Abstract
According to the Cost-Sensitive Learning Method, two improved One-Class Anomaly Detection Models using Support Vector Data Description (SVDD) are put forward in this paper. Improved Algorithm is included in the Frequency-Based SVDD (F-SVDD) Model while Input data division method is used in the Write-Related SVDD (W-SVDD) Model. Experimental results show that both of the two new models have a low false positive rate compared with the traditional one. The true positives increased by 22% and 23% while the False Positives decreased by 58% and 94%, which reaches nearly 100% and 0% respectively. And hence, adjusting some parameters can make the false positive rate better. So using Cost-Sensitive method in One-Class Problems may be a future orientation in Trusted Computing area.
Support by the National Natural Science Foundation of China Under Grant No.60603029; the Natural Science Foundation of Jiangsu Province of China Under Grant No.BK2005009.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Forrest, S., Hofmeyr, S.A.: Computer Immunology [J]. Communications of the ACM, 88–96 (1997)
Hofmeyr, S., Forrest, S.: Principles of a computer immune system. In: Proceeding of New Security Paradigms Workshop, pp. 75–82 (1997)
Warrender, C., Forrest, S., Pearlmutter, B.: Detecting Intrusion Using System Calls: Alternative Data Models, pp. 114–117 (2002), http://www.cs.unm.edu/~forrest/publications/oakland-with-cite.pdf
Forrest, S., Hofmeyr, S.A., Longstaff, T.A.: A sense of self for Unix Processes, pp. 120–128. IEEE Computer Society Press, Los Alamitos (1996)
David, M.J.T.: One-class Classification. Ph.D. Dissertation (1999)
Manevitz, L.M., Yousef, M.: One-Class SVMs for Document Classification. Journal of Machine Learning Research, 139–154 (2001)
Chen, Y.Q., Zhou, X., et al.: One-class SVM for learning in image retrieval [A]. In: IEEE Intl Conf. on Image Proc. (ICIP 2001), Thessaloniki, Greece (2001)
Kohonen, T.: Self-Organizing Map. pp. 117–119. Springer, Berlin (1995)
Bishop, M.: A standard audit trail format. In: Proceeding of the 18th National Information Systems Security Conference, Baltimore, pp. 136–l45 (l995)
MIT lpr DataSet (2000), http://www.cs.unm.edu/immsec/data/
Lee, W., Stolfo, S.J., Mok, K.W.A.: Data mining framework for building intrusion detection models. In: Proc the 1999 IEEE Symposium on Security and Privacy, Berkely, California, pp. 120–132 (1999)
Haykin, S.: Neural networks-A comprehensive foundation, 2nd edn. Tsinghua University Press, Beijing (2001)
Hattor, I.K., Takahashi, M.: A new nearest-neighbor rule in the pattern classification problem. Pattern Recognition, 425–432 (1999)
Kim, J., Bentley, P.: The Artificial Immune Model for Network Intrusion Detection. In: 7th European Conference on Intelligent Techniques and Soft Computing (EUFIT 1999), Aachen, Germany (1999)
Pan, Z.S., Luo, J.: An Immune Detector Algorithm Based on Support Vector Data Description [B]. Journal of Harbin University of Engineering (2006)
Rtsch, G., Schlkopf, B., Mika, S., Müller, K.R.: SVM and boosting: One class. Berlin, vol. 6 (2000)
Colin, C., Kristin, P., Bennett, A.: Linear Programming Approach to Novelty Detection[A]. Advances in Neural Information Processing System 13 (2001)
Zhang, X.F., Sun, Y.F., Zhao, Q.S.: Intrusion Detection Based On Sub-Set Of System Calls. ACTA Electronica Sinica 32 (2004)
Warrender, C., Forrest, S., Pearlmutter, B.: Detecting Intrusions Using System Calls, Alternative Data Models, pp. 133–145. IEEE Computer Society, Los Alamitos (2002)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Luo, J., Ding, L., Pan, Z., Ni, G., Hu, G. (2007). Research on Cost-Sensitive Learning in One-Class Anomaly Detection Algorithms. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds) Autonomic and Trusted Computing. ATC 2007. Lecture Notes in Computer Science, vol 4610. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73547-2_27
Download citation
DOI: https://doi.org/10.1007/978-3-540-73547-2_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73546-5
Online ISBN: 978-3-540-73547-2
eBook Packages: Computer ScienceComputer Science (R0)