2008 49th Annual IEEE Symposium on Foundations of Computer Science 2008
DOI: 10.1109/focs.2008.76
|View full text |Cite
|
Sign up to set email alerts
|

Sketching and Streaming Entropy via Approximation Theory

Abstract: We conclude a sequence of work by giving near-optimal sketching and streaming algorithms for estimating Shannon entropy in the most general streaming model, with arbitrary insertions and deletions. This improves on prior results that obtain suboptimal space bounds in the general model, and near-optimal bounds in the insertion-only model without sketching. Our high-level approach is simple: we give algorithms to estimate Renyi and Tsallis entropy, and use them to extrapolate an estimate of Shannon entropy. The … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
56
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 68 publications
(57 citation statements)
references
References 39 publications
1
56
0
Order By: Relevance
“…While possessing the significant advantage of needing few modeling assumptions about what constitutes normal and abnormal traffic, entropy-based methods incur substantial computational cost, which presented an obstacle to their practical adoption. Recent advances in streaming algorithms [3], [6], [12], [16] pave the way to overcoming this obstacle. Reducing the computation cost opens the way not only for singlevariable entropy-based anomaly detection, but also for analysis of pairwise feature dependencies, which can be an efficient anomaly detection tool.…”
Section: B Detecting Attacks With Conditional Entropymentioning
confidence: 99%
See 3 more Smart Citations
“…While possessing the significant advantage of needing few modeling assumptions about what constitutes normal and abnormal traffic, entropy-based methods incur substantial computational cost, which presented an obstacle to their practical adoption. Recent advances in streaming algorithms [3], [6], [12], [16] pave the way to overcoming this obstacle. Reducing the computation cost opens the way not only for singlevariable entropy-based anomaly detection, but also for analysis of pairwise feature dependencies, which can be an efficient anomaly detection tool.…”
Section: B Detecting Attacks With Conditional Entropymentioning
confidence: 99%
“…The algorithms of Bhuvanagiri and Ganguly [3] and Harvey et al [12] are in a class of algorithms called sketching algorithms.…”
Section: A Sketching Algorithmsmentioning
confidence: 99%
See 2 more Smart Citations
“…Therefore, by using an existing entropy estimation algorithm (e.g., [25]) to multiplicatively estimate H(g) we have a constant factor approximation to H(f) if H(f) = ω(p −1/2 n −1/6 ). The next theorem follows directly from Proposition 1 and Lemma 10.…”
Section: Lemmamentioning
confidence: 99%