Mining malicious corruption of data with Hidden Markov models

被引:0
|
作者
Barbará, D [1 ]
Goel, R [1 ]
Jajodia, S [1 ]
机构
[1] George Mason Univ, Fairfax, VA 22030 USA
来源
RESEARCH DIRECTIONS IN DATA AND APPLICATIONS SECURITY | 2003年 / 128卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data mining algorithms have been applied to investigate a wide range of research issues recently. In this paper we describe an alternative technique of profiling databases via time series analysis to detect anomalous changes to a database. We view the history of modifications in the database as a set of time series sequences. We then examine the application of Hidden Markov models (HMMs)as a mining tool to capture the normal trend of a database's changes in transactions. Rather than examining each record independently, our technique accounts for the existence of relations among groups of records, and validates modifications to the sequence of transactions. The algorithm is adaptive to changes in behavior. Experiments with real data-sets, comparing various options for the initial HMM parameters, demonstrate that the distribution of the change in acceptance probabilities of anomalous values is significantly different from that of acceptance of transactions expected by the model.
引用
收藏
页码:175 / 189
页数:15
相关论文
共 50 条
  • [1] Application of hidden Markov models to biological data mining: A case study
    Yin, MM
    Wang, JTL
    DATA MINING AND KNOWLEDGE DISCOVERY: THEORY, TOOLS, AND TECHNOLOGY II, 2000, 4057 : 352 - 358
  • [2] Mining the web with active hidden Markov models
    Scheffer, T
    Decomain, C
    Wrobel, S
    2001 IEEE INTERNATIONAL CONFERENCE ON DATA MINING, PROCEEDINGS, 2001, : 645 - 646
  • [3] APPLYING HIDDEN MARKOV MODELS TO PROCESS MINING
    da Silva, Gil Aires
    Ferreira, Diogo R.
    SISTEMAS E TECHNOLOGIAS DE INFORMACAO: ACTAS DA 4A CONFERENCIA IBERICA DE SISTEMAS E TECNOLOGIAS DE LA INFORMACAO, 2009, : 207 - 210
  • [4] Temporal and spatial data mining with second-order hidden markov models
    Mari, JF
    Le Ber, F
    SOFT COMPUTING, 2006, 10 (05) : 406 - 414
  • [5] Temporal and spatial data mining with second-order hidden markov models
    J.-F. Mari
    F. Le Ber
    Soft Computing, 2006, 10 : 406 - 414
  • [6] Mining trajectory patterns using hidden Markov models
    Jeung, Hoyoung
    Shen, Heng Tao
    Zhou, Xiaofang
    DATA WAREHOUSING AND KNOWLEDGE DISCOVERY, PROCEEDINGS, 2007, 4654 : 470 - +
  • [7] Mining gene expression data using a novel approach based on hidden Markov models
    Ji, XL
    Li-Ling, J
    Sun, Z
    FEBS LETTERS, 2003, 542 (1-3) : 125 - 131
  • [8] Mining Process Heuristics From Designer Action Data via Hidden Markov Models
    McComb, Christopher
    Cagan, Jonathan
    Kotovsky, Kenneth
    JOURNAL OF MECHANICAL DESIGN, 2017, 139 (11)
  • [9] Idea: Automatic Localization of Malicious Behaviors in Android Malware with Hidden Markov Models
    Salem, Aleieldin
    Schmidt, Tabea
    Pretschner, Alexander
    ENGINEERING SECURE SOFTWARE AND SYSTEMS, ESSOS 2018, 2018, 10953 : 108 - 115
  • [10] Detecting Malicious Sessions Through Traffic Fingerprinting Using Hidden Markov Models
    Zhioua, Sami
    Ben Jabeur, Adnene
    Langar, Mahjoub
    Ilahi, Wael
    INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I, 2015, 152 : 623 - 631