We propose a hybrid approach to temporal anomaly detection in access data of users to databases — or more generally, any kind of subject-object co-occurrence data. We consider a high-dimensional setting that also requires fast computation at test time. Our methodology identifies anomalies based on a single stationary model, instead of requiring a full temporal one, which would be prohibitive in this setting. We learn a low-rank stationary model from the training data, and then fit a regression model for predicting the expected likelihood score of normal access patterns in the future. The disparity between the predicted likelihood score and the observed one is used to assess the “surprise” at test time. This approach enables calibration of t...
Detecting anomalies in time series data is important in a variety of fields, including system monito...
Abstract. This paper introduces the computer security domain of anomaly detection and formulates it ...
In this paper, we compare and assess the efficacy of a number of time-series instance feature repres...
International audienceData mining has become an important task for researchers in the past few years...
The mitigation of insider threats against databases is a challenging problem since insiders often ha...
Anomaly detection in database management systems (DBMSs) is difficult because of increasing number o...
This Master's Thesis focuses on the recent Cortical Learn-ing Algorithm (CLA), designed for temporal...
Anomaly detection has shown to be a valuable tool in a variety of application domains, e.g. detectin...
Early detection is a matter of growing importance in multiple domains as network security, health co...
Insider attacks aiming at stealing data are highly common, according to recent studies, and they are...
University of Minnesota M.S. thesis. May 2010. Major: Computer Science. Advisor: Prof.Vipin Kumar. 1...
We focus on automatic anomaly detection in SQL databases for security systems.\u3cbr/\u3eMany logs o...
International audienceCyber attacks are a significant risk for cloud service providers and to mitiga...
Anomaly detection is an important issue in data mining and analysis, with applications in almost eve...
Software architecture practice relies more and more on data-driven decision-making. Data-driven deci...
Detecting anomalies in time series data is important in a variety of fields, including system monito...
Abstract. This paper introduces the computer security domain of anomaly detection and formulates it ...
In this paper, we compare and assess the efficacy of a number of time-series instance feature repres...
International audienceData mining has become an important task for researchers in the past few years...
The mitigation of insider threats against databases is a challenging problem since insiders often ha...
Anomaly detection in database management systems (DBMSs) is difficult because of increasing number o...
This Master's Thesis focuses on the recent Cortical Learn-ing Algorithm (CLA), designed for temporal...
Anomaly detection has shown to be a valuable tool in a variety of application domains, e.g. detectin...
Early detection is a matter of growing importance in multiple domains as network security, health co...
Insider attacks aiming at stealing data are highly common, according to recent studies, and they are...
University of Minnesota M.S. thesis. May 2010. Major: Computer Science. Advisor: Prof.Vipin Kumar. 1...
We focus on automatic anomaly detection in SQL databases for security systems.\u3cbr/\u3eMany logs o...
International audienceCyber attacks are a significant risk for cloud service providers and to mitiga...
Anomaly detection is an important issue in data mining and analysis, with applications in almost eve...
Software architecture practice relies more and more on data-driven decision-making. Data-driven deci...
Detecting anomalies in time series data is important in a variety of fields, including system monito...
Abstract. This paper introduces the computer security domain of anomaly detection and formulates it ...
In this paper, we compare and assess the efficacy of a number of time-series instance feature repres...