Mining malicious corruption of data with Hidden Markov models

被引:0
|
作者
Barbará, D [1 ]
Goel, R [1 ]
Jajodia, S [1 ]
机构
[1] George Mason Univ, Fairfax, VA 22030 USA
来源
RESEARCH DIRECTIONS IN DATA AND APPLICATIONS SECURITY | 2003年 / 128卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data mining algorithms have been applied to investigate a wide range of research issues recently. In this paper we describe an alternative technique of profiling databases via time series analysis to detect anomalous changes to a database. We view the history of modifications in the database as a set of time series sequences. We then examine the application of Hidden Markov models (HMMs)as a mining tool to capture the normal trend of a database's changes in transactions. Rather than examining each record independently, our technique accounts for the existence of relations among groups of records, and validates modifications to the sequence of transactions. The algorithm is adaptive to changes in behavior. Experiments with real data-sets, comparing various options for the initial HMM parameters, demonstrate that the distribution of the change in acceptance probabilities of anomalous values is significantly different from that of acceptance of transactions expected by the model.
引用
收藏
页码:175 / 189
页数:15
相关论文
共 50 条
  • [21] Facial event mining using coupled hidden Markov models
    Ma, LM
    Zhou, Q
    Celenk, M
    Chelberg, D
    ICIP: 2004 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1- 5, 2004, : 1405 - 1408
  • [22] Facial event mining using active shape models and hidden Markov models
    Ma, LM
    Zhou, Q
    Chelberg, D
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VI, PROCEEDINGS: IMAGE, ACOUSTIC, SIGNAL PROCESSING AND OPTICAL SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 65 - 70
  • [23] Malicious attack detection based on continuous Hidden Markov Models in Wireless sensor networks
    Moundounga, Anselme Russel Affane
    Satori, Hassan
    Boutazart, Youssef
    Abderrahim, Ezzine
    MICROPROCESSORS AND MICROSYSTEMS, 2023, 101
  • [24] Mixed Hidden Markov Models for Longitudinal Data: An Overview
    Maruotti, Antonello
    INTERNATIONAL STATISTICAL REVIEW, 2011, 79 (03) : 427 - 454
  • [25] Hierarchical Hidden Markov Models for Response Time Data
    Kunkel D.
    Yan Z.
    Craigmile P.F.
    Peruggia M.
    Van Zandt T.
    Computational Brain & Behavior, 2021, 4 (1) : 70 - 86
  • [26] Hidden Markov Models For Two-Dimensional Data
    Bobulski, Janusz
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMPUTER RECOGNITION SYSTEMS CORES 2013, 2013, 226 : 141 - 149
  • [27] Analysis of nanopore data using hidden Markov models
    Schreiber, Jacob
    Karplus, Kevin
    BIOINFORMATICS, 2015, 31 (12) : 1897 - 1903
  • [28] HIDDEN MARKOV MODELS FOR ALCOHOLISM TREATMENT TRIAL DATA
    Shirley, Kenneth E.
    Small, Dylan S.
    Lynch, Kevin G.
    Maisto, Stephen A.
    Oslin, David W.
    ANNALS OF APPLIED STATISTICS, 2010, 4 (01): : 366 - 395
  • [29] Hidden Markov Models for coding story recall data
    Durbin, MA
    Earwood, J
    Golden, RM
    PROCEEDINGS OF THE TWENTY-SECOND ANNUAL CONFERENCE OF THE COGNITIVE SCIENCE SOCIETY, 2000, : 113 - 118
  • [30] Hidden Markov models for the analysis and classification of ultrasound data
    Moldenhauer, J
    Beth, T
    Mende, U
    CARS 2004: COMPUTER ASSISTED RADIOLOGY AND SURGERY, PROCEEDINGS, 2004, 1268 : 231 - 236