Automatic feature selection for anomaly detection

Publikation: Beiträge in SammelwerkenAufsätze in KonferenzbändenForschungbegutachtet

Standard

Automatic feature selection for anomaly detection. / Kloft, Marius; Brefeld, Ulf; Düssel, Patrick et al.
Proceedings of the 1st ACM workshop on Workshop on AISec. Hrsg. / Dirk Balfanz; Jessica Staddon. New York: Association for Computing Machinery, Inc, 2008. S. 71-76.

Publikation: Beiträge in SammelwerkenAufsätze in KonferenzbändenForschungbegutachtet

Harvard

Kloft, M, Brefeld, U, Düssel, P, Gehl, C & Laskov, P 2008, Automatic feature selection for anomaly detection. in D Balfanz & J Staddon (Hrsg.), Proceedings of the 1st ACM workshop on Workshop on AISec. Association for Computing Machinery, Inc, New York, S. 71-76, AISec '08, Alexandria, USA / Vereinigte Staaten, 27.10.08. https://doi.org/10.1145/1456377.1456395

APA

Kloft, M., Brefeld, U., Düssel, P., Gehl, C., & Laskov, P. (2008). Automatic feature selection for anomaly detection. In D. Balfanz, & J. Staddon (Hrsg.), Proceedings of the 1st ACM workshop on Workshop on AISec (S. 71-76). Association for Computing Machinery, Inc. https://doi.org/10.1145/1456377.1456395

Vancouver

Kloft M, Brefeld U, Düssel P, Gehl C, Laskov P. Automatic feature selection for anomaly detection. in Balfanz D, Staddon J, Hrsg., Proceedings of the 1st ACM workshop on Workshop on AISec. New York: Association for Computing Machinery, Inc. 2008. S. 71-76 doi: 10.1145/1456377.1456395

Bibtex

@inbook{efa05596d9964c9790f8625d4f2f928f,
title = "Automatic feature selection for anomaly detection",
abstract = "A frequent problem in anomaly detection is to decide among different feature sets to be used. For example, various features are known in network intrusion detection based on packet headers, content byte streams or application level protocol parsing. A method for automatic feature selection in anomaly detection is proposed which determines optimal mixture coeffcients for various sets of features. The method generalizes the support vector data description (SVDD) and can be expressed as a semi-innite linear program that can be solved with standard techniques. The case of a single feature set can be handled as a particular case of the proposed method. The experimental evaluation of the new method on unsanitized HTTP data demonstrates that detectors using automatically selected features attain competitive performance, while sparing practitioners from a priori decisions on feature sets to be used.",
keywords = "Informatics, Anomaly detection, Feature selection, Intrusion detection, Machine learning, Multiple kernel learning, Network security, Support vector data description, Business informatics",
author = "Marius Kloft and Ulf Brefeld and Patrick D{\"u}ssel and Christian Gehl and Pavel Laskov",
year = "2008",
month = oct,
day = "27",
doi = "10.1145/1456377.1456395",
language = "English",
isbn = "978-1-60558-291-7",
pages = "71--76",
editor = "Dirk Balfanz and Jessica Staddon",
booktitle = "Proceedings of the 1st ACM workshop on Workshop on AISec",
publisher = "Association for Computing Machinery, Inc",
address = "United States",
note = "AISec '08 ; Conference date: 27-10-2008 Through 31-10-2008",

}

RIS

TY - CHAP

T1 - Automatic feature selection for anomaly detection

AU - Kloft, Marius

AU - Brefeld, Ulf

AU - Düssel, Patrick

AU - Gehl, Christian

AU - Laskov, Pavel

N1 - Conference code: 1

PY - 2008/10/27

Y1 - 2008/10/27

N2 - A frequent problem in anomaly detection is to decide among different feature sets to be used. For example, various features are known in network intrusion detection based on packet headers, content byte streams or application level protocol parsing. A method for automatic feature selection in anomaly detection is proposed which determines optimal mixture coeffcients for various sets of features. The method generalizes the support vector data description (SVDD) and can be expressed as a semi-innite linear program that can be solved with standard techniques. The case of a single feature set can be handled as a particular case of the proposed method. The experimental evaluation of the new method on unsanitized HTTP data demonstrates that detectors using automatically selected features attain competitive performance, while sparing practitioners from a priori decisions on feature sets to be used.

AB - A frequent problem in anomaly detection is to decide among different feature sets to be used. For example, various features are known in network intrusion detection based on packet headers, content byte streams or application level protocol parsing. A method for automatic feature selection in anomaly detection is proposed which determines optimal mixture coeffcients for various sets of features. The method generalizes the support vector data description (SVDD) and can be expressed as a semi-innite linear program that can be solved with standard techniques. The case of a single feature set can be handled as a particular case of the proposed method. The experimental evaluation of the new method on unsanitized HTTP data demonstrates that detectors using automatically selected features attain competitive performance, while sparing practitioners from a priori decisions on feature sets to be used.

KW - Informatics

KW - Anomaly detection

KW - Feature selection

KW - Intrusion detection

KW - Machine learning

KW - Multiple kernel learning

KW - Network security

KW - Support vector data description

KW - Business informatics

UR - http://www.scopus.com/inward/record.url?scp=70349247747&partnerID=8YFLogxK

UR - https://www.mendeley.com/catalogue/c6580c7c-07a9-38a7-9e45-d56354877950/

U2 - 10.1145/1456377.1456395

DO - 10.1145/1456377.1456395

M3 - Article in conference proceedings

AN - SCOPUS:70349247747

SN - 978-1-60558-291-7

SP - 71

EP - 76

BT - Proceedings of the 1st ACM workshop on Workshop on AISec

A2 - Balfanz, Dirk

A2 - Staddon, Jessica

PB - Association for Computing Machinery, Inc

CY - New York

T2 - AISec '08

Y2 - 27 October 2008 through 31 October 2008

ER -

DOI

Zuletzt angesehen

Publikationen

  1. Precrop functional group identity affects yield of winter barley but less so high carbon amendments in a mesocosm experiment
  2. Performance of the DSM-5-based criteria for Internet addiction
  3. Analyzing Emotional Styles in the Field of Christian Religion and The Relevance of New Types of Visualization
  4. Risk Aversion and Sorting into Public Sector Employment
  5. Operationalizing Network Theory for Ecosystem Service Assessments
  6. Synthesis and future research directions linking tree diversity to growth, survival, and damage in a global network of tree diversity experiments
  7. Water quantity and quality in the Zerafshan river basin - only an upstream riparian problem?
  8. Calibration of a simple method for determining ammonia loss in the field
  9. Quasi-in-situ observation of microstructure at the friction interface
  10. An Experimental Approach to the Optimization of Customer Information at the Point of Sale
  11. Sprachen in Liechtenstein
  12. A path to clean water
  13. The Crowd in Flux
  14. Qualitative Daten computergestutzt auswerten
  15. Consumers' Responses to CSR Activities
  16. RAWSim-O: A Simulation Framework for Robotic Mobile Fulfillment Systems
  17. Early-Career Researchers’ Perceptions of the Prevalence of Questionable Research Practices, Potential Causes, and Open Science
  18. The complementary relationship of exploration and exploitation in professional service firms: An exploratory study of IT consulting firms
  19. Glancing into the Applied Tool Box
  20. Genetically based differentiation in growth of multiple non-native plant species along a steep environmental gradient
  21. Mechanics of sheet-bulk indentation
  22. Heterogenität
  23. Benchmarking question answering systems
  24. Are the terms “Socio-economic status” and “Class status” a warped form of reasoning for Max Weber?
  25. Recruitment practices in small and medium size enterprises.
  26. Ownership Patterns and Enterprise Groups in German Structural Business Statistics
  27. Tree diversity promotes predator but not omnivore ants in a subtropical Chinese forest
  28. Robust Control using Sliding Mode Approach for Ice-Clamping Device activated by Thermoelectric Coolers
  29. Facing Up to Third Party Liability for Space Activities
  30. A practical perspective on repatriate knowledge transfer
  31. Implementierung eines Fehlerpräventionsprogramms für gefahrenintensive Arbeitsprozesse
  32. Semi-polar root exudates in natural grassland communities
  33. »CO2 causes a hole in the atmosphere« Using laypeople’s conceptions as a starting point to communicate climate change
  34. ETL ensembles for chunking, NER and SRL
  35. Time and Income Poverty – An Interdependent Multidimensional Poverty Approach with German Time Use Diary Data
  36. Criticality and Values in Digital Transformation Research: Insights from a Workshop
  37. Commitment Strategies for Sustainability
  38. The Weinberg-Salam Model of Electroweak Interactions
  39. Fostering pre-service teachers’ knowledge of ‘teaching games for understanding’ via video-based vs. text-based teaching examples
  40. Plants, Androids and Operators
  41. Visualizing stakeholders’ willingness for collective action in participatory scenario planning
  42. Action theory
  43. Time Use and Time Budgets
  44. Direct measurement of cognitive load in multimedia learning
  45. No need for new natural gas pipelines and LNG terminalsin Europe
  46. Das Problem der Unbestimmtheit des Rechts
  47. Effect of salinity-changing rates on filtration activity of mussels from two sites within the Baltic Mytilus hybrid zone
  48. Politics after Networks