1
|
Provencher Langlois G, Buch J, Darbon J. Efficient First-Order Algorithms for Large-Scale, Non-Smooth Maximum Entropy Models with Application to Wildfire Science. ENTROPY (BASEL, SWITZERLAND) 2024; 26:691. [PMID: 39202161 PMCID: PMC11353449 DOI: 10.3390/e26080691] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 05/08/2024] [Revised: 07/17/2024] [Accepted: 08/06/2024] [Indexed: 09/03/2024]
Abstract
Maximum entropy (MaxEnt) models are a class of statistical models that use the maximum entropy principle to estimate probability distributions from data. Due to the size of modern data sets, MaxEnt models need efficient optimization algorithms to scale well for big data applications. State-of-the-art algorithms for MaxEnt models, however, were not originally designed to handle big data sets; these algorithms either rely on technical devices that may yield unreliable numerical results, scale poorly, or require smoothness assumptions that many practical MaxEnt models lack. In this paper, we present novel optimization algorithms that overcome the shortcomings of state-of-the-art algorithms for training large-scale, non-smooth MaxEnt models. Our proposed first-order algorithms leverage the Kullback-Leibler divergence to train large-scale and non-smooth MaxEnt models efficiently. For MaxEnt models with discrete probability distribution of n elements built from samples, each containing m features, the stepsize parameter estimation and iterations in our algorithms scale on the order of O(mn) operations and can be trivially parallelized. Moreover, the strong ℓ1 convexity of the Kullback-Leibler divergence allows for larger stepsize parameters, thereby speeding up the convergence rate of our algorithms. To illustrate the efficiency of our novel algorithms, we consider the problem of estimating probabilities of fire occurrences as a function of ecological features in the Western US MTBS-Interagency wildfire data set. Our numerical results show that our algorithms outperform the state of the art by one order of magnitude and yield results that agree with physical models of wildfire occurrence and previous statistical analyses of wildfire drivers.
Collapse
Affiliation(s)
| | - Jatan Buch
- Department of Earth and Environmental Engineering, Columbia University, New York, NY 10027, USA;
| | - Jérôme Darbon
- Division of Applied Mathematics, Brown University, Providence, RI 02912, USA;
| |
Collapse
|
2
|
Berlin L, Galyaev A, Lysenko P. Comparison of Information Criteria for Detection of Useful Signals in Noisy Environments. SENSORS (BASEL, SWITZERLAND) 2023; 23:2133. [PMID: 36850735 PMCID: PMC9966083 DOI: 10.3390/s23042133] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 01/16/2023] [Revised: 02/08/2023] [Accepted: 02/12/2023] [Indexed: 06/18/2023]
Abstract
This paper considers the appearance of indications of useful acoustic signals in the signal/noise mixture. Various information characteristics (information entropy, Jensen-Shannon divergence, spectral information divergence and statistical complexity) are investigated in the context of solving this problem. Both time and frequency domains are studied for the calculation of information entropy. The effectiveness of statistical complexity is shown in comparison with other information metrics for different signal-to-noise ratios. Two different approaches for statistical complexity calculations are also compared. In addition, analytical formulas for complexity and disequilibrium are obtained using entropy variation in the case of signal spectral distribution. The connection between the statistical complexity criterion and the Neyman-Pearson approach for hypothesis testing is discussed. The effectiveness of the proposed approach is shown for different types of acoustic signals and noise models, including colored noises, and different signal-to-noise ratios, especially when the estimation of additional noise characteristics is impossible.
Collapse
|
3
|
Skorski M. Towards More Efficient Rényi Entropy Estimation. ENTROPY (BASEL, SWITZERLAND) 2023; 25:185. [PMID: 36832549 PMCID: PMC9955260 DOI: 10.3390/e25020185] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 11/03/2022] [Revised: 12/28/2022] [Accepted: 01/08/2023] [Indexed: 06/18/2023]
Abstract
Estimation of Rényi entropy is of fundamental importance to many applications in cryptography, statistical inference, and machine learning. This paper aims to improve the existing estimators with regard to: (a) the sample size, (b) the estimator adaptiveness, and (c) the simplicity of the analyses. The contribution is a novel analysis of the generalized "birthday paradox" collision estimator. The analysis is simpler than in prior works, gives clear formulas, and strengthens existing bounds. The improved bounds are used to develop an adaptive estimation technique that outperforms previous methods, particularly in regimes of low or moderate entropy. Last but not least, to demonstrate that the developed techniques are of broader interest, a number of applications concerning theoretical and practical properties of "birthday estimators" are discussed.
Collapse
Affiliation(s)
- Maciej Skorski
- Faculty of Mathematics, Informatics and Mechanics, University of Warsaw, 00-927 Warszawa, Poland
| |
Collapse
|
4
|
Li M, Zhou H, Qin Y. Two-Stage Intelligent Model for Detecting Malicious DDoS Behavior. SENSORS 2022; 22:s22072532. [PMID: 35408146 PMCID: PMC9002896 DOI: 10.3390/s22072532] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 02/04/2022] [Revised: 03/22/2022] [Accepted: 03/23/2022] [Indexed: 02/01/2023]
Abstract
5G technologies provide ubiquitous connectivity. However, 5G security is a particularly important issue. Moreover, because public datasets are outdated, we need to create a self-generated dataset on the virtual platform. Therefore, we propose a two-stage intelligent detection model to enable 5G networks to withstand security issues and threats. Finally, we define malicious traffic detection capability metrics. We apply the self-generated dataset and metrics to thoroughly evaluate the proposed mechanism. We compare our proposed method with benchmark statistics and neural network algorithms. The experimental results show that the two-stage intelligent detection model can distinguish between benign and abnormal traffic and classify 21 kinds of DDoS. Our analysis also shows that the proposed approach outperforms all the compared approaches in terms of detection rate, malicious traffic detection capability, and response time.
Collapse
|
5
|
Heo J, Jeong J. Deceptive Techniques to Hide a Compressed Video Stream for Information Security. SENSORS 2021; 21:s21217200. [PMID: 34770505 PMCID: PMC8587723 DOI: 10.3390/s21217200] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 09/30/2021] [Revised: 10/27/2021] [Accepted: 10/27/2021] [Indexed: 11/16/2022]
Abstract
With the recent development of video compression methods, video transmission on traditional devices and video distribution using networks has increased in various devices such as drones, IP cameras, and small IoT devices. As a result, the demand for encryption techniques such as MPEG-DASH for transmitting streams over networks is increasing. These video stream security methods guarantee stream confidentiality. However, they do not hide the fact that the encrypted stream is being transmitted over the network. Considering that sniffing attacks can analyze the entropy of the stream and scan huge amounts of traffic on the network, to solve this problem, the deception method is required, which appears unencrypted but a confidential stream. In this paper, we propose the new deception method that utilizes standard NAL unit rules of video codec, where the unpromised device shows the cover video and the promised device shows the secret video for deceptive security. This method allows a low encryption cost and the stream to dodge entropy-based sniffing scan attacks. The proposed stream shows that successful decoding using five standard decoders and processing performance was 61% faster than the conventional encryption method in the test signal conformance set. In addition, a network encrypted stream scan method the HEDGE showed classification results that our stream is similar to a compressed video.
Collapse
|
6
|
Yu Q, Kavitha MS, Kurita T. Extensive framework based on novel convolutional and variational autoencoder based on maximization of mutual information for anomaly detection. Neural Comput Appl 2021. [DOI: 10.1007/s00521-021-06017-3] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
|
7
|
Zhang J, Li H, Xia B, Skitmore M, Pu S, Deng Q, Jin W. Development of a market-oriented EFQM excellence model for analyzing the implementation of quality management in developing countries. INTERNATIONAL JOURNAL OF CONSTRUCTION MANAGEMENT 2021. [DOI: 10.1080/15623599.2019.1590975] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/27/2022]
Affiliation(s)
- Jingxiao Zhang
- School of Economics and Management, Chang’an University, Xi’an, China
| | - Hui Li
- School of Civil Engineering, Chang’an University, Xi’an, China
| | - Bo Xia
- School of Civil Engineering and Built Environment, Queensland University of Technology (QUT), Brisbane, Australia
| | - Martin Skitmore
- School of Civil Engineering and Built Environment, Queensland University of Technology (QUT), Brisbane, Australia
- Faculty of Computing, Engineering and the Built Environment, Birmingham City University, Birmingham, UK
| | - Si Pu
- School of Economics and Management, Chang’an University, Xi’an, China
| | - Quanxue Deng
- School of Civil Engineering, Chang’an University, Xi’an, China
| | - Weixing Jin
- School of Civil Engineering, Chang’an University, Xi’an, China
| |
Collapse
|
8
|
Paszkiewicz A. Modeling and Analysis of Anomalies in the Network Infrastructure Based on the Potts Model. ENTROPY 2021; 23:e23080949. [PMID: 34441089 PMCID: PMC8394986 DOI: 10.3390/e23080949] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/07/2021] [Revised: 07/22/2021] [Accepted: 07/23/2021] [Indexed: 11/16/2022]
Abstract
The paper discusses issues concerning the occurrence of anomalies affecting the process of phase transitions. The considered issue was examined from the perspective of phase transitions in network structures, particularly in IT networks, Internet of Things and Internet of Everything. The basis for the research was the Potts model in the context of IT networks. The author proposed the classification of anomalies in relation to the states of particular nodes in the network structure. Considered anomalies included homogeneous, heterogeneous, individual and cyclic disorders. The results of tests and simulations clearly showed the impact of anomalies on the phase transitions in the network structures. The obtained results can be applied in modelling the processes occurring in network structures, particularly in IT networks.
Collapse
Affiliation(s)
- Andrzej Paszkiewicz
- Department of Complex Systems, The Faculty of Electrical and Computer Engineering, Rzeszow University of Technology, al. Powstańców Warszawy 12, 35-959 Rzeszów, Poland
| |
Collapse
|
9
|
Benchmarking Analysis of the Accuracy of Classification Methods Related to Entropy. ENTROPY 2021; 23:e23070850. [PMID: 34356391 PMCID: PMC8306704 DOI: 10.3390/e23070850] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/28/2021] [Revised: 06/18/2021] [Accepted: 06/24/2021] [Indexed: 11/19/2022]
Abstract
In the machine learning literature we can find numerous methods to solve classification problems. We propose two new performance measures to analyze such methods. These measures are defined by using the concept of proportional reduction of classification error with respect to three benchmark classifiers, the random and two intuitive classifiers which are based on how a non-expert person could realize classification simply by applying a frequentist approach. We show that these three simple methods are closely related to different aspects of the entropy of the dataset. Therefore, these measures account somewhat for entropy in the dataset when evaluating the performance of classifiers. This allows us to measure the improvement in the classification results compared to simple methods, and at the same time how entropy affects classification capacity. To illustrate how these new performance measures can be used to analyze classifiers taking into account the entropy of the dataset, we carry out an intensive experiment in which we use the well-known J48 algorithm, and a UCI repository dataset on which we have previously selected a subset of the most relevant attributes. Then we carry out an extensive experiment in which we consider four heuristic classifiers, and 11 datasets.
Collapse
|
10
|
Wang J, Wu X, Li M. Microcanonical and Canonical Ensembles for fMRI Brain Networks in Alzheimer's Disease. ENTROPY (BASEL, SWITZERLAND) 2021; 23:216. [PMID: 33579012 PMCID: PMC7916760 DOI: 10.3390/e23020216] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 12/14/2020] [Revised: 02/03/2021] [Accepted: 02/08/2021] [Indexed: 12/22/2022]
Abstract
This paper seeks to advance the state-of-the-art in analysing fMRI data to detect onset of Alzheimer's disease and identify stages in the disease progression. We employ methods of network neuroscience to represent correlation across fMRI data arrays, and introduce novel techniques for network construction and analysis. In network construction, we vary thresholds in establishing BOLD time series correlation between nodes, yielding variations in topological and other network characteristics. For network analysis, we employ methods developed for modelling statistical ensembles of virtual particles in thermal systems. The microcanonical ensemble and the canonical ensemble are analogous to two different fMRI network representations. In the former case, there is zero variance in the number of edges in each network, while in the latter case the set of networks have a variance in the number of edges. Ensemble methods describe the macroscopic properties of a network by considering the underlying microscopic characterisations which are in turn closely related to the degree configuration and network entropy. When applied to fMRI data in populations of Alzheimer's patients and controls, our methods demonstrated levels of sensitivity adequate for clinical purposes in both identifying brain regions undergoing pathological changes and in revealing the dynamics of such changes.
Collapse
Affiliation(s)
- Jianjia Wang
- School of Computer Engineering and Science, Shanghai University, Shanghai 200444, China;
- Shanghai Institute for Advanced Communication and Data Science, Shanghai University, Shanghai 200444, China
| | - Xichen Wu
- School of Computer Engineering and Science, Shanghai University, Shanghai 200444, China;
| | - Mingrui Li
- Department of Computer Science, University of York, York YO10 5GH, UK;
| |
Collapse
|
11
|
Groote JF, Larsen KG. Network Traffic Classification by Program Synthesis. TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS 2021. [PMCID: PMC7979161 DOI: 10.1007/978-3-030-72016-2_23] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
Abstract
AbstractWriting classification rules to identify interesting network traffic is a time-consuming and error-prone task. Learning-based classification systems automatically extract such rules from positive and negative traffic examples. However, due to limitations in the representation of network traffic and the learning strategy, these systems lack both expressiveness to cover a range of applications and interpretability in fully describing the traffic’s structure at the session layer. This paper presents Sharingan system, which uses program synthesis techniques to generate network classification programs at the session layer. Sharingan accepts raw network traces as inputs and reports potential patterns of the target traffic in NetQRE, a domain specific language designed for specifying session-layer quantitative properties. We develop a range of novel optimizations that reduce the synthesis time for large and complex tasks to a matter of minutes. Our experiments show that Sharingan is able to correctly identify patterns from a diverse set of network traces and generates explainable outputs, while achieving accuracy comparable to state-of-the-art learning-based systems.
Collapse
|
12
|
Baldini G. On the Application of Entropy Measures with Sliding Window for Intrusion Detection in Automotive In-Vehicle Networks. ENTROPY (BASEL, SWITZERLAND) 2020; 22:E1044. [PMID: 33286812 PMCID: PMC7597103 DOI: 10.3390/e22091044] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 08/11/2020] [Revised: 09/07/2020] [Accepted: 09/16/2020] [Indexed: 11/16/2022]
Abstract
The evolution of modern automobiles to higher levels of connectivity and automatism has also increased the need to focus on the mitigation of potential cybersecurity risks. Researchers have proven in recent years that attacks on in-vehicle networks of automotive vehicles are possible and the research community has investigated various cybersecurity mitigation techniques and intrusion detection systems which can be adopted in the automotive sector. In comparison to conventional intrusion detection systems in large fixed networks and ICT infrastructures in general, in-vehicle systems have limited computing capabilities and other constraints related to data transfer and the management of cryptographic systems. In addition, it is important that attacks are detected in a short time-frame as cybersecurity attacks in vehicles can lead to safety hazards. This paper proposes an approach for intrusion detection of cybersecurity attacks in in-vehicle networks, which takes in consideration the constraints listed above. The approach is based on the application of an information entropy-based method based on a sliding window, which is quite efficient from time point of view, it does not require the implementation of complex cryptographic systems and it still provides a very high detection accuracy. Different entropy measures are used in the evaluation: Shannon Entropy, Renyi Entropy, Sample Entropy, Approximate Entropy, Permutation Entropy, Dispersion and Fuzzy Entropy. This paper evaluates the impact of the different hyperparameters present in the definition of entropy measures on a very large public data set of CAN-bus traffic with millions of CAN-bus messages with four different types of attacks: Denial of Service, Fuzzy Attack and two spoofing attacks related to RPM and Gear information. The sliding window approach in combination with entropy measures can detect attacks in a time-efficient way and with great accuracy for specific choices of the hyperparameters and entropy measures.
Collapse
|
13
|
Siboni S, Cohen A. Anomaly Detection for Individual Sequences with Applications in Identifying Malicious Tools. ENTROPY 2020; 22:e22060649. [PMID: 33286421 PMCID: PMC7517183 DOI: 10.3390/e22060649] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 04/25/2020] [Revised: 06/03/2020] [Accepted: 06/08/2020] [Indexed: 11/25/2022]
Abstract
Anomaly detection refers to the problem of identifying abnormal behaviour within a set of measurements. In many cases, one has some statistical model for normal data, and wishes to identify whether new data fit the model or not. However, in others, while there are normal data to learn from, there is no statistical model for this data, and there is no structured parameter set to estimate. Thus, one is forced to assume an individual sequences setup, where there is no given model or any guarantee that such a model exists. In this work, we propose a universal anomaly detection algorithm for one-dimensional time series that is able to learn the normal behaviour of systems and alert for abnormalities, without assuming anything on the normal data, or anything on the anomalies. The suggested method utilizes new information measures that were derived from the Lempel–Ziv (LZ) compression algorithm in order to optimally and efficiently learn the normal behaviour (during learning), and then estimate the likelihood of new data (during operation) and classify it accordingly. We apply the algorithm to key problems in computer security, as well as a benchmark anomaly detection data set, all using simple, single-feature time-indexed data. The first is detecting Botnets Command and Control (C&C) channels without deep inspection. We then apply it to the problems of malicious tools detection via system calls monitoring and data leakage identification.We conclude with the New York City (NYC) taxi data. Finally, while using information theoretic tools, we show that an attacker’s attempt to maliciously fool the detection system by trying to generate normal data is bound to fail, either due to a high probability of error or because of the need for huge amounts of resources.
Collapse
Affiliation(s)
- Shachar Siboni
- Department of Software and Information Systems Engineering, Ben-Gurion University of the Negev, Beer-Sheva 8410501, Israel
- Correspondence: (S.S.); (A.C.); Tel.: +972-50-2560998 (S.S.); +972-50-2054477 (A.C.)
| | - Asaf Cohen
- School of Electrical and Computer Engineering, Ben-Gurion University of the Negev, Beer-Sheva 8410501, Israel
- Correspondence: (S.S.); (A.C.); Tel.: +972-50-2560998 (S.S.); +972-50-2054477 (A.C.)
| |
Collapse
|
14
|
Liu W, Mao Y, Ci L, Zhang F. A new approach of user-level intrusion detection with command sequence-to-sequence model. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS 2020. [DOI: 10.3233/jifs-179659] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
Affiliation(s)
- Wei Liu
- School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China
| | - Yu Mao
- School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China
| | - Linlin Ci
- School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China
| | - Fuquan Zhang
- Fujian Provincial Key Laboratory of Information Processing and Intelligent Control, Minjiang University, Fuzhou, China
| |
Collapse
|
15
|
Cheng Q, Zhou Y, Feng Y, Liu Z. An unsupervised ensemble framework for node anomaly behavior detection in social network. Soft comput 2020. [DOI: 10.1007/s00500-019-04547-6] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/25/2022]
|
16
|
Tavolato P, Schölnast H, Tavolato-Wötzl C. Analytical modelling of cyber-physical systems: applying kinetic gas theory to anomaly detection in networks. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES 2020. [DOI: 10.1007/s11416-020-00349-9] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/24/2022]
|
17
|
Yu KS, Kim SH, Lim DW, Kim YS. A Multiple Rényi Entropy Based Intrusion Detection System for Connected Vehicles. ENTROPY 2020; 22:e22020186. [PMID: 33285960 PMCID: PMC7516617 DOI: 10.3390/e22020186] [Citation(s) in RCA: 10] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 12/31/2019] [Revised: 01/24/2020] [Accepted: 02/03/2020] [Indexed: 11/17/2022]
Abstract
In this paper, we propose an intrusion detection system based on the estimation of the Rényi entropy with multiple orders. The Rényi entropy is a generalized notion of entropy that includes the Shannon entropy and the min-entropy as special cases. In 2018, Kim proposed an efficient estimation method for the Rényi entropy with an arbitrary real order α. In this work, we utilize this method to construct a multiple order, Rényi entropy based intrusion detection system (IDS) for vehicular systems with various network connections. The proposed method estimates the Rényi entropies simultaneously with three distinct orders, two, three, and four, based on the controller area network (CAN)-IDs of consecutively generated frames. The collected frames are split into blocks with a fixed number of frames, and the entropies are evaluated based on these blocks. For a more accurate estimation against each type of attack, we also propose a retrospective sliding window method for decision of attacks based on the estimated entropies. For fair comparison, we utilized the CAN-ID attack data set generated by a research team from Korea University. Our results show that the proposed method can show the false negative and positive errors of less than 1% simultaneously.
Collapse
Affiliation(s)
- Ki-Soon Yu
- Major in Information Communication Engineering, Dongguk University, Seoul 04620, Korea (D.-W.L.)
| | - Sung-Hyun Kim
- School of Computing, Korea Advanced Institute of Science and Technology, Daejeon 34141, Korea;
| | - Dae-Woon Lim
- Major in Information Communication Engineering, Dongguk University, Seoul 04620, Korea (D.-W.L.)
| | - Young-Sik Kim
- Department of Information and Communication Engineering, Chosun University, Gwangju 61452, Korea
- Correspondence: ; Tel.: +82-62-230-7032
| |
Collapse
|
18
|
An Entropy-Based Car Failure Detection Method Based on Data Acquisition Pipeline. ENTROPY 2019; 21:e21040426. [PMID: 33267140 PMCID: PMC7514915 DOI: 10.3390/e21040426] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/11/2019] [Revised: 04/18/2019] [Accepted: 04/18/2019] [Indexed: 12/05/2022]
Abstract
Modern cars are equipped with plenty of electronic devices called Electronic Control Units (ECU). ECUs collect diagnostic data from a car’s components such as the engine, brakes etc. These data are then processed, and the appropriate information is communicated to the driver. From the point of view of safety of the driver and the passengers, the information about the car faults is vital. Regardless of the development of on-board computers, only a small amount of information is passed on to the driver. With the data mining approach, it is possible to obtain much more information from the data than it is provided by standard car equipment. This paper describes the environment built by the authors for data collection from ECUs. The collected data have been processed using parameterized entropies and data mining algorithms. Finally, we built a classifier able to detect a malfunctioning thermostat even if the car equipment does not indicate it.
Collapse
|
19
|
Learning Entropy as a Learning-Based Information Concept. ENTROPY 2019; 21:e21020166. [PMID: 33266882 PMCID: PMC7514648 DOI: 10.3390/e21020166] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.4] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 12/30/2018] [Revised: 01/28/2019] [Accepted: 02/05/2019] [Indexed: 12/02/2022]
Abstract
Recently, a novel concept of a non-probabilistic novelty detection measure, based on a multi-scale quantification of unusually large learning efforts of machine learning systems, was introduced as learning entropy (LE). The key finding with LE is that the learning effort of learning systems is quantifiable as a novelty measure for each individually observed data point of otherwise complex dynamic systems, while the model accuracy is not a necessary requirement for novelty detection. This brief paper extends the explanation of LE from the point of an informatics approach towards a cognitive (learning-based) information measure emphasizing the distinction from Shannon’s concept of probabilistic information. Fundamental derivations of learning entropy and of its practical estimations are recalled and further extended. The potentials, limitations, and, thus, the current challenges of LE are discussed.
Collapse
|
20
|
Cross-Method-Based Analysis and Classification of Malicious Behavior by API Calls Extraction. APPLIED SCIENCES-BASEL 2019. [DOI: 10.3390/app9020239] [Citation(s) in RCA: 18] [Impact Index Per Article: 3.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
Abstract
Data-driven public security networking and computer systems are always under threat from malicious codes known as malware; therefore, a large amount of research and development is taking place to find effective countermeasures. These countermeasures are mainly based on dynamic and statistical analysis. Because of the obfuscation techniques used by the malware authors, security researchers and the anti-virus industry are facing a colossal issue regarding the extraction of hidden payloads within packed executable extraction. Based on this understanding, we first propose a method to de-obfuscate and unpack the malware samples. Additional, cross-method-based big data analysis to dynamically and statistically extract features from malware has been proposed. The Application Programming Interface (API) call sequences that reflect the malware behavior of its code have been used to detect behavior such as network traffic, modifying a file, writing to stderr or stdout, modifying a registry value, creating a process. Furthermore, we include a similarity analysis and machine learning algorithms to profile and classify malware behaviors. The experimental results of the proposed method show that malware detection accuracy is very useful to discover potential threats and can help the decision-maker to deploy appropriate countermeasures.
Collapse
|
21
|
Munk M, Benko L. Using Entropy in Web Usage Data Preprocessing. ENTROPY 2018; 20:e20010067. [PMID: 33265164 PMCID: PMC7512266 DOI: 10.3390/e20010067] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 11/30/2017] [Revised: 01/10/2018] [Accepted: 01/13/2018] [Indexed: 11/16/2022]
Abstract
The paper is focused on an examination of the use of entropy in the field of web usage mining. Entropy creates an alternative possibility of determining the ratio of auxiliary pages in the session identification using the Reference Length method. The experiment was conducted on two different web portals. The first log file was obtained from a course of virtual learning environment web portal. The second log file was received from the web portal with anonymous access. A comparison of the results of entropy estimation of the ratio of auxiliary pages and a sitemap estimation of the ratio of auxiliary pages showed that in the case of sitemap abundance, entropy could be a full-valued substitution for the estimate of the ratio of auxiliary pages.
Collapse
Affiliation(s)
- Michal Munk
- Department of Informatics, Constantine the Philosopher University in Nitra, Tr. A. Hlinku 1, 949 74 Nitra, Slovakia
| | - Lubomir Benko
- Institute of System Engineering and Informatics, University of Pardubice, Studentska 95, 532 10 Pardubice, Czech Republic
- Correspondence: ; Tel.: +421-37-6408-678
| |
Collapse
|
22
|
|
23
|
Callegari C, Giordano S, Pagano M. An information-theoretic method for the detection of anomalies in network traffic. Comput Secur 2017. [DOI: 10.1016/j.cose.2017.07.004] [Citation(s) in RCA: 23] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
|
24
|
Analysis and Potential Application of the Maturity of Growth Management in the Developing Construction Industry of a Province of China: A Case Study. SUSTAINABILITY 2017. [DOI: 10.3390/su9010143] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
|
25
|
|
26
|
An Integrated Diagnostic Framework to Manage Organization Sustainable Growth: An Empirical Case. SUSTAINABILITY 2016. [DOI: 10.3390/su8040301] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
|
27
|
A New Systematic Approach to Vulnerability Assessment of Innovation Capability of Construction Enterprises. SUSTAINABILITY 2015. [DOI: 10.3390/su8010017] [Citation(s) in RCA: 12] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
|