Using pattern detection techniques and refactoring to improve the performance of ASMOV

Author(s):  
Bahareh Behkamal ◽  
Mahmoud Naghibzadeh ◽  
Reza Askari Moghadam
Sensors ◽  
2021 ◽  
Vol 21 (9) ◽  
pp. 3005
Author(s):  
A. N. M. Bazlur Rashid ◽  
Mohiuddin Ahmed ◽  
Al-Sakib Khan Pathan

While anomaly detection is very important in many domains, such as in cybersecurity, there are many rare anomalies or infrequent patterns in cybersecurity datasets. Detection of infrequent patterns is computationally expensive. Cybersecurity datasets consist of many features, mostly irrelevant, resulting in lower classification performance by machine learning algorithms. Hence, a feature selection (FS) approach, i.e., selecting relevant features only, is an essential preprocessing step in cybersecurity data analysis. Despite many FS approaches proposed in the literature, cooperative co-evolution (CC)-based FS approaches can be more suitable for cybersecurity data preprocessing considering the Big Data scenario. Accordingly, in this paper, we have applied our previously proposed CC-based FS with random feature grouping (CCFSRFG) to a benchmark cybersecurity dataset as the preprocessing step. The dataset with original features and the dataset with a reduced number of features were used for infrequent pattern detection. Experimental analysis was performed and evaluated using 10 unsupervised anomaly detection techniques. Therefore, the proposed infrequent pattern detection is termed Unsupervised Infrequent Pattern Detection (UIPD). Then, we compared the experimental results with and without FS in terms of true positive rate (TPR). Experimental analysis indicates that the highest rate of TPR improvement was by cluster-based local outlier factor (CBLOF) of the backdoor infrequent pattern detection, and it was 385.91% when using FS. Furthermore, the highest overall infrequent pattern detection TPR was improved by 61.47% for all infrequent patterns using clustering-based multivariate Gaussian outlier score (CMGOS) with FS.


Author(s):  
Veronica Gacitua-Decar ◽  
Claus Pahl

Context: Processes are central to the operation of many systems or organizations. Process-centric systems, ranging from enterprise workflow systems to open distributed service compositions, have significantly increased in number and complexity. Objective: Designers of process-centric systems can benefit from process abstractions (including patterns) capturing and allowing the reuse of designs for frequent operational problems. Existing process patterns detection techniques have efficiency problems and difficulties to identify partial and inexact pattern instances. Method: We propose a process pattern detection technique based on a family of subgraph matching algorithms. The algorithms implement surjective graph morphism detection and a mechanism to incorporate semantic similarity computation for types and attributes of process graph elements. Results: Efficiency is addressed using simplified data structures, reducing the search space and its exploration. Match accuracy and time-complexity are demonstrated in an experimental study. Conclusions: Using process patterns allows business and technical processes to be provided as sharable service resources. Patterns can help to manage processes as configurable resources where a pattern can define a family of concrete customizable processes.


1983 ◽  
Vol 44 (C7) ◽  
pp. C7-193-C7-208 ◽  
Author(s):  
F. Penent ◽  
C. Chardonnet ◽  
D. Delande ◽  
F. Biraben ◽  
J. C. Gay

Planta Medica ◽  
2010 ◽  
Vol 76 (12) ◽  
Author(s):  
S Ivanova ◽  
I Urakova ◽  
O Pozharitskaya ◽  
A Shikov ◽  
V Makarov

Author(s):  
Fulpagare Priya K. ◽  
Nitin N. Patil

Social Network is an emerging e-service for Content Sharing Sites (CSS). It is an emerging service which provides reliable communication. Some users over CSS affect user’s privacy on their personal contents, where some users keep on sending annoying comments and messages by taking advantage of the user’s inherent trust in their relationship network. Integration of multiple user’s privacy preferences is very difficult task, because privacy preferences may create conflict. The techniques to resolve conflicts are essentially required. Moreover, these methods need to consider how users would actually reach an agreement about a solution to the conflict in order to offer solutions acceptable by all of the concerned users. The first mechanism to resolve conflicts for multi-party privacy management in social media that is able to adapt to different situations by displaying the enterprises that users make to reach a result to the conflicts. Billions of items that are uploaded to social media are co-owned by multiple users. Only the user that uploads the item is allowed to set its privacy settings (i.e. who can access the item). This is a critical problem as users’ privacy preferences for co-owned items can conflict. Multi-party privacy management is therefore of crucial importance for users to appropriately reserve their privacy in social media.


Sign in / Sign up

Export Citation Format

Share Document