1 In-Network PCA and Anomaly Detection Ling Huang* XuanLong Nguyen* Minos Garofalakis § Michael Jordan* Anthony Joseph* Nina Taft § *UC Berkeley § Intel.

Slides:



Advertisements
Similar presentations
A KTEC Center of Excellence 1 Pattern Analysis using Convex Optimization: Part 2 of Chapter 7 Discussion Presenter: Brian Quanz.
Advertisements

Sensitivity of PCA for Traffic Anomaly Detection Evaluating the robustness of current best practices Haakon Ringberg 1, Augustin Soule 2, Jennifer Rexford.
1 Communication-Efficient Online Detection of Network-Wide Anomalies Ling Huang* XuanLong Nguyen* Minos Garofalakis § Joe Hellerstein* Michael Jordan*
Bayesian Robust Principal Component Analysis Presenter: Raghu Ranganathan ECE / CMR Tennessee Technological University January 21, 2011 Reading Group (Xinghao.
“Real-time” Transient Detection Algorithms Dr. Kang Hyeun Ji, Thomas Herring MIT.
Kuang-Hao Liu et al Presented by Xin Che 11/18/09.
Probabilistic Aggregation in Distributed Networks Ling Huang, Ben Zhao, Anthony Joseph and John Kubiatowicz {hling, ravenben, adj,
3D Geometry for Computer Graphics
Traffic Engineering With Traditional IP Routing Protocols
Computer Graphics Recitation 6. 2 Last week - eigendecomposition A We want to learn how the transformation A works:
1 A New Paradigm For Distributed Monitoring Ling Huang, Minos Garofalakis, Nina Taft and Anthony Joseph {minos.garofalakis,
3D Geometry for Computer Graphics
Communication-Efficient Distributed Monitoring of Thresholded Counts Ram Keralapura, UC-Davis Graham Cormode, Bell Labs Jai Ramamirtham, Bell Labs.
Software Quality Control Methods. Introduction Quality control methods have received a world wide surge of interest within the past couple of decades.
Multi-Scale Analysis for Network Traffic Prediction and Anomaly Detection Ling Huang Joint work with Anthony Joseph and Nina Taft January, 2005.
A Concept of Environmental Forecasting and Variational Organization of Modeling Technology Vladimir Penenko Institute of Computational Mathematics and.
1 Toward Sophisticated Detection With Distributed Triggers Ling Huang* Minos Garofalakis § Joe Hellerstein* Anthony Joseph* Nina Taft § *UC Berkeley §
1 Distributed Online Simultaneous Fault Detection for Multiple Sensors Ram Rajagopal, Xuanlong Nguyen, Sinem Ergen, Pravin Varaiya EECS, University of.
Probabilistic Data Aggregation Ling Huang, Ben Zhao, Anthony Joseph Sahara Retreat January, 2004.
Cumulative Violation For any window size  t  Communication-Efficient Tracking for Distributed Cumulative Triggers Ling Huang* Minos Garofalakis.
Measurement and Monitoring Nick Feamster Georgia Tech.
EL 933 Final Project Presentation Combining Filtering and Statistical Methods for Anomaly Detection Augustin Soule Kav´e SalamatianNina Taft.
1 D-Trigger: A General Framework for Efficient Online Detection Ling Huang University of California, Berkeley.
Network Anomography Yin Zhang, Zihui Ge, Albert Greenberg, Matthew Roughan Internet Measurement Conference 2005 Berkeley, CA, USA Presented by Huizhong.
Energy-efficient Self-adapting Online Linear Forecasting for Wireless Sensor Network Applications Jai-Jin Lim and Kang G. Shin Real-Time Computing Laboratory,
Lecture II-2: Probability Review
CS 485/685 Computer Vision Face Recognition Using Principal Components Analysis (PCA) M. Turk, A. Pentland, "Eigenfaces for Recognition", Journal of Cognitive.
Online Learning Algorithms
Adaptive Signal Processing
1 Activity and Motion Detection in Videos Longin Jan Latecki and Roland Miezianko, Temple University Dragoljub Pokrajac, Delaware State University Dover,
SVD(Singular Value Decomposition) and Its Applications
Summarized by Soo-Jin Kim
Presented By Wanchen Lu 2/25/2013
Introduction to Adaptive Digital Filters Algorithms
Efficient Model Selection for Support Vector Machines
Principles of Pattern Recognition
Xin He, Yashwant Malaiya, Anura P. Jayasumana Kenneth P
Scalable and Efficient Data Streaming Algorithms for Detecting Common Content in Internet Traffic Minho Sung Networking & Telecommunications Group College.
Time Series Data Analysis - I Yaji Sripada. Dept. of Computing Science, University of Aberdeen2 In this lecture you learn What are Time Series? How to.
Yaomin Jin Design of Experiments Morris Method.
Chapter 21 R(x) Algorithm a) Anomaly Detection b) Matched Filter.
Basics of Neural Networks Neural Network Topologies.
Network Anomography Yin Zhang – University of Texas at Austin Zihui Ge and Albert Greenberg – AT&T Labs Matthew Roughan – University of Adelaide IMC 2005.
Scenario: Internet Attack Eunice Huang. What is DDoS? A denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to.
1 Distributed Detection of Network-Wide Traffic Anomalies Ling Huang* XuanLong Nguyen* Minos Garofalakis § Joe Hellerstein* Michael Jordan* Anthony Joseph*
1 Pattern Recognition: Statistical and Neural Lonnie C. Ludeman Lecture 24 Nov 2, 2005 Nanjing University of Science & Technology.
A new Ad Hoc Positioning System 컴퓨터 공학과 오영준.
A Passive Approach to Sensor Network Localization Rahul Biswas and Sebastian Thrun International Conference on Intelligent Robots and Systems 2004 Presented.
1 D-Trigger: A General Framework for Efficient Online Detection Ling Huang* XuanLong Nguyen* Minos Garofalakis ◊ Joe Hellerstein* Michael Jordan* Anthony.
Monte-Carlo method for Two-Stage SLP Lecture 5 Leonidas Sakalauskas Institute of Mathematics and Informatics Vilnius, Lithuania EURO Working Group on Continuous.
Unsupervised Learning Motivation: Given a set of training examples with no teacher or critic, why do we learn? Feature extraction Data compression Signal.
An Introduction To The Kalman Filter By, Santhosh Kumar.
Chapter 13 (Prototype Methods and Nearest-Neighbors )
Robust Principal Components Analysis IT530 Lecture Notes.
EE515/IS523: Security 101: Think Like an Adversary Evading Anomarly Detection through Variance Injection Attacks on PCA Benjamin I.P. Rubinstein, Blaine.
Spectrum Sensing In Cognitive Radio Networks
METHOD OF STEEPEST DESCENT ELE Adaptive Signal Processing1 Week 5.
Sensitivity of PCA for Traffic Anomaly Detection Evaluating the robustness of current best practices Haakon Ringberg 1, Augustin Soule 2, Jennifer Rexford.
Network Anomography Yin Zhang Joint work with Zihui Ge, Albert Greenberg, Matthew Roughan Internet Measurement.
3D Geometry for Computer Graphics Class 3. 2 Last week - eigendecomposition A We want to learn how the transformation A works:
Optimization-based Cross-Layer Design in Networked Control Systems Jia Bai, Emeka P. Eyisi Yuan Xue and Xenofon D. Koutsoukos.
Communication-Efficient Online Detection of Network-Wide Anomalies Ling Huang* XuanLong Nguyen* Minos Garofalakis § Joe Hellerstein* Michael Jordan* Anthony.
SketchVisor: Robust Network Measurement for Software Packet Processing
Experience Report: System Log Analysis for Anomaly Detection
CH 5: Multivariate Methods
Blind Signal Separation using Principal Components Analysis
METHOD OF STEEPEST DESCENT
Generally Discriminant Analysis
Recursively Adapted Radial Basis Function Networks and its Relationship to Resource Allocating Networks and Online Kernel Learning Weifeng Liu, Puskal.
Jia-Bin Huang Virginia Tech
Presentation transcript:

1 In-Network PCA and Anomaly Detection Ling Huang* XuanLong Nguyen* Minos Garofalakis § Michael Jordan* Anthony Joseph* Nina Taft § *UC Berkeley § Intel Research {hling, xuanlong, jordan, {minos.garofalakis,

2 Detection of Network-wide Anomalies A volume anomaly is a sudden change in an Origin-Destination flow (i.e., point to point traffic) Given only link traffic measurements, efficiently diagnose the volume anomalies H1H1 H2H2 The backbone network Regional network 1 Regional network 2

3 An Illustration Observed network link flow = aggregate of application-level flows Anomalies in (unobserved) application-level flow Finding anomalies in high-dimensional, noisy data is difficult !

4 The PCA Method An approach to separate normal from anomalous traffic Normal Subspace : space spanned by the top k principal components Anomalous Subspace : space spanned by the remaining principal components Then, decompose traffic on all links by projecting onto and to obtain: Traffic vector of all links at a particular point in time Normal traffic vector Residual traffic vector

5 A Geometric Illustration In general, anomalous traffic results in a large value of, where

6 Detection Illustration Value of over time at anomalous time points clearly stand out over time (residual part) Value of

7 n m Operation center The Centralized Algorithm The Network Eigen values Eigen vectors Data matrix Y (m x n) n links m time points (data) Detection procedure Raise a flag if Periodically (e.g. once a week)

8 Scalability Issues of Centralized Approach As the number of monitoring devices grow (up to hundreds or thousands network data features)  central processing site overloaded  certain networks do not overprovision inter-site connectivity When anomalies occur on smaller time scales (down to second or sub-second scales)  “periodic push” has to be applied on second or sub-second scales  the volume of data transmitted through network would explode

9 Our Distributed Approach A communication-efficient framework that  detects anomalies at desired accuracy level  minimizes data communication cost A distributed protocol for data processing  local monitors decide when to update data to coordinator  coordinator makes global decision and feedback to monitors An algorithmic frame guide the tradeoff  simple algorithm for determining filtering parameters given desired detection accuracy  stochastic matrix perturbation theory quantify how a perturbed data matrix impacts its eigen structures how perturbed eigen structures impacts the detection accuracy

10 Our In-Network Detection Framework Anomaly User inputs Original monitored time series Processed time series Distr. Monitors Coordinator

11 The Protocol At Monitors Each monitor updates information to coordinator if its incoming signal where (filtering slacks) are adaptively computed by the coordinator can be based on any prediction model built by on its data at an update time  e.g., the average of last 5 signal values observed locally at

12 The coordinator makes a new row where The Protocol At The Coordinator If any element in is updated  Update  Compute new Perform detection using

13 The Tradeoff The bigger the, the less communication, but the more the detection error Need an algorithm to related to detection accuracy Difference? Eigen Vectors Eigen Values Raw data y in blue, data available for detection in red

14 Parameter Design and Error Control (I) Given upper bound of false alarm , determine the monitor slacks  ’s Perturbation analysis: from deviation of false alarm to monitor slacks

15 Let and are eigenvalues of the covariance matrices and Define the perturbation matrix Define the eigen error From matrix perturbation theory, we have So the key point is to estimate in terms of slaks  ’s Parameter Design and Error Control (II)

16 Let and Standard assumptions on the filtering error matrix W: Eigen Error   Monitor Slacks  ’s (I)

17 Eigen-Error   Monitor Slacks  ’s (II) Where:, n is number of monitors and m is the number of data points.

18 Detection Error   Eigen-Error  (I) Basic idea: study how eigen error impacts detection error  With full data, false alarm rate is  With approximate data, we only have perturbed version  Given eigen error, we can compute the false alarm rate (though not in closed-form solution) Inverse dependency: given desired false alarm rate, we can determine tolerable eigen error by fast binary search

19 Detection Error   Eigen-Error  (I) Consider normalized random variable For approximate data, we only obtain Let denote an upper bound on The deviation of false alarm rate can be approximate as The upper bound of false alarm rate is

20 Evaluation Given a tolerable deviation of false alarm rate, we can determine system parameters Using system parameters, we can evaluate the actual detection accuracy using simulation Experiment setup  Abilene backbone network data  Traffic matrices of size 1008 X 41  Set uniform slack for all monitors

21 Results Monitor slacks, communication cost and detection error

22 Results (II)