![]() |
customer@davidpublishing.com |
![]() |
3275638434 |
![]() |
![]() |
| Paper Publishing WeChat |
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
Detecting Anomalies in Irregular Data Using K-means Clustered Signal Dictionary
G. Talavera Reyes, Rajan M. Chandra, Ha Thu Le and Zekeriya Aliyazicioglu
Full-Text PDF
XML 798 Views
DOI:10.17265/1934-7332/2016.05.003
Electrical and Computer Engineering Department, California State Polytechnic University Pomona, CA 91768, United States
The critical nature of satellite network traffic provides a challenging environment to detect intrusions. The intrusion detection method presented aims to raise an alert whenever satellite network signals begin to exhibit anomalous patterns determined by Euclidian distance metric. In line with anomaly-based intrusion detection systems, the method presented relies heavily on building a model of “normal” through the creation of a signal dictionary using windowing and k-means clustering. The results of three signals from our case study are discussed to highlight the benefits and drawbacks of the method presented. Our preliminary results demonstrate that the clustering technique used has great potential for intrusion detection for non-periodic satellite network signals.
Intrusion detection, irregular data, K-means clustering, machine learning, signal dictionary
[2] Chadola, V., Banerjee A., and Kuma, V. 2009. “Anomaly Detection: A Survey.” ACM Computer Surveys (CSUR) 41 (3): 1-58.
[3] Garcia-Teodoro, P., Diaz-Verdejo, J., Macia-Fernandez, G., and Vazquez, E. 2009. “Anomaly-Based Network Intrusion Detection: Techniques, Systems and Challenges.” Computers and Security 28 (1-2): 18-28.
[4] Patcha, A., and Park, J. 2007. “An Overview of Anomaly Detection Techniques: Existing Solutions and Latest Technological Trends.” Computer Networks 51 (12): 3448-70.
[5] Pimentel, M., Clifton, D., Clifton, L., and Tarassenko, L. 2014. “A Review of Novelty Detection.” Signal Processing 99: 215-49.
[6] Cheboli, D. 2010. “Anomaly Detection of Time Series.” Master Thesis, University of Minnesota, Minneapolis.
[7] Dunning, T., and Friedman, E. 2014. Practical Machine Learning: A New Look at Anomaly Detection. Sebastopol: O’Reilly Media, Inc.
[8] Gonzalez, R., and Tou, J. 1974. Pattern Recognition Principles. Reading: Addison-Wesley Publishing Co.
[9] Arthur, D., and Vassilvitskii, S. 2007. “K-means++: The Advantages of Careful Seeding.” In Proceedings of the Eighteenth Annual ACM-SIAM Symposium on Discrete Algorithms, Philadelphia.




