Novelty Detection Using Elliptical Fuzzy Clustering in a Reproducing Kernel Hilbert Space

被引:1
作者
Kazachuk, Maria [1 ]
Petrovskiy, Mikhail [1 ]
Mashechkin, Igor [1 ]
Gorohov, Oleg [1 ]
机构
[1] Lomonosov Moscow State Univ, Dept Comp Sci, Moscow 119899, Russia
来源
INTELLIGENT DATA ENGINEERING AND AUTOMATED LEARNING (IDEAL 2018), PT II | 2018年 / 11315卷
关键词
Outlier and novelty detection; Kernel methods; Fuzzy clustering; Mahalanobis distance; Keystroke dynamics; Online extremism discovering;
D O I
10.1007/978-3-030-03496-2_25
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Nowadays novelty detection methods based on one-class classification are widely used for many important applications associated with computer and information security. In these areas, there is a need to detect anomalies in complex high-dimensional data. An effective approach for analyzing such data uses kernels that map the input feature space into a reproducing kernel Hilbert space (RKHS) for further outlier detection. The most popular methods of this type are support vector clustering (SVC) and kernel principle component analysis (KPCA). However, they have some drawbacks related to the shape and the position of contours they build in the RKHS. To overcome the disadvantages a new algorithm based on fuzzy clustering with Mahalanobis distance in the RKHS is proposed in this paper. Unlike SVC and KPCA it simultaneously builds elliptic contours and finds optimal center in the RKHS. The proposed method outperforms SVC and KPCA in such important security related problems as user authentication based on keystroke dynamics and detecting online extremist information on web forums.
引用
收藏
页码:221 / 232
页数:12
相关论文
共 10 条
[1]   Support vector clustering [J].
Ben-Hur, A ;
Horn, D ;
Siegelmann, HT ;
Vapnik, V .
JOURNAL OF MACHINE LEARNING RESEARCH, 2002, 2 (02) :125-137
[2]   Kernel PCA for novelty detection [J].
Hoffmann, Heiko .
PATTERN RECOGNITION, 2007, 40 (03) :863-874
[3]   One-Class Models for Continuous Authentication Based on Keystroke Dynamics [J].
Kazachuk, Maria ;
Kovalchuk, Alexander ;
Mashechkin, Igor ;
Orpanen, Igor ;
Petrovskiy, Mikhail ;
Popov, Ivan ;
Zakliakov, Roman .
INTELLIGENT DATA ENGINEERING AND AUTOMATED LEARNING - IDEAL 2016, 2016, 9937 :416-425
[4]  
Monaco J. V., 2012, 2012 European Intelligence and Security Informatics Conference (EISIC), P210, DOI 10.1109/EISIC.2012.58
[5]   The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature [J].
Ngai, E. W. T. ;
Hu, Yong ;
Wong, Y. H. ;
Chen, Yijun ;
Sun, Xin .
DECISION SUPPORT SYSTEMS, 2011, 50 (03) :559-569
[6]  
Petrovskiy Mikhail, 2017, Mining Intelligence and Knowledge Exploration. 5th International Conference, MIKE 2017. Proceedings: LNAI 10682, P240, DOI 10.1007/978-3-319-71928-3_24
[7]  
Petrovskiy M, 2003, LECT NOTES COMPUT SC, V2877, P189
[8]  
Schölkopf B, 2000, ADV NEUR IN, V12, P582
[9]   A Keystroke Biometric System for Long-Text input [J].
Tappert, Charles C. ;
Cha, Sung-Hyuk ;
Villani, Mary ;
Zack, Robert S. .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2010, 4 (01) :32-60
[10]   Dark Web Forums Portal: Searching and Analyzing Jihadist Forums [J].
Zhang, Yulei ;
Zeng, Shuo ;
Fan, Li ;
Dang, Yan ;
Larson, Catherine A. ;
Chen, Hsinchun .
ISI: 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2009, :71-76