Identification of anomalous data records

Data processing: database and file management or data structures – Database design – Data structure types

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C707S793000, C706S059000

Reexamination Certificate

active

07668843

ABSTRACT:
Identifying anomalies or outliers in a set of data records employs a distance or similarity measure between features of record pairs that depends upon the frequencies of the feature values in the set. Feature distances may be combined for a total distance between record pairs. An outlier is indicated for a certain score that may be based upon the pairwise distances. Outliers may be employed to detect intrusions in computer networks.

REFERENCES:
patent: 7206674 (2007-04-01), Statler et al.
patent: 2006/0047617 (2006-03-01), Bacioiu et al.
patent: 2006/0064438 (2006-03-01), Aggarwal
patent: 2006/0251325 (2006-11-01), Florin et al.
Aggarwal, C. C., et al., “Outlier Detection for High Dimensional Data”,Proceedings of the 2001 ACM SIGMOD International Conference on Management of Data, (2001), 37-46.
Angiulli, F., et al., “Fast Outlier Detection in High Dimensional Spaces”,Proceedings of the 6th European Conference on Principles of Data Mining and Knowledge Discovery(PKDD 2002), (2002), 15-26.
Arning, A., et al., “A Linear Method for Deviation Detection in Large Databases”,Knowledge Discovery and Data Mining, (1996), 164-169.
Arshad, M. H., et al., “Identifying Outliers via Clustering for Anomaly Detection”,Technical Report CS-2003-19, Department of Computer Sciences, Florida Institute of Technology, Melbourne, FL, Retrieved from the Internet: <https://www.cs.fit.edu/Projectsitech—reports/cs-2003-19.pdf>, (2003), 1-8.
Barbará, D., et al, “Bootstrapping a Data Mining Intrusion Detection System”,Proceedings of the ACM Symposium on Applied Computing(SAC 2003), (2003), 421-425.
Barbará, D., et al., “COOLCAT: An Entropy-Based Algorithm for Categorical Clustering”,Proceedings of the 11th International Conference on Information and Knowledge Management(CIKM '02), (2002), 582-589.
Barbará, D., et al., “Detecting Novel Network Intrusions Using Bayes Estimators”,Proceedings of the SIAM International Conference on Data Mining(SIAM 2001), 2001, 1-17.
Bay, S. D., et al., “Mining Distance-Based Outliers in Near Linear Time With Randomization and a Simple Pruning Rule”,Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining(SIGKDD '03), (2003), 29-38.
Breunig, M. M., et al., “LOF: Identifying Density-Based Local Outliers”,Proceedings of the ACM SIGMOD International Conference on Management of Data(MOD 2000), (2000),93-104.
Breunig, M. M., et al., “OPTICS-OF: Identifying Local Outliers”,Proceedings of The Third European Conference on Principles of Data Mining and Knowledge Discovery(PKDD '99), (1999), 262-270.
Chan, P. K., et al., “A Machine Learning Approach to Anomaly Detection”,Technical Report CS-2003-06, Department of Computer Sciences, Florida Institute of Technology, Melbourne, FL, (Mar. 29, 2003), 13 pgs.
Eskin, E., et al., “A Geometric Framework for Unsupervised Anomaly Detection: Intrusions in Unlabeled Data”,Applications of Data Mining in Computer Security, (2002), 20 pgs.
Ghosh, A. K., “Learning Program Behavior Profiles for Intrustion Detection”,Proceedings of the 1st USENIX Workshop on Intrusion Detection and Network Monitoring, (Santa Clara, CA, Apr. 9-12, 1999), (1999), 51-62.
Goodall, D. W., “A New Similarity Index Based on Probability”,Biometrics, (Dec. 1966), 882-907.
Hawkins, S., et al., “Outlier Detection Using Replicator Neural Networks”,Proceedings of the 4th International Conference on Data Warehousing and Knowledge Discovery, (2002), 170-180.
Jin, W., et al., “Mining Top-n Local Outliers in Large Databases”,Proceedings of The 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining(KDD '01), (2001), 293-298.
Knorr, E. M., et al., “Algorithms for Mining Distance-Based Outliers in Large Datasets”,Proceedings, 24th International Conference Very Large Data Bases(VLDB 1998), (1998), 392-403.
Knorr, E. M., et al., “Distance-Based Outliers: Algorithms and Applications”,The VLDB Journal, 8(3-4), (2000), 237-253.
Knorr, E. M., et al., “Finding Intensional Knowledge of Distance-Based Outliers”,Proceedings of the 25th International Conference of Very Large Databases(VLDB 1999), (1999), 211-222.
Kruegel, C., et al., “Bayesian Event Classification for Intrusion Detection”,Proceedings of the 19th Annual Computer Security Applications Conference(ACSAC 2003), (2003), 10 pgs.
Marchette, D., “A Statistical Method for Profiling Network Traffic”,Proceedings of the Workshop on Intrusion Detection and Networking Monitoring, (1999), 119-128.
McCallum, A., et al., “Efficient Clustering of High-Dimensional Data Sets With Application to Reference Matching”,Proceedings of the Sixth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining(KDD 2000), (2000), 169-178.
Mukkamala, S., et al., “Intrusion Detection Systems Using Adaptive Regression Splines”,Proceedings of the 6th International Conference on Enterprise Systems(ICEIS '04), vol. 3, (2004), 26-33.
Portnoy, L., et al., “Intrusion Detection With Unlabeled Data Using Clustering”,Proceedings of ACM CSS Workshop on Data Mining Applied to Security(DMSA 2001), (2001), 14 pgs.
Ramaswamy, S., et al., “Efficient Algorithms for Mining Outliers From Large Data Sets”,Proceedings of the ACM SIGMOD International Conference on Management of Data(SIGMOD 2000), (Dallas, TX),(2000), 427-438.
Ryan, J., et al., “Intrusion Detection With Neural Networks”,Proceedings of the Conference on Advances in Neural Information Processing Systems, 10, (1997), 943-949.
Saltenis, V., “Outlier Detection Based on the Distribution of Distances Between Data Points”,Informatica, 15(3), (Abstract Only). [online]. Retrieved from the Internet: <http://vtex.lt/informatica/htm/INFO558.htm>, (2004), 1 pg.
Schölkopf, B., et al., “Estimating the Support of a High-Dimensional Distribution”,Technical Report MSR-TR-99-87, Microsoft Research, Microsoft Corporation, (Redmond, WA 98052), (Nov. 27, 1999), 1-27.
Sebyala, A. A., et al., “Active Platform Security Through Intrusion Detection Using Naive Bayesian Network for Anomaly Detection”,Proceedings of the London Communications Symposium 2002, (2002), 4 pgs.
Smith, R., “Clustering Approaches for Anomaly Based Intrusion Detection”,Proceedings of Walter Lincoln Hawkins '32, Graduate Research Conference, (2002), 421-425.
Sykacek, P., “Equivalent Error Bars for Neural Network Classifiers Trained By Bayesian Inference”,Proceedings of the European Symposium on Artificial Neural Networks(Bruges), (1997), 7 pgs.
Tang, J., et al., “Enhancing Effectiveness of Outlier Detections for Low Density Patterns”,Proceedings of the 6th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining(PAKDD 2002), (2002), 535-548.
Valdes, A., et al., “Adaptive, Model-Based Monitoring for Cyber Attack Detection”, Lecture Notices in Computer Science, vol. 1907/2000,Proceedings Of the Third International Workshop on Recent Advances in Intrusion Detection(RAID 2000), (2000), 80-92.
Vinueza, A., et al., “Unsupervised Outlier Detection and Semi-Supervised Learning”,Technical Report CU-CS-976-04, University of Colorado at Boulder, CO, Retrieved from the Internet: <http://www.cs.colorado.edu/˜grudic/publications/CU-CS-976-04.pdf>, (May 2004), 7 pgs.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Identification of anomalous data records does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Identification of anomalous data records, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Identification of anomalous data records will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4207864

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.