Authors S.M. Kovalev, A.V. Muravskiy
Month, Year 07, 2012 @en
Index UDC 519.816
Abstract A new hybrid approach is developed in this article. The approach is based on adaptive stochastic models and is used for temporal patterns recognition in sequential data. The conditions connecting values of function of the validity of Markov model with probabilities of occurrence in data flows of target patterns are formulated Adaptive Markov model of temporal process is considered along with training method. The model is used for temporal evolutionary patterns prediction. The method of training of game models is developed. Generalisation of the offered approach on a case indistinct temporal patterns is given. The area of possible appendices of methods of anticipatory recognition and results of experiments is described.

Download PDF

Keywords Game Markov model; temporal-difference training; temporal pattern.
References 1. Herbst G., Bocklisch F. Recognition of Fuzzy Time Series Patterns Using Evolving Classification Results // Chemnitz University of Technology, D-09107 Chemnitz, Germany. 2009.
2. Chandola V. Arindam Banerjee, Vipin Kumar. Anomaly detection: a survey, ACM Computing Surveys. – 2009 – P. 1-72.
3. Joshi M.V., Agarwal R.C., Kumar V. Predicting rare classes: can boosting make any weak learner strong? in: Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM, New York, NY, USA, 2002. – P. 297-306.
4. Chawla N.V., Japkowicz N., Kotcz A. Editorial: special issue on learning from imbalanced data sets // SIGKDD Explorations. – 2004. – № 6 (1). –P. 1-6.
5. Steinwart, D. Hush, C. Scovel. A classification framework for anomaly detection // Journal of Machine Learning Research. – 2005. – № 6. – P. 211-232.
6. Sekar R., Gupta A., Frullo J., Shanbhag T., Tiwari A., Yang H., Zhou S. Specificationbased anomaly detection: a new approach for detecting network intrusions, in: Proceedings of the 9th ACM
Conference on Computer and Communications Security, ACM Press, 2002. – P. 265-274.
7. Xu X., Wang X.N. Adaptive network intrusion detection method based on PCA and support vector machines, ADMA 2005, Lecture Notes in Artificial Intelligence, LNAI 3584. – 2005. – P. 696-703.
8. Laskov P., Dussel P., Schafer C., Rieck K. Learning intrusion detection: supervised or unsupervised? Proc. ICIAP 2005, September. Lecture Notes in Computer Science, LNCS 3617.
– 2005. – P. 50-57.
9. Mahoney M., Chan P. Learning nonstationary models of normal network traffic for detecting novel attacks, in: Proceedings of 8th International Conference on Knowledge Discovery and Data Mining, 2002. – P. 376-385.
10. Shah H., Undercoffer J., Joshi A. Fuzzy clustering for intrusion detection, in: Proceedings of the 12th IEEE International Conference on Fuzzy Systems, 2003. – P. 1274-1278.
11. Sutton R. Learning to predict by the method of temporal differences // Machine Learning. – 1988. – № 3 (1). – P. 9-44.
12. Lane T.A. decision-theoretic, semi-supervised model for intrusion detection, in: Machine Learning & Data Mining for Computer Security: Methods & Applications, Springer, 2006. – P. 157-178.
13. Курейчик В.В., Курейчик В.М., Сороколетов П.В. Анализ и обзор моделей эволюции // Известия РАН. ТиСУ. – 2007. – № 5.
14. Ковалев С.М. Гибридные коннекционисткие модели извлечения темпоральных знаний в информационных базах данных // Интегрированные модели и мягкие вычисления в искусственном интеллекте. Сб. научн. тр. V Международной научно-практической конференции. Т. 1. – М.: Физматлит, 2009. – С. 30-41.

Comments are closed.