CMU July 29, 2006 Pittsburgh, PA, USA Machine Learning Algorithms for Surveillance and Event Detection Denver Dash – Intel, Corp. Terran Lane – University.

Slides:



Advertisements
Similar presentations
Applications of one-class classification
Advertisements

Loss-Sensitive Decision Rules for Intrusion Detection and Response Linda Zhao Statistics Department University of Pennsylvania Joint work with I. Lee,
1 VLDB 2006, Seoul Mapping a Moving Landscape by Mining Mountains of Logs Automated Generation of a Dependency Model for HUG’s Clinical System Mirko Steinle,
Sensor-Based Abnormal Human-Activity Detection Authors: Jie Yin, Qiang Yang, and Jeffrey Junfeng Pan Presenter: Raghu Rangan.
TM Breakout Sessions Interactive and discussion-oriented Six major topic areas Sign up sheets Moderator designated for each session Recorder needed Discussion.
Automated Anomaly Detection, Data Validation and Correction for Environmental Sensors using Statistical Machine Learning Techniques
What is Statistical Modeling
Bayesian Biosurveillance Gregory F. Cooper Center for Biomedical Informatics University of Pittsburgh The research described in this.
Project Mimic: Simulation for Syndromic Surveillance Thomas Lotze Applied Mathematics and Scientific Computation University of Maryland Galit Shmueli and.
Avar Monitoring the blogosphere for emerging, health related events, so Health Officials don‘t have to Team Mentor: Avaré Stewart.
Anomaly Detection in Data Docent Xiao-Zhi Gao
 Firewalls and Application Level Gateways (ALGs)  Usually configured to protect from at least two types of attack ▪ Control sites which local users.
Tracking Objects with Dynamics Computer Vision CS 543 / ECE 549 University of Illinois Derek Hoiem 04/21/15 some slides from Amin Sadeghi, Lana Lazebnik,
Civil and Environmental Engineering Carnegie Mellon University Sensors & Knowledge Discovery (a.k.a. Data Mining) H. Scott Matthews April 14, 2003.
 2004 University of Pittsburgh Bayesian Biosurveillance Using Multiple Data Streams Weng-Keen Wong, Greg Cooper, Denver Dash *, John Levander, John Dowling,
What’s Strange About Recent Events (WSARE) v3.0: Adjusting for a Changing Baseline Weng-Keen Wong (Carnegie Mellon University) Andrew Moore (Carnegie Mellon.
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering On-line Alert Systems for Production Plants A Conflict Based Approach.
Unsupervised Intrusion Detection Using Clustering Approach Muhammet Kabukçu Sefa Kılıç Ferhat Kutlu Teoman Toraman 1/29.
Towards a Learning Incident Detection System ICML 06 Workshop on Machine Learning for Surveillance and Event Detection June 29, 2006 Tomas Singliar Joint.
Conclusions On our large scale anthrax attack simulations, being able to infer the work zip appears to improve detection time over just using the home.
Mining Behavior Models Wenke Lee College of Computing Georgia Institute of Technology.
Population-Wide Anomaly Detection Weng-Keen Wong 1, Gregory Cooper 2, Denver Dash 3, John Levander 2, John Dowling 2, Bill Hogan 2, Michael Wagner 2 1.
Bayesian Network Anomaly Pattern Detection for Disease Outbreaks Weng-Keen Wong (Carnegie Mellon University) Andrew Moore (Carnegie Mellon University)
1 Bayesian Network Anomaly Pattern Detection for Disease Outbreaks Weng-Keen Wong (Carnegie Mellon University) Andrew Moore (Carnegie Mellon University)
Data Mining – Intro.
By : Anas Assiri.  Introduction  fraud detection  Immune system  Artificial immune system (AIS)  AISFD  Clonal selection.
WAC/ISSCI Automated Anomaly Detection Using Time-Variant Normal Profiling Jung-Yeop Kim, Utica College Rex E. Gantenbein, University of Wyoming.
Intrusion and Anomaly Detection in Network Traffic Streams: Checking and Machine Learning Approaches ONR MURI area: High Confidence Real-Time Misuse and.
Lucent Technologies – Proprietary Use pursuant to company instruction Learning Sequential Models for Detecting Anomalous Protocol Usage (work in progress)
Anomaly detection Problem motivation Machine Learning.
Machine Learning and Optimization For Traffic and Emergency Resource Management. Milos Hauskrecht Department of Computer Science University of Pittsburgh.
Learning to classify the visual dynamics of a scene Nicoletta Noceti Università degli Studi di Genova Corso di Dottorato.
Data Mining Chun-Hung Chou
Intrusion Detection Jie Lin. Outline Introduction A Frame for Intrusion Detection System Intrusion Detection Techniques Ideas for Improving Intrusion.
Anomaly detection with Bayesian networks Website: John Sandiford.
INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION.
A Wavelet-based Anomaly Detector for Disease Outbreaks Thomas Lotze Galit Shmueli University of Maryland College Park Sean Murphy Howard Burkom Johns Hopkins.
Artificial Neural Nets and AI Connectionism Sub symbolic reasoning.
Thesis Proposal PrActive Learning: Practical Active Learning, Generalizing Active Learning for Real-World Deployments.
Bayesian networks Classification, segmentation, time series prediction and more. Website: Twitter:
What’s Strange About Recent Events (WSARE) Weng-Keen Wong (University of Pittsburgh) Andrew Moore (Carnegie Mellon University) Gregory Cooper (University.
MURI: Integrated Fusion, Performance Prediction, and Sensor Management for Automatic Target Exploitation 1 Dynamic Sensor Resource Management for ATE MURI.
Data Mining – Intro. Course Overview Spatial Databases Temporal and Spatio-Temporal Databases Multimedia Databases Data Mining.
N. GagunashviliRAVEN Workshop Heidelberg Nikolai Gagunashvili (University of Akureyri, Iceland) Data mining methods in RAVEN network.
K. Kolomvatsos 1, C. Anagnostopoulos 2, and S. Hadjiefthymiades 1 An Efficient Environmental Monitoring System adopting Data Fusion, Prediction & Fuzzy.
Automatic Detection of Emerging Threats to Computer Networks Andre McDonald.
DDM Kirk. LSST-VAO discussion: Distributed Data Mining (DDM) Kirk Borne George Mason University March 24, 2011.
Probability and Statistics in Vision. Probability Objects not all the sameObjects not all the same – Many possible shapes for people, cars, … – Skin has.
Anomaly Detection.
Artificial Intelligence: Research and Collaborative Possibilities a presentation by: Dr. Ernest L. McDuffie, Assistant Professor Department of Computer.
WHAT IS DATA MINING?  The process of automatically extracting useful information from large amounts of data.  Uses traditional data analysis techniques.
SUMMERY 1. VOLUMETRIC FEATURES FOR EVENT DETECTION IN VIDEO correlate spatio-temporal shapes to video clips that have been automatically segmented we.
Target Classification in Wireless Distributed Sensor Networks (WSDN) Using AI Techniques Can Komar
1. ABSTRACT Information access through Internet provides intruders various ways of attacking a computer system. Establishment of a safe and strong network.
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 28 Data Mining Concepts.
Bayesian Biosurveillance of Disease Outbreaks RODS Laboratory Center for Biomedical Informatics University of Pittsburgh Gregory F. Cooper, Denver H.
Machine learning & object recognition Cordelia Schmid Jakob Verbeek.
Data Mining – Intro.
Machine Learning for Computer Security
Online Conditional Outlier Detection in Nonstationary Time Series
Tracking Objects with Dynamics
ONR MURI area: High Confidence Real-Time Misuse and Anomaly Detection
Bayesian Biosurveillance of Disease Outbreaks
Datamining : Refers to extracting or mining knowledge from large amounts of data Applications : Market Analysis Fraud Detection Customer Retention Production.
Baselining PMU Data to Find Patterns and Anomalies
Gregory Cooper Professor of Biomedical Informatics Director, Center for Causal Discovery Vice Chair, Department of Biomedical Informatics Research involves.
A survey of network anomaly detection techniques
Data Warehousing and Data Mining
K. Kolomvatsos1, C. Anagnostopoulos2, and S. Hadjiefthymiades1
Jia-Bin Huang Virginia Tech
Presentation transcript:

CMU July 29, 2006 Pittsburgh, PA, USA Machine Learning Algorithms for Surveillance and Event Detection Denver Dash – Intel, Corp. Terran Lane – University of New Mexico Dragos Margineantu – The Boeing Company Weng-Keen Wong – Oregon State Univ. Workshops

Workshop Sponsors The Boeing Company Intel

Event Detection Biosurveillance Example: Detect if there is a disease outbreak in a city as early as possible Approach: Monitor the total number of Emergency Department visit in the city each day.

Event Detection Obtain Emergency Department data from the past year Fit a Gaussian to this data Raise an alert when the daily number of ED visits exceeds a threshold 0 x 50 35

Event Detection An interesting event occurs when the # of ED visits per day exceeds the threshold. If it corresponds to a real disease outbreak, it is a true positive. Otherwise, it is a false positive.

“Interesting” Events and their Detection Knowledge Data Decisions Model Event Detection Process Problem/ Environment Problem/ Environment Our World

P(x) 0 x Model learned from x 1 – x 100, and on expert/prior knowledge Interesting Events With Respect To… x x x x x x x x x x ……

Events of Interest are observations with likelihood  (very small?) of occurrence with respect to The model M that is believed to have generated the observations The other observations X that are available P( x i | M, X ) =  Interesting Events with Respect To…

Complex Forms of Data Primary KeyDateTimeProdromeSexAgeHome Location Many more… 1006/1/039:12FeverM20sNE… 1016/1/0310:45DiarrheaF40sNE… 1026/1/0311:03RespiratoryF60sNE… 1036/1/0311:07DiarrheaM60sE… : : : : : : : : JAKARTA, Indonesia (AP) -- Researchers scouring swamps in the heart of Borneo island have discovered a venomous species of snake that can change its skin color, the conservation group WWF announced Tuesday. The ability to change skin color is known in some reptiles, such as the chameleon, but scientists have seen it rarely with snakes and have not yet understood this phenomenon, the group said in a statement....

Event Detection Tasks Intrusion detection / network security Security monitoring Fraud detection Biosurveillance Traffic incident detection Detection of interesting differences between images Detection of potential causes for instability in dynamic systems or control loops Quality control in manufacturing Topic detection Sensor network monitoring Aircraft / train / vehicle maintenance monitoring Fault detection Activity monitoring Supernova detection Weather modeling Data cleaning Detection of regions of increased brain activity from fMRI data And many more…

Features Shared by Most Event Detection Tasks Event detection is difficult or time consuming for human experts Interesting events are usually rare Detecting an interesting event can have a significant impact Difficult to capture all the conditions that make an event “interesting” Evaluation of algorithms is difficult

Not Typical Machine Learning Standard supervised learning approaches are unsatisfactory: –few or no positive examples, plenty of negatives –new forms of interesting events appear Standard unsupervised learning approaches are unsatisfactory: –skewed distributions –in many cases, not just looking for outliers

Standard ML Event Detection Approaches One-class classification of “normal” observations; every other instance considered a potential “important event” Unsupervised clustering + post processing Multi-Stage Event Detection: a standard ML approach + filtering of false positives + Incorporation of background knowledge

Research Questions Event Detection approaches for complex data (video, text, spatio-temporal, relational) Sensor fusion Incorporating domain knowledge into the detection models Validation and testing of Event Detection Algorithms & Tools: –Statistical tests –Testbeds for anomaly detection systems Online Event Detection Defining the “interestingness” of an event (active learning?) Explaining why an event is interesting –Effective visualization techniques Event Detection in adversarial environments

Session 1 (9:20-10:50) 9:20-10:00 Interactive Event Detection in Audio and Video Rahul Sukthankar 10: :25 Framework for Anomalous Change Detection – James Theiler, Simon Perkins 10:25-10:50 Shape Outlier Detection Using Pose Preserving Dynamic Shape Models Chan-Su Lee, Ahmed Elgammal Coffee Break (10:50-11:20) Session 2 (11:20-12:40) 11:20-12:00 Detection of Stepping-Stones: Algorithms and Confidence Bounds Shobha Venkataraman 12:00-12:20 Distributed Probabilistic Inference for Detection of Weak Network Anomalies Denver Dash 12:00-12:20 Learning Sequential Models for Detecting Anomalous Protocol Usage Lloyd Greenwald Lunch (12:40-14:05) Schedule

Session 3 (14:05-15:45) 14:05-14:45 Forecast, Detect, Intervene: Anomaly Detection for Time Series Deepak Agarwal 14:45-15:25 Bayesian Biosurveillance Greg Cooper 15:25-15:45 A Wavelet-based Anomaly Detector for Early Detection of Disease Outbreaks Thomas Lotze, Galit Shmueli, Sean Murphy, Howard Burkom Coffee Break (15:45-16:15) Session 4 (16:15-17:35) 16:15-16:45 Towards a Learning Traffic Incident Detection System Tomas Singliar, Milos Hauskrecht 16:45-17:05 Bayesian Anomaly Detection (BAD v1.0) Tim Menzies, David Allen 17:05-17:35 Discussion Panel Schedule