Markus Goldstein

Markus Goldstein
Technische Hochschule Ulm · Computer Science

PhD

About

17
Publications
49,836
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,812
Citations
Citations since 2017
0 Research Items
1629 Citations
20172018201920202021202220230100200300
20172018201920202021202220230100200300
20172018201920202021202220230100200300
20172018201920202021202220230100200300
Additional affiliations
August 2014 - February 2016
Kyushu University
Position
  • Research Assistant Professor
November 2005 - May 2014
Deutsches Forschungszentrum für Künstliche Intelligenz
Position
  • Researcher

Publications

Publications (17)
Article
Full-text available
Anomaly detection is the process of identifying unexpected items or events in datasets, which differ from the norm. In contrast to standard classification tasks, anomaly detection is often applied on unlabeled data, taking only the internal structure of the dataset into account. This challenge is known as unsupervised anomaly detection and is addre...
Conference Paper
Full-text available
Outlier removal from training data is a classical problem in pattern recognition. Nowadays, this problem becomes more important for large-scale datasets by the following two reasons: First, we will have a higher risk of 'unexpected' outliers, such as mislabeled training data. Second, a large-scale dataset makes it more difficult to grasp the distri...
Conference Paper
Full-text available
The detection of anomalous behavior in log and sensor data is an often requested task for many data mining applications. If there are no labels available in the dataset as in many real-world setups, unsupervised anomaly detection would be the method of choice. Since these algorithms are not directly applicable on the data in general, an appropriate...
Book
Anomaly detection is the task of finding instances in a dataset which are different from the norm. Today, anomaly detection is a core part of many data mining applications, for example in network intrusion detection, fraud detection, data leakage prevention, the identification of failures in complex systems, and diagnosis in the medical domain. In...
Chapter
Chapter 23 gives an overview of a large range of anomaly detection methods and introduces the RapidMiner Anomaly Detection Extension. Anomaly detection is the process of finding patterns in a given dataset which deviate from the characteristics of the majority. These outstanding patterns are also known as anomalies, outliers, intrusions, exceptions...
Conference Paper
Full-text available
Support Vector Machines (SVMs) have been one of the most successful machine learning techniques for the past decade. For anomaly detection, also a semi-supervised variant, the one-class SVM, exists. Here, only normal data is required for training before anomalies can be detected. In theory, the one-class SVM could also be used in an unsupervised an...
Conference Paper
Full-text available
Automatically identifying that a certain page in a set of documents is printed with a different printer than the rest of the documents can give an important clue for a possible forgery attempt. Different printers vary in their produced printing quality, which is especially noticeable at the edges of printed characters. In this paper, a system using...
Conference Paper
Full-text available
Security Information and Event Management (SIEM) systems are today a key component of complex enter-prise networks. They usually aggregate and correlate events from different machines and perform a rule-based analysis to detect threats. In this paper we present an enhancement of such systems which makes use of unsupervised anomaly detection algorit...
Conference Paper
Full-text available
Unsupervised anomaly detection techniques are be-coming more and more important in a variety of ap-plication domains such as network intrusion detection, fraud detection and misuse detection. Today, unsuper-vised anomaly detection techniques are mainly based on quadratic complexity making it almost impossible to apply them on very large data sets....
Conference Paper
Full-text available
Unsupervised anomaly detection is the process of finding outliers in data sets without prior training. In this paper, a histogram-based outlier detection (HBOS) algorithm is presented, which scores records in linear time. It assumes independence of the features making it much faster than multivariate approaches at the cost of less precision. A comp...
Conference Paper
Full-text available
Unsupervised anomaly detection is the process of finding outlying records in a given dataset without prior need for training. In this paper we introduce an anomaly detection extension for RapidMiner in order to assist non-experts with applying eight different nearest-neighbor and clustering based algorithms on their data. A focus on efficient imple...
Article
Full-text available
Choosing a suitable classifier for a given dataset is an important part of developing a pattern recognition system. Since a large variety of classification algorithms are proposed in literature, non-experts do not know which method should be used in order to obtain good classification results on their data. Meta-learning tries to address this probl...
Article
Full-text available
In machine learning, picking the optimal classifier for a given problem is a challenging task. A recent research field called meta-learning automates this procedure by using a meta-classifier in order to predict the best classifier for a given dataset. Using regression techniques, even a ranking of preferred learning algorithms can be determined. H...
Conference Paper
Full-text available
Source IP addresses are often used as a major feature for user modeling in computer networks. Particularly in the field of distributed denial of service (DDoS) attack detection and mitigation traffic models make extensive use of source IP addresses for detecting anomalies. Typically the real IP address distribution is strongly undersampled due to a...
Conference Paper
Full-text available
In this paper a modified decision tree algorithm for anomaly detection is presented. During the tree building process, densities for the outlier class are used directly in the split point determination algorithm. No artificial counter-examples have to be sampled from the unknown class, which yields to more precise decision boundaries and a determin...
Conference Paper
Full-text available
Distributed Denial of Service (DDoS) attack mitigation systems usually generate a list of filter rules in order to block malicious traffic. In contrast to this binary decision we suggest to use traffic shaping whereas the bandwidth limit is defined by the probability of a source to be a legal user. As a proof of concept, we implemented a simple hig...
Conference Paper
Full-text available
Distributed denial of service (DDoS) attacks are today the most destabilizing factor in the global internet and there is a strong need for sophisticated solutions. We introduce a formal statistical framework and derive a Bayes optimal packet classifier from it. Our proposed practical algorithm "adaptive history-based IP filtering" (AHIF) mitigates...

Network

Cited By

Projects

Projects (2)
Project
I am now a Guest Editor for a Special Issue "Unsupervised Anomaly Detection" of MDPI Applied Sciences. The deadline is Oct, 10th 2021. More Information available here: https://www.mdpi.com/journal/applsci/special_issues/unsupervised_anomaly
Project
CFP on Special Issue "Unsupervised Anomaly Detection" Journal: MDPI Applied Sciences More Information: https://www.mdpi.com/journal/applsci/special_issues/unsupervised_anomaly Deadline: 28 February 2021