A New Centralized Detection-Based Process for Evaluating Anomalies and Analyzing the First Causes Using Machine Learning and Web Semantic

被引:0
作者
Lasbahani, Abdellatif [1 ]
Tahri, Rachid [2 ]
Jarrar, Abdessamed [3 ]
Balouki, Youssef [2 ]
机构
[1] Univ Sultan Moulay Slimane, Lab EMI, Beni Mellal, Morocco
[2] Hassan First Univ, Fac Sci & Tech, Settat, Morocco
[3] Mohammed First Univ, Fac Sci, Oujda, Morocco
关键词
anomaly detection; semantic web; knowledge graphs; machine learning; frauds and intrusions; prior knowledge; data thresholds; deep cause?s analysis; CONTEXT;
D O I
10.3991/ijoe.v19i03.30079
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
the last decades, many works have been done to enhance data performances in the computer field. Data performance consists to describe all improvements which can be added to data traffic. More precisely, we are talking about techniques allowing improving the evaluation of big data using machine learning. Data evaluation is composed of several variables such as security, quality of service, data synchronization, scalability, and data structuring. In this work, we complete our proceedings done to supervise the continuity of technological evolution in terms of big data and safety. In other words, we aim to add brick to our previous processes to take into consideration the enhancement of the analysis of the causes generating frauds and intrusions preventing data traffic. To achieve this end, we increase current machine learning techniques with prior knowledge based on data thresholds set by experts in the first place. We also aim to integrate knowledge facilitating the interpretation of the causes causing all kinds of anomalies in the second place. Finally, our process will be endowed with the requirements to improve the rate of detection of anomalies and reduce human involvement operation.
引用
收藏
页码:113 / 126
页数:14
相关论文
共 16 条
[1]   A Review of Current Machine Learning Techniques Used in Manufacturing Diagnosis [J].
Ademujimi, Toyosi Toriola ;
Brundage, Michael P. ;
Prabhu, Vittaldas V. .
ADVANCES IN PRODUCTION MANAGEMENT SYSTEMS: THE PATH TO INTELLIGENT, COLLABORATIVE AND SUSTAINABLE MANUFACTURING, 2017, 513 :407-415
[2]   Unsupervised real-time anomaly detection for streaming data [J].
Ahmad, Subutai ;
Lavin, Alexander ;
Purdy, Scott ;
Agha, Zuha .
NEUROCOMPUTING, 2017, 262 :134-147
[3]   The Semantic Web - A new form of Web content that is meaningful to computers will unleash a revolution of new possibilities [J].
Berners-Lee, T ;
Hendler, J ;
Lassila, O .
SCIENTIFIC AMERICAN, 2001, 284 (05) :34-+
[4]  
Camossi E., 2013, ARXIV
[5]   Context-Aware Anomaly Detection in Embedded Systems [J].
Ehsani-Besheli, Fatemeh ;
Zarandi, Hamid R. .
ADVANCES IN DEPENDABILITY ENGINEERING OF COMPLEX SYSTEMS, 2018, 582 :151-165
[6]   A Probabilistic, Mechanism-Indepedent Outlier Detection Method for Online Experimentation [J].
He, Yan ;
Chen, Miao .
2017 IEEE INTERNATIONAL CONFERENCE ON DATA SCIENCE AND ADVANCED ANALYTICS (DSAA), 2017, :640-647
[7]  
Huang H, 2015, PROC VLDB ENDOW, V9, P192
[8]   Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection Approach [J].
Jabez, J. ;
Muthukumar, B. .
INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONVERGENCE (ICCC 2015), 2015, 48 :338-346
[9]  
Lasbahani A., 2021, Journal of Physics: Conference Series, V1743, DOI 10.1088/1742-6596/1743/1/012024
[10]  
Paulheim Heiko, 2013, INT WORKSHOP LINKED