Download presentation
Presentation is loading. Please wait.
1
Presentation Title August 8, 2019 Net-Centric Software and Systems I/UCRC Self-Detection of Abnormal Event Sequences Project Lead: Farokh Bastani, I-Ling Yen, Latifur Khan Date: October 21, 2010 Copyright © 2010 NSF Net-Centric I/UCRC. All Rights Reserved.. Speaker Name
2
Presentation Title August 8, 2019 2010/Current Project Overview Self-Detection of Abnormal Event Sequences Project Schedule: Project Scope: Given a set of event sequences, determine the normal and abnormal transitions using data mining and automata techniques Develop techniques for problem-specific anomaly detection, including data collection and extraction, a suite of techniques for detecting abnormal event sequences The industry members can share the techniques for abnormal event sequence detection to achieve high quality systems Task 4. Visualization Task 3. Experiment and refinement Task 5. Additional datasets Task 1. On the fly processing Task 2. Prefix tree integration A M J J A S O N D J F M A 10 11 Tasks: Modify the anomaly detections tools for on-the-fly anomaly detection Enhance the anomaly detection techniques using knowledge in prefix tree Continue to Refine the preprocessor Apply the techniques to the datasets Compare the results (time/precision) Develop visualization tool for PFSA Adapt the tools for different datasets Deliverables: Anomaly detection algorithms with real-time on-the-fly anomaly detection capability Anomaly detection results Success Criteria: Identify injected anomalies with high precision and recall 8/8/2019 Speaker Name
3
Tools have detected 100% of all injected anomalies!
Presentation Title August 8, 2019 2010 Project Results Significant Finding/Accomplishment! Complete Partially Complete Not Started TASK STAT PROGRESS and ACCOMPLISHMENT 1. Modify the anomaly detection tools to enable real-time on-the-fly anomaly detection Completed MDI (minimal divergence inference) approach to detect anomalies on-the-fly. 2. Enhance the anomaly detection techniques based on the knowledge in the prefix tree Completed the program. Need to apply the technique to Cisco dataset. 3. Continue to refine the program and apply the techniques to the datasets and compare the results Need to explore different parameter settings in the approaches (such as alpha in MDI) and consider further improvements. 4. Develop visualization tools 5. Adapt the tools for different datasets Preparing datasets from “Software-artifact repository” for testing. Tools have detected 100% of all injected anomalies! 8/8/2019 Speaker Name
4
Major Accomplishments, Discoveries and Surprises
Presentation Title Presentation Title August 8, 2019 August 8, 2019 Major Accomplishments, Discoveries and Surprises Use prefix tree to greatly enhance the efficiency of the algorithms Event sequences can be built into a prefix tree Prefix tree can be used to group event sequences at different levels of granularity (this is especially the case for datasets containing execution traces) Prefix tree can provide some distance information On-the-fly anomaly detection Collect data in time T to build the anomaly detection model, Detect anomalies as soon as an event is generated 2nd closest neighbor 8/8/2019 Speaker Name Speaker Name 4
5
Presentation Title Presentation Title August 8, 2019 August 8, 2019 Our Solution Enhance existing tools using information provided by prefix tree Clustering-based approaches: Use prefix tree to determine the sequence groups at different granularity levels (object level, method level, exact sequence level); clustering algorithms can then be used to merge these groups into clusters Density-based approaches: Use prefix tree to help determine the k-th nearest neighbor PFSA-based approaches: Always start from prefix tree Enhance existing tools for on-the-fly anomaly detection Collect data Dt in (t, t+T], use Dt to build the anomaly detection model At in (t+T, t+2T], use At for anomaly detection in (t+2T, t+3T] Experimentally determine an optimal T … … Collect Dt Build At–T Apply At–2T Collect Dt+T Build At Apply At–T Collect Dt+2T Build At+T Apply At t t+T t+2T t+3T 8/8/2019 Speaker Name Speaker Name 5
6
New Problems How to detect anomalies as soon as an event is generated?
Presentation Title Presentation Title August 8, 2019 August 8, 2019 New Problems How to detect anomalies as soon as an event is generated? After data is collected, use MDI (minimal divergence inference) algorithm to build PFSA (probabilistic finite state automata) Has transition probability for each event Each new sequence: Start from the root of the tree Each new event in the sequence: Check whether the transition is anomalous Mark the new location for the sequence No “end of sequence” mark Will never know whether a sequence ends Need to keep track of too many marks in the tree for all concurrent sequences Solution: Keep the sequences in a priority queue in the order of the timestamp of the last event of the sequence, delete the mark when a sequence has an outdated timestamp A sequence is considered to be terminated if no new events come after a specified time period 8/8/2019 Speaker Name Speaker Name 6
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.