Michael Prerau’s research while affiliated with Columbia University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (3)


Methods of unsupervised anomaly detection using a geometric framework
  • Patent
  • Full-text available

September 2013

·

88 Reads

·

278 Citations

·

Andrew Oliver Arnold

·

Michael Prerau

·

[...]

·

A method for unsupervised anomaly detection, which are algorithms that are designed to process unlabeled data. Data elements are mapped to a feature space which is typically a vector space . Anomalies are detected by determining which points lies in sparse regions of the feature space. Two feature maps are used for mapping data elements to a feature apace. A first map is a data-dependent normalization feature map which we apply to network connections. A second feature map is a spectrum kernel which we apply to system call traces.

Download

A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data

February 2002

·

1,939 Reads

·

909 Citations

Most current intrusion detection systems employ signature-based methods or data mining-based methods which rely on labeled training data. This training data is typically expensive to produce. We present a new geometric framework for unsupervised anomaly detection, which are algorithms that are designed to process unlabeled data. In our framework, data elements are mapped to a feature space which is typically a vector space ℛd. Anomalies are detected by determining which points lies in sparse regions of the feature space. We present two feature maps for mapping data elements to a feature space. Our first map is a data-dependent normalization feature map which we apply to network connections. Our second feature map is a spectrum kernel which we apply to system call traces. We present three algorithms for detecting which points lie in sparse regions of the feature space. We evaluate our methods by performing experiments over network records from the KDD CUP 1999 data set and system call traces from the 1999 Lincoln Labs DARPA evaluation.


Unsupervised Anomaly Detection Using an Optimized K-Nearest Neighbors Algorithm

155 Reads

·

18 Citations

Unsupervised anomaly detection has great utility within the context of network intrusion detection system. Such a system can work without the need for massive sets of pre-labelled training data and has the added versatility of being free of the overspecialization that comes with systems tailored for specific sets of attacks. Thus, with a system that seeks only to define and categorize normalcy, there is the potential to detect new types of network attacks without any prior knowledge of their existence. This paper discusses the creation of such a system that uses a k-nearest neighbors algorithm to detect anomalies in network connections, as well as the optimization necessary to make the algorithm feasible for a real-world system.

Citations (3)


... Eskin et al. first presented a network intrusion detection technique using unsupervised ML methods in 2002. It includes clustering algorithms, an SVM, and the K-Nearest Neighbor (KNN) algorithm [30]. Their research introduces a geometrical paradigm for unsupervised anomaly detection that maps typical metadata into a feature space. ...

Reference:

ENIDS: A Deep Learning-Based Ensemble Framework for Network Intrusion Detection Systems
Methods of unsupervised anomaly detection using a geometric framework

... In this case, indexes built with a clustering-based partition technique seem to perform better than the tree-based indexes. By following the clustering-based partition scheme, numerous approaches (Prerau & Eskin, 2000;Wang, 2011;Almalawi et al., 2015) have been proposed to find the nearest neighbors in high dimensional spaces. In clustering-based indexes, the data points form multiple clusters. ...

Unsupervised Anomaly Detection Using an Optimized K-Nearest Neighbors Algorithm
  • Citing Article

... Principal component analysis (PCA) reduces dimensionality while retaining the variance necessary to detect deviations. These methods allow systems to adapt to new environments without extensive labeled training data (Eskin et al., 2002). ...

A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data