrusion Detection using Data Mining Technique Abstract - In recent years, most of the research has been done in the field of Intrusion Detection System (IDS) to detect attacks in network traffic

More information

Identity Theft Prevention Program Compliance Model

Identity Theft Prevention Program Compliance Model September 29, 2008 State Rural Water Association Identity Theft Prevention Program Compliance Model Contact your State Rural Water Association www.nrwa.org Ed Thomas, Senior Environmental Engineer All

More information

Data Mining Applications in Higher Education

Data Mining Applications in Higher Education Executive report Data Mining Applications in Higher Education Jing Luan, PhD Chief Planning and Research Officer, Cabrillo College Founder, Knowledge Discovery Laboratories Table of contents Introduction..............................................................2

More information

CHAPTER VII CONCLUSIONS

CHAPTER VII CONCLUSIONS CHAPTER VII CONCLUSIONS To do successful research, you don t need to know everything, you just need to know of one thing that isn t known. -Arthur Schawlow In this chapter, we provide the summery of the

More information

Speaker: Prof. Mubarak Shah, University of Central Florida. Title: Representing Human Actions as Motion Patterns

Speaker: Prof. Mubarak Shah, University of Central Florida. Title: Representing Human Actions as Motion Patterns Speaker: Prof. Mubarak Shah, University of Central Florida Title: Representing Human Actions as Motion Patterns Abstract: Automatic analysis of videos is one of most challenging problems in Computer vision.

More information

The Cyber Threat Profiler

The Cyber Threat Profiler Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are

More information

The Data Mining Process

The Data Mining Process Sequence for Determining Necessary Data. Wrong: Catalog everything you have, and decide what data is important. Right: Work backward from the solution, define the problem explicitly, and map out the data

More information

Data Mining System, Functionalities and Applications: A Radical Review

Data Mining System, Functionalities and Applications: A Radical Review Data Mining System, Functionalities and Applications: A Radical Review Dr. Poonam Chaudhary System Programmer, Kurukshetra University, Kurukshetra Abstract: Data Mining is the process of locating potentially

More information

Study and examination regulations (SPO) for the. International Master Geomatics. Degree awarded: Master of Science (M.Sc.)

Study and examination regulations (SPO) for the. International Master Geomatics. Degree awarded: Master of Science (M.Sc.) SPO Geomatics Master s Degree Program Part B and C Study and examination regulations (SPO) for the International Master Geomatics Degree awarded: Master of Science (M.Sc.) Version 6 40-GMCM Program structure

More information

Fuzzy Network Profiling for Intrusion Detection

Fuzzy Network Profiling for Intrusion Detection Fuzzy Network Profiling for Intrusion Detection John E. Dickerson (jedicker@iastate.edu) and Julie A. Dickerson (julied@iastate.edu) Electrical and Computer Engineering Department Iowa State University

More information

A survey on Data Mining based Intrusion Detection Systems

A survey on Data Mining based Intrusion Detection Systems International Journal of Computer Networks and Communications Security VOL. 2, NO. 12, DECEMBER 2014, 485 490 Available online at: www.ijcncs.org ISSN 2308-9830 A survey on Data Mining based Intrusion

More information

Endpoint Threat Detection without the Pain

Endpoint Threat Detection without the Pain WHITEPAPER Endpoint Threat Detection without the Pain Contents Motivated Adversaries, Too Many Alerts, Not Enough Actionable Information: Incident Response is Getting Harder... 1 A New Solution, with a

More information