Automatic feature selection for anomaly detection

Publikation: Beiträge in SammelwerkenAufsätze in KonferenzbändenForschungbegutachtet

Standard

Automatic feature selection for anomaly detection. / Kloft, Marius; Brefeld, Ulf; Düssel, Patrick et al.
Proceedings of the 1st ACM workshop on Workshop on AISec. Hrsg. / Dirk Balfanz; Jessica Staddon. New York: Association for Computing Machinery, Inc, 2008. S. 71-76.

Publikation: Beiträge in SammelwerkenAufsätze in KonferenzbändenForschungbegutachtet

Harvard

Kloft, M, Brefeld, U, Düssel, P, Gehl, C & Laskov, P 2008, Automatic feature selection for anomaly detection. in D Balfanz & J Staddon (Hrsg.), Proceedings of the 1st ACM workshop on Workshop on AISec. Association for Computing Machinery, Inc, New York, S. 71-76, AISec '08, Alexandria, USA / Vereinigte Staaten, 27.10.08. https://doi.org/10.1145/1456377.1456395

APA

Kloft, M., Brefeld, U., Düssel, P., Gehl, C., & Laskov, P. (2008). Automatic feature selection for anomaly detection. In D. Balfanz, & J. Staddon (Hrsg.), Proceedings of the 1st ACM workshop on Workshop on AISec (S. 71-76). Association for Computing Machinery, Inc. https://doi.org/10.1145/1456377.1456395

Vancouver

Kloft M, Brefeld U, Düssel P, Gehl C, Laskov P. Automatic feature selection for anomaly detection. in Balfanz D, Staddon J, Hrsg., Proceedings of the 1st ACM workshop on Workshop on AISec. New York: Association for Computing Machinery, Inc. 2008. S. 71-76 doi: 10.1145/1456377.1456395

Bibtex

@inbook{efa05596d9964c9790f8625d4f2f928f,
title = "Automatic feature selection for anomaly detection",
abstract = "A frequent problem in anomaly detection is to decide among different feature sets to be used. For example, various features are known in network intrusion detection based on packet headers, content byte streams or application level protocol parsing. A method for automatic feature selection in anomaly detection is proposed which determines optimal mixture coeffcients for various sets of features. The method generalizes the support vector data description (SVDD) and can be expressed as a semi-innite linear program that can be solved with standard techniques. The case of a single feature set can be handled as a particular case of the proposed method. The experimental evaluation of the new method on unsanitized HTTP data demonstrates that detectors using automatically selected features attain competitive performance, while sparing practitioners from a priori decisions on feature sets to be used.",
keywords = "Informatics, Anomaly detection, Feature selection, Intrusion detection, Machine learning, Multiple kernel learning, Network security, Support vector data description, Business informatics",
author = "Marius Kloft and Ulf Brefeld and Patrick D{\"u}ssel and Christian Gehl and Pavel Laskov",
year = "2008",
month = oct,
day = "27",
doi = "10.1145/1456377.1456395",
language = "English",
isbn = "978-1-60558-291-7",
pages = "71--76",
editor = "Dirk Balfanz and Jessica Staddon",
booktitle = "Proceedings of the 1st ACM workshop on Workshop on AISec",
publisher = "Association for Computing Machinery, Inc",
address = "United States",
note = "AISec '08 ; Conference date: 27-10-2008 Through 31-10-2008",

}

RIS

TY - CHAP

T1 - Automatic feature selection for anomaly detection

AU - Kloft, Marius

AU - Brefeld, Ulf

AU - Düssel, Patrick

AU - Gehl, Christian

AU - Laskov, Pavel

N1 - Conference code: 1

PY - 2008/10/27

Y1 - 2008/10/27

N2 - A frequent problem in anomaly detection is to decide among different feature sets to be used. For example, various features are known in network intrusion detection based on packet headers, content byte streams or application level protocol parsing. A method for automatic feature selection in anomaly detection is proposed which determines optimal mixture coeffcients for various sets of features. The method generalizes the support vector data description (SVDD) and can be expressed as a semi-innite linear program that can be solved with standard techniques. The case of a single feature set can be handled as a particular case of the proposed method. The experimental evaluation of the new method on unsanitized HTTP data demonstrates that detectors using automatically selected features attain competitive performance, while sparing practitioners from a priori decisions on feature sets to be used.

AB - A frequent problem in anomaly detection is to decide among different feature sets to be used. For example, various features are known in network intrusion detection based on packet headers, content byte streams or application level protocol parsing. A method for automatic feature selection in anomaly detection is proposed which determines optimal mixture coeffcients for various sets of features. The method generalizes the support vector data description (SVDD) and can be expressed as a semi-innite linear program that can be solved with standard techniques. The case of a single feature set can be handled as a particular case of the proposed method. The experimental evaluation of the new method on unsanitized HTTP data demonstrates that detectors using automatically selected features attain competitive performance, while sparing practitioners from a priori decisions on feature sets to be used.

KW - Informatics

KW - Anomaly detection

KW - Feature selection

KW - Intrusion detection

KW - Machine learning

KW - Multiple kernel learning

KW - Network security

KW - Support vector data description

KW - Business informatics

UR - http://www.scopus.com/inward/record.url?scp=70349247747&partnerID=8YFLogxK

UR - https://www.mendeley.com/catalogue/c6580c7c-07a9-38a7-9e45-d56354877950/

U2 - 10.1145/1456377.1456395

DO - 10.1145/1456377.1456395

M3 - Article in conference proceedings

AN - SCOPUS:70349247747

SN - 978-1-60558-291-7

SP - 71

EP - 76

BT - Proceedings of the 1st ACM workshop on Workshop on AISec

A2 - Balfanz, Dirk

A2 - Staddon, Jessica

PB - Association for Computing Machinery, Inc

CY - New York

T2 - AISec '08

Y2 - 27 October 2008 through 31 October 2008

ER -

DOI

Zuletzt angesehen

Publikationen

  1. Trees in the desert
  2. Conveying the Ethics of Artificial Intelligence in K–12 and Academia: A Systematic Review of Teaching Methods
  3. Low Resource Question Answering: An Amharic Benchmarking Dataset
  4. Genetically based differentiation in growth of multiple non-native plant species along a steep environmental gradient
  5. End-users’ perspective on digitalization
  6. The self-sabotage of conservation
  7. The Role of Assessment and Quality Management in Transformations towards Sustainable Development
  8. Exploring the motivations of protesters in contingent valuation
  9. Armed to Kill
  10. Web-based guided self-help for employees with depressive symptoms (Happy@Work)
  11. Corrosion behavior and microstructure of a broad range of Mg-Sn-X alloys
  12. A flexible semi-empirical model for estimating ammonia volatilization from field-applied slurry
  13. Conceptual frameworks and methods for advancing invasion ecology
  14. Using Large N Longitudinal Comparison to Explain Political Recruitment in Changing Democracies
  15. Article 3 Universal Application
  16. Walking Text and Writing Space
  17. Nachhaltigkeitsethik
  18. An interpretive perspective on co-production in supporting refugee families’ access to childcare in Germany
  19. Effekte inter-organisationaler Balanced Scorecards
  20. Fremde Töpfe
  21. Virtual-exchange collaboration timeline planner
  22. Fieldwork meets crisis: Introduction
  23. Das Reflexivitätsproblem und die Kategorienlehre
  24. Universität hat Zukunft
  25. Political Representation in the EU
  26. Globalisierung
  27. From the environmental state to the sustainability state? Conceptualization, indicators, and examples
  28. Amtsmenschen
  29. When (and how) ideas become arguments
  30. Fallstudie
  31. How environmental and social orientations influence the funding success of investment-based crowdfunding
  32. Fallstudie
  33. Average wage, qualification of the workforce and export performance in German enterprises: evidence from KombiFiD data
  34. How to measure energy-efficiency of software
  35. Small Particle Size Magnesium in One-pot Grignard-Zerewitinoff-like Reactions under Mechanochemical Conditions
  36. Bifunctional recombinant protein SDF1-GPVI as a new therapeutic concept for improved regeneration
  37. Can't Stop The Feeling
  38. Deformation-induced dynamic precipitation during creep in magnesium-tin alloys
  39. The attenuating effect of mortality salience on dishonest behavior
  40. Entrepreneurship and the "theory of planned behavior"
  41. Over here and over there
  42. Principles and perspectives of European criminal procedure
  43. Editorial Overview