Mining malicious corruption of data with Hidden Markov models

被引:0
|
作者
Barbará, D [1 ]
Goel, R [1 ]
Jajodia, S [1 ]
机构
[1] George Mason Univ, Fairfax, VA 22030 USA
来源
RESEARCH DIRECTIONS IN DATA AND APPLICATIONS SECURITY | 2003年 / 128卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data mining algorithms have been applied to investigate a wide range of research issues recently. In this paper we describe an alternative technique of profiling databases via time series analysis to detect anomalous changes to a database. We view the history of modifications in the database as a set of time series sequences. We then examine the application of Hidden Markov models (HMMs)as a mining tool to capture the normal trend of a database's changes in transactions. Rather than examining each record independently, our technique accounts for the existence of relations among groups of records, and validates modifications to the sequence of transactions. The algorithm is adaptive to changes in behavior. Experiments with real data-sets, comparing various options for the initial HMM parameters, demonstrate that the distribution of the change in acceptance probabilities of anomalous values is significantly different from that of acceptance of transactions expected by the model.
引用
收藏
页码:175 / 189
页数:15
相关论文
共 50 条
  • [31] Analysis of default data using hidden Markov models
    Giampieri, G
    Davis, M
    Crowder, M
    QUANTITATIVE FINANCE, 2005, 5 (01) : 27 - 34
  • [32] Mining Bacillus subtilis chromosome heterogeneities using hidden Markov models
    Nicolas, P
    Bize, L
    Muri, F
    Hoebeke, M
    Rodolphe, F
    Ehrlich, SD
    Prum, B
    Bessières, P
    NUCLEIC ACIDS RESEARCH, 2002, 30 (06) : 1418 - 1426
  • [33] Sports Video Mining via Multichannel Segmental Hidden Markov Models
    Ding, Yi
    Fan, Guoliang
    IEEE TRANSACTIONS ON MULTIMEDIA, 2009, 11 (07) : 1301 - 1309
  • [34] Mining free-structured information based on hidden Markov models
    Tso, Brandt
    Chang, Paul Y.
    EXPERT SYSTEMS WITH APPLICATIONS, 2007, 32 (01) : 97 - 102
  • [35] Hidden Markov models
    Eddy, SR
    CURRENT OPINION IN STRUCTURAL BIOLOGY, 1996, 6 (03) : 361 - 365
  • [36] Secure computation of hidden Markov models and secure floating-point arithmetic in the malicious model
    Aliasgari, Mehrdad
    Blanton, Marina
    Bayatbabolghani, Fattaneh
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2017, 16 (06) : 577 - 601
  • [37] Secure computation of hidden Markov models and secure floating-point arithmetic in the malicious model
    Mehrdad Aliasgari
    Marina Blanton
    Fattaneh Bayatbabolghani
    International Journal of Information Security, 2017, 16 : 577 - 601
  • [38] Feature Selection for Hidden Markov Models and Hidden Semi-Markov Models
    Adams, Stephen
    Beling, Peter A.
    Cogill, Randy
    IEEE ACCESS, 2016, 4 : 1642 - 1657
  • [39] A Weekly Load Data Mining Approach Based on Hidden Markov Model
    Lu, Shixiang
    Lin, Guoying
    Liu, Hanlin
    Ye, Chengjin
    Que, Huakun
    Ding, Yi
    IEEE ACCESS, 2019, 7 : 34609 - 34619
  • [40] Markov models - training and evaluation of hidden Markov models
    Grewal, Jasleen K.
    Krzywinski, Martin
    Altman, Naomi
    NATURE METHODS, 2020, 17 (02) : 121 - 122