2004
DOI: 10.1109/tsmcb.2003.817026
|View full text |Cite
|
Sign up to set email alerts
|

A Formal Framework for Positive and Negative Detection Schemes

Abstract: Abstract-In anomaly detection, the normal behavior of a process is characterized by a model, and deviations from the model are called anomalies. In behavior-based approaches to anomaly detection, the model of normal behavior is constructed from an observed sample of normally occurring patterns. Models of normal behavior can represent either the set of allowed patterns (positive detection) or the set of anomalous patterns (negative detection). A formal framework is given for analyzing the tradeoffs between posi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
81
0
1

Year Published

2005
2005
2005
2005

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 145 publications
(82 citation statements)
references
References 40 publications
(48 reference statements)
0
81
0
1
Order By: Relevance
“…The r-chunks match rule, on which our paper focuses, was introduced in [3,12]. It is a simplification of the r-contiguous bits (rcb) match rule [13,28,29], which has been used in many artificial immune system projects.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The r-chunks match rule, on which our paper focuses, was introduced in [3,12]. It is a simplification of the r-contiguous bits (rcb) match rule [13,28,29], which has been used in many artificial immune system projects.…”
Section: Related Workmentioning
confidence: 99%
“…The crossover closure was introduced in [12], where it was restricted to contiguous windows of attributes. Here, we remove this restriction and extend it to a set of features.…”
Section: The Crossover Closurementioning
confidence: 99%
See 1 more Smart Citation
“…This paper focuses on the problem of efficient generation of detectors when a realvalued representation of the self/non-self space is used. Other important issues concerning the NS algorithm are discussed elsewhere (positive vs negative detection [6,9], representation and matching rules [10,12], applications [3]), and thus they are not considered in this paper.…”
Section: Introductionmentioning
confidence: 99%
“…This higher-level representation provides some advantages such as increased expressiveness, the possibility of extracting high-level knowledge from the generated detectors, and, in some cases, improved scalability [9,11]. However, this algorithm lacks the theoretical support of the binary negative selection algorithm [5,6]. The main difficulties due to the lack of theoretical support include:…”
Section: Introductionmentioning
confidence: 99%