Automatic feature selection for anomaly detection

Research output: Contributions to collected editions/worksArticle in conference proceedingsResearchpeer-review

Standard

Automatic feature selection for anomaly detection. / Kloft, Marius; Brefeld, Ulf; Düssel, Patrick et al.
Proceedings of the 1st ACM workshop on Workshop on AISec. ed. / Dirk Balfanz; Jessica Staddon. New York: Association for Computing Machinery, Inc, 2008. p. 71-76.

Research output: Contributions to collected editions/worksArticle in conference proceedingsResearchpeer-review

Harvard

Kloft, M, Brefeld, U, Düssel, P, Gehl, C & Laskov, P 2008, Automatic feature selection for anomaly detection. in D Balfanz & J Staddon (eds), Proceedings of the 1st ACM workshop on Workshop on AISec. Association for Computing Machinery, Inc, New York, pp. 71-76, AISec '08, Alexandria, United States, 27.10.08. https://doi.org/10.1145/1456377.1456395

APA

Kloft, M., Brefeld, U., Düssel, P., Gehl, C., & Laskov, P. (2008). Automatic feature selection for anomaly detection. In D. Balfanz, & J. Staddon (Eds.), Proceedings of the 1st ACM workshop on Workshop on AISec (pp. 71-76). Association for Computing Machinery, Inc. https://doi.org/10.1145/1456377.1456395

Vancouver

Kloft M, Brefeld U, Düssel P, Gehl C, Laskov P. Automatic feature selection for anomaly detection. In Balfanz D, Staddon J, editors, Proceedings of the 1st ACM workshop on Workshop on AISec. New York: Association for Computing Machinery, Inc. 2008. p. 71-76 doi: 10.1145/1456377.1456395

Bibtex

@inbook{efa05596d9964c9790f8625d4f2f928f,
title = "Automatic feature selection for anomaly detection",
abstract = "A frequent problem in anomaly detection is to decide among different feature sets to be used. For example, various features are known in network intrusion detection based on packet headers, content byte streams or application level protocol parsing. A method for automatic feature selection in anomaly detection is proposed which determines optimal mixture coeffcients for various sets of features. The method generalizes the support vector data description (SVDD) and can be expressed as a semi-innite linear program that can be solved with standard techniques. The case of a single feature set can be handled as a particular case of the proposed method. The experimental evaluation of the new method on unsanitized HTTP data demonstrates that detectors using automatically selected features attain competitive performance, while sparing practitioners from a priori decisions on feature sets to be used.",
keywords = "Informatics, Anomaly detection, Feature selection, Intrusion detection, Machine learning, Multiple kernel learning, Network security, Support vector data description, Business informatics",
author = "Marius Kloft and Ulf Brefeld and Patrick D{\"u}ssel and Christian Gehl and Pavel Laskov",
year = "2008",
month = oct,
day = "27",
doi = "10.1145/1456377.1456395",
language = "English",
isbn = "978-1-60558-291-7",
pages = "71--76",
editor = "Dirk Balfanz and Jessica Staddon",
booktitle = "Proceedings of the 1st ACM workshop on Workshop on AISec",
publisher = "Association for Computing Machinery, Inc",
address = "United States",
note = "AISec '08 ; Conference date: 27-10-2008 Through 31-10-2008",

}

RIS

TY - CHAP

T1 - Automatic feature selection for anomaly detection

AU - Kloft, Marius

AU - Brefeld, Ulf

AU - Düssel, Patrick

AU - Gehl, Christian

AU - Laskov, Pavel

N1 - Conference code: 1

PY - 2008/10/27

Y1 - 2008/10/27

N2 - A frequent problem in anomaly detection is to decide among different feature sets to be used. For example, various features are known in network intrusion detection based on packet headers, content byte streams or application level protocol parsing. A method for automatic feature selection in anomaly detection is proposed which determines optimal mixture coeffcients for various sets of features. The method generalizes the support vector data description (SVDD) and can be expressed as a semi-innite linear program that can be solved with standard techniques. The case of a single feature set can be handled as a particular case of the proposed method. The experimental evaluation of the new method on unsanitized HTTP data demonstrates that detectors using automatically selected features attain competitive performance, while sparing practitioners from a priori decisions on feature sets to be used.

AB - A frequent problem in anomaly detection is to decide among different feature sets to be used. For example, various features are known in network intrusion detection based on packet headers, content byte streams or application level protocol parsing. A method for automatic feature selection in anomaly detection is proposed which determines optimal mixture coeffcients for various sets of features. The method generalizes the support vector data description (SVDD) and can be expressed as a semi-innite linear program that can be solved with standard techniques. The case of a single feature set can be handled as a particular case of the proposed method. The experimental evaluation of the new method on unsanitized HTTP data demonstrates that detectors using automatically selected features attain competitive performance, while sparing practitioners from a priori decisions on feature sets to be used.

KW - Informatics

KW - Anomaly detection

KW - Feature selection

KW - Intrusion detection

KW - Machine learning

KW - Multiple kernel learning

KW - Network security

KW - Support vector data description

KW - Business informatics

UR - http://www.scopus.com/inward/record.url?scp=70349247747&partnerID=8YFLogxK

UR - https://www.mendeley.com/catalogue/c6580c7c-07a9-38a7-9e45-d56354877950/

U2 - 10.1145/1456377.1456395

DO - 10.1145/1456377.1456395

M3 - Article in conference proceedings

AN - SCOPUS:70349247747

SN - 978-1-60558-291-7

SP - 71

EP - 76

BT - Proceedings of the 1st ACM workshop on Workshop on AISec

A2 - Balfanz, Dirk

A2 - Staddon, Jessica

PB - Association for Computing Machinery, Inc

CY - New York

T2 - AISec '08

Y2 - 27 October 2008 through 31 October 2008

ER -

DOI

Recently viewed

Activities

  1. Effects of a seminar on mathematical modelling with MathCityMap
  2. Academy of Management Annual Meeting 2023
  3. Management Control in Supply Chain Management: A Concept and first Empirical Insights
  4. Media and Migration: An Introduction and two case studies
  5. BBC Fusion Summit: Playful interfaces for playful human beings: the future of game interfaces
  6. What do we educate for? Critical thinking and reflection as key concepts for a contemporary higher education
  7. “Will I look have I something?” Pragmatic variation across the Englishes
  8. New Work in Queer Studies
  9. 1st Global Conference on Research Integration and Implementation - i2S 2013
  10. International Convention of Psychological Science 2017
  11. Prototypes: The Usefulf Ambiguity of the „Biological Computer" (Annual Meeting of the AMERICAN SOCIETY FOR CYBERNETICS)
  12. Provenance as (Linked) Data
  13. Workshop - pre-ICIS IFIP WG 8.2 OASIS Workshop on Criticality and Values in Digital Transformation Research
  14. 12th EIASM Conference on Performance Measurement and Management Control - 2023
  15. Integrating Time Aspects into the Assessment of Sustainable Resource Management
  16. Towards a sustainable Southern Transylvania: Recognizing existing contributions to reach sustainable visions and empowering stakeholders
  17. Re-thinking Relationality in the Sociotechnological Condition
  18. Positiver Aktionismus
  19. A multi-criteria decision model for selecting a portfolio of sustainable phosphorus management strategies in different regions
  20. GDCP Jahrestagung 2020
  21. Determinants of Researchers' Roles in Real-World Transitions: A Comparative Analysis of Urban Real-World Laboratories
  22. Peripheral Expressionisms

Publications

  1. Reporting and Analysing the Environmental Impact of Language Models on the Example of Commonsense Question Answering with External Knowledge
  2. Using Daily Stretching to Counteract Performance Decreases as a Result of Reduced Physical Activity—A Controlled Trial
  3. Challenging the status quo of accelerator research: Concluding remarks
  4. A Besov space mapping property for the double layer potential on polygons
  5. Nonautonomous control of stable and unstable manifolds in two-dimensional flows
  6. Consensus statement on defining and measuring negative effects of Internet interventions
  7. Multifractality Versus (Mono-) Fractality as Evidence of Nonlinear Interactions Across Timescales
  8. Ensuring the Long-Term Provision of Heathland Ecosystem Services—The Importance of a Functional Perspective in Management Decision Frameworks
  9. Disentangling trade-offs and synergies around ecosystem services with the influence network framework
  10. Fruit Detection and Yield Mass Estimation from a UAV Based RGB Dense Cloud for an Apple Orchard
  11. Error handling in office work with computers
  12. Comparison of an Electrochemical and Luminescence-Based Oxygen Measuring System for Use in the Biodegradability Testing According to Closed Bottle Test (OECD 301D)
  13. Dimensions, dialectic, discourse
  14. Synthesis and future research directions linking tree diversity to growth, survival, and damage in a global network of tree diversity experiments
  15. A PD Fuzzy Control of a Nonholonomic Car-Like Robot for Drive Assistant Systems
  16. Maschinenbelegungsplanung mit evolutionären Algorithmen
  17. Time for the Environment: The Tutzing Time Ecology Project
  18. Mathematik als Fremdsprache?
  19. Papers from the 10th Lancaster University Postgraduate Conference in Linguistics and Language Teaching 2015
  20. Conceptualizing sustainable consumption
  21. Negotiating boundaries through reality shows
  22. A Theory-Based Concept for Fostering Sustainability Competencies in Engineering Programs
  23. "to expose, to show, to demonstrate, to inform, to offer. Artistic Practices around 1990"
  24. The development of an eco-label for software products
  25. “The whole is greater than the sum of its parts” – Exploring teachers’ technology readiness profiles and its relation to their emotional state during COVID-19 emergency remote teaching
  26. Innovative approaches in mathematical modeling
  27. Requests in Informal Conversations