Научная статья на тему 'Anomaly detection based on Markov chain model with production rules'

Anomaly detection based on Markov chain model with production rules Текст научной статьи по специальности «Математика»

CC BY
261
244
i Надоели баннеры? Вы всегда можете отключить рекламу.
Область наук
Ключевые слова
ANOMALY DETECTION / MARKOV CHAINS / EMERGENCY SITUATIONS / STOCHASTIC TECHNIQUES / ONE-CLASS TECHNIQUES / PROBABILITY MODEL / MONITORING AND DIAGNOSIS

Аннотация научной статьи по математике, автор научной работы — Kovalev S. M., Sukhanov A. V.

В статье рассматривается новый подход к обнаружению аномалий в темпоральных данных. В предлагаемом методе использована марковская модель с целью нахождения темпорального профиля поведения процесса. В модель были включены корректирующие продукционные правила, уточняющие вероятности перехода между состояниями процесса с учетом его предыстории. Данная модель была обучена и протестирована на исследуемом процессе. В итоге найдены редко встречаемые паттерны, принятые за аномалии, получившие низкий уровень поддержки стохастической моделью. В вычислительных экспериментах исследован процесс на основе модели темпорального паттерна типа Coffee, применяемой для бенчмаркинга методов обнаружения аномалий. В результате экспериментов показано, что предлагаемый метод с высокой вероятностью позволяет отличить нормальные паттерны от аномалий. Метод применим в широком спектре приложений, связанных с мониторингом и диагностикой нештатных технологических ситуаций.

i Надоели баннеры? Вы всегда можете отключить рекламу.

Похожие темы научных работ по математике , автор научной работы — Kovalev S. M., Sukhanov A. V.

iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.
i Надоели баннеры? Вы всегда можете отключить рекламу.

The paper presents a new technique for anomaly detection in temporal data. This technique uses Markov chain model to represent a temporal profile of process behavior. The model includes the production rules that specify transition probabilities between process states considering its historical data. Such model has been trained and tested in target process. Therefore, we try to find scarce observations that we consider anomalous. These anomalous observations had the low level of our model support. The model has been tested on Coffee model that is used for benchmarking of anomaly detection tech-niques. The computational experiments showed that this technique can distinguish normal behavior from normal activities in observed process. The value of our technique is the fact that it combines advantages of stochastic and one-class techniques. In this connection such technique can be used in wide range of application areas connected to monitoring and diagnosis of emergency technological situations.

Текст научной работы на тему «Anomaly detection based on Markov chain model with production rules»

ANOMALY DETECTION BASED ON MARKOV CHAIN MODEL WITH PRODUCTION RULES

S.M. Kovalev, Dr.Sc. (Engineering), Professor; A.V. Sukhanov, Postgraduate Student

(Rostov State Transport University, Rostovsokogo Strelkovogo Polka Narodnogo Opolcheniya Sq. 2, Rostov-on-Don, 344038, Russian Federation, [email protected])

Received 27.05.2014

Abstract. The paper presents a new technique for anomaly detection in temporal data. This technique uses Markov chain model to represent a temporal profile of process behavior. The model includes the production rules that specify transition probabilities between process states considering its historical data. Such model has been trained and tested in target process. Therefore, we try to find scarce observations that we consider anomalous. These anomalous observations had the low level of our model support. The model has been tested on Coffee model that is used for benchmarking of anomaly detection techniques. The computational experiments showed that this technique can distinguish normal behavior from normal activities in observed process. The value of our technique is the fact that it combines advantages of stochastic and one-class techniques. In this connection such technique can be used in wide range of application areas connected to monitoring and diagnosis of emergency technological situations.

Keywords: anomaly detection, Markov chains, emergency situations, stochastic techniques, one-class techniques, probability model, monitoring and diagnosis.

УДК 656.2 + 06 Дата подачи статьи: 27.05.2014

ОБНАРУЖЕНИЕ ОСОБЫХ ТИПОВ ПАТТЕРНОВ ВО ВРЕМЕННЫХ РЯДАХ НА ОСНОВЕ ГИБРИДНОЙ СТОХАСТИЧЕСКОЙ МОДЕЛИ

Ковалев С.М., д.т.н., профессор; Суханов АВ., аспирант (Ростовский государственный университет путей сообщения, пл. Ростовского Стрелкового Полка Народного Ополчения, 2, г. Ростов-на-Дону, 344038, Россия,

drewnia@rambler. ru)

Аннотация. В статье рассматривается новый подход к обнаружению аномалий в темпоральных данных. В предлагаемом методе использована марковская модель с целью нахождения темпорального профиля поведения процесса. В модель были включены корректирующие продукционные правила, уточняющие вероятности перехода между состояниями процесса с учетом его предыстории. Данная модель была обучена и протестирована на исследуемом процессе. В итоге найдены редко встречаемые паттерны, принятые за аномалии, получившие низкий уровень поддержки стохастической моделью. В вычислительных экспериментах исследован процесс на основе модели темпорального паттерна типа Coffee, применяемой для бенчмаркинга методов обнаружения аномалий. В результате экспериментов показано, что предлагаемый метод с высокой вероятностью позволяет отличить нормальные паттерны от аномалий. Метод применим в широком спектре приложений, связанных с мониторингом и диагностикой нештатных технологических ситуаций.

Ключевые слова: обнаружение аномалий, марковские цепи, нештатные ситуации, стохастические методы, од-ноклассовая классификация, вероятностная модель, мониторинг и диагностика.

Introduction. Nowadays IT develops fast. Computer technologies find extensive using in wide variety of applications. Powerful computing machines become the integral part of any manufacturing activity. The result of computers manufacture activity is big volumes of data. Unfortunately, a little part of this data is useful for manufacturers. In this case Data Mining techniques help to find data that conform to expected results. Data mining helps to get the best results in big data processing. Russian and foreign literature analysis shows that Data mining gets high development level. And the most common techniques connected with temporal data processing. They are often used in transport area where data received from train monitoring have to be processed to give useful information.

This paper proposes a new approach to solve one of the most important temporal data processing problems. Our approach is dedicated to anomaly detection in time series. Anomalies are patterns that do not conform to expected behavior and rarely encountered. Anomalies often represent extraordinary situations in controlled process. Presented technique can be used for Data mining in many areas such as diagnostics, monitoring and cyber security.

Problem statement. Nowadays there is a wide variety of anomaly detection techniques in temporal data. The main aim of these techniques is modeling of process behavior. This modeling is based on dependency finding that is difficult because of the reasons set. First of all, it is difficult to find normal behavior (or norm profile) of controlled process. Second, the anomalies can be clearly distinguished from normal observations in rare cases. And third, there are many uncertainties in process occurring in real life. A wide variety of anomaly detection techniques were made to solve these problems. For example, stochastic model based techniques are used to get an excellent solution for the first problem decision [1-4]. The second problem can be solved by one-class anomaly detection techniques [5]. A wide area of anomaly detection techniques is developed to solve the last problem of temporal Data mining. This is fuzzy logic [6, 7].

Our approach combines advantages of the first two groups. Markov model is used in presented technique to represent process behavior. We have improved this model by including production rules into this model. Production rules help to find connections between process states that don't conform to Markov model conditions.

Markov model. There are two types of sequences in anomaly detection literature. The first type of sequences is symbolic. The second type is continuous or time series. Sequences can also be univariate, when each event in the sequence is a univariate observation, or multivariate when each event in the sequence is a multivariate observation. In this paper we restrict our observations with symbolic sequences. Symbolic time series can be formulated by X = {x(1), x(2), ..., x(t),

..., x(N)}, where x(t) e S is a controlled process state at moment t e N; S is an original states finite set S =

We assume x(i) is a random value. It means that x(i) can be described by probability functions. Therefore we can use Markov chain model for a controlled process.

A Markov chain model is a special type of discrete time stochastic process with the following assumptions [8]:

- the probability distribution of the state at time t+1 depends on the state at time t, and does not depend on the previous states leading to the state at time t:

p(x(t) | x(t-1) = p(x(t) | x(t-1), x(t-2), x(t-l)), (1) where l e [2, 3, ..., t-1];

- a state transition from time t-1 to time t doesn't depend of time.

Let py denote the probability that the system is in a state Sj at time t given the system is in state s, at time t-1. If the system has a finite set of states S, the Markov model can be defined by a transition probability matrix P(x(t)|x(t-1)) [8]:

P(x(t) | x(t-1) = {p(x(t)=Sj| | x(t-1)=s,)}, (2)

p(x(t) = Sj | x(t -1) = s,) = N,

where Ny is the number of observation pairs x(t) and x(t-1) with x(t) in state sy- and x(t-1) in state s,; N, is the number of x(t) in state sy.

And an initial probability distribution Q [8]:

Q={q(s,)}, (3)

N.

q(s, ) = —'- , where N is the total number of observa' N

tions.

In other words, Markov model is presented as triple: MM=<S, Q, P(x(t)|x(t-1))>.

The probability that a pattern Xi = xi(1), xi(2), ..., xi(0), ..., x1(N1) occurs in the context of the known Markov chain is computed as follows

|X,|

Prob = q(x (1)) • n P(X (t) X (t -1)). (4)

t = 2

In [3] a hybrid stochastic model was proposed. This model is presented as a quad:

GM=<S, Q, P(x(t)|x(t-1)), R>, (5)

where R is a set of specifying production rules (SPR).

SPR are based on non-Markov situations, i.e. they specify temporal profile from cases that don't conform to formula (1). SPR set a new probability value that is computed as follows

p(x(t)=sy | x(t-1)=s,)=p(x(t)= sy | x(t-1) = s,, x(t-2) = sfc x(t-l) = sz), (6)

where p(x(t)= sy | x(t-1) = s,, x(t-2) = sk, ..., x(t-l) = sz) is computed as follows p(x(t)= sy | x(t-1) = s,, x(t-2) =

= sk, ..., x(t-l) = sz) = —^^ , where Nz...ky is the num-

Nz ...ki

ber of observation pairs x(t), x(t-1), ..., x(t-l) with

x(t) in state Sj, x(t-1) in state s, ... and x(t-/) in state sz; Nz ki is a number of observation pairs x(t-1), x(t-2), ..., x(t-/) with x(t-1) in state s„ x(t-2) in state sk, ... and x(t-/) in state sz.

Assume a pattern A=[s1? s2, ..., sn] and a pattern B=[s2, s2, ..., sn]. In this case A is named as B-dominant pattern and SPRA is named as SPRB-do-minant.

When we classify patterns from a hybrid model, we should find dominant SPR for each transition of classifying pattern.

Classification based on hybrid stochastic model. Assume that the anomalies are less than 2 % of process. According to the written above, the framework of training is a stochastic model based on a behavior profile of analyzed process. Now we compose a stochastic model, where Q is computed by formula (3), P - by formula (2) and SRS set probabilities via formula (6) to elements that don't conform to the condition (1).

We introduce some conditions to reduce computational complexity. These conditions consist in setting dominant pattern max size. Dominant pattern max size is /max. When / > /max it will influence classification accuracy insignificantly.

And we replace formula (4) with follows

supp = —---^---. (7)

1

1

I

1

N q(x(1)) p(x(i) | x(i -1))

It is made because of null tendency of computational result from formula (4). Formula (7) was presented in [8]. It was made to develop result value robustness to small multiplier values.

We defined the temporal behavior by opening up an observation window of size N to view the last N states from the current time t, where N is calculated as follows N = ^-/max, where ^ is an accuracy multiplier. It means that classification accuracy is high when ^ is high. But unfortunately in this case it is difficult to localize the anomaly place. Therefore we should set ^ to optimal accuracy/quality relation. In our experiments we set ^ = 5.

Then we compute Prob for each window according to a stochastic model. Windows with anomalies should have low value due to low value of its transition (initial) probability.

Computational experiments. We use one of benchmarks for temporal techniques testing [9]. Learning and inference algorithms of the model for this process were implemented using Matlab. For testing one of benchmark implementation was resampled to set of 28 elements. Then resulting set was divided to 7 testing patterns of the same length. Figure 1 illustrates testing split set.

Therefore input data was presented by 7 patterns with the length of 4 and 17 original values.

Analyzed process was made of 5 000 random selected patterns. We made anomalies by changing the

first value of some (14 %) Pattern3. So we have 2 % anomalies from overall set. We named anomalous patterns as Pattern3_wrong (Pattern3 = [13 11 10 13], Pattern_wrong = [6 11 10 13]). Such values of Pat-tern3_wrong was admitted since it is similar not only with Pattern3 but also with Pattern2 (Pattern2 = [6 11 14 13]). Figure 2 shows the difference between Pat-tern3 and Pattern3_wrong.

Fig. 2. Normal pattern Pattern3(a) and abnormal pattern Pattern_wrong(b)

We set /max by using dependence graph of Nzkj from /z kj for all z...kij sequences. Fig. 3 illustrates this dependence.

As shown in Figure 3 / > 10 has low value of N. So in case of /max = 10 we give similar results to the case of /max >10.

Figure 4 shows the application results of our technique and Markov model based technique. As we can see hybrid stochastic model based technique can localize areas with anomaly patterns while Markov model can't do this.

According to testing results we are able to distinguish anomalies from normal patterns with 85 % detection rate using hybrid stochastic model.

Conclusions and future work. In this paper we discussed a new technique of anomaly detection in time sets. We proposed one-class classification based

on hybrid stochastic model of temporal behavior to solve an anomaly detection problem. Computational results with knowing benchmark show that our technique can distinguish areas with anomalies from normal areas. As for further research, a technique model can be supplemented by fuzzy components. In this case an approach should be more robust to uncertainties that occur in real life.

References

1. Ye N. A Markov chain model of temporal behavior for anomaly detection. Proc. of 2000 IEEE Workshop on Information Assurance and Security. United States Military Academy, West Point Publ., NY, 2000, pp. 171-174.

2. Sukhanov A.V. Stochastic Markov model for anomaly detection in temporal data. Trudy Kongressa po intellektualnym sistemam i informatsionnym tekhnologiyam "IS&IT'13" [Proc. of Congress on Intelligent Systems and Information Technologies "IS&IT13"]. Moscow, Fizmatlit Publ., 2013, vol. 1, pp. 177-181 (in Russ.).

3. Kovalev S.M., Guda A.N., Butakova M.A. Hybrid stochastic detection model of specific patterns in temporal data. Vestnik RGUPS [Bulletin of RSTU]. 2013, no. 3 (51), pp. 36-42 (in Russ.).

4. Wang J., Rossell D., Cassandras C.G., Paschalidis I.Ch. Network anomaly detection: A survey and comparative analysis of stochastic and deterministic methods. CoRR. 2013, pp. 182-187.

5. Tax D. One-class classification: Concept-learning in the absence of counter-examples. Doctoral Dissertation, University of Delft Publ., The Netherlands, 2001.

6. Zadeh L. The concept of a linguistic variable and its application to approximate reasoning. Moscow, Mir Publ., 1976, 166 p.

7. Carinena P., Bugarin A., Mucienrtes M. Fuzzy Temporal Rules: a rule-based approach for fuzzy temporal knowledge representation and reasoning. B. Bouchon-Meuneir, J. Gutierrez-Rios, L. Magdalena, R.R. Yager (Eds.). Technologies for constructing intelligent systems. Vol. 2, Springer-Verlag Publ., 2002, pp. 237-250.

8. Scheuner U. Fuzzy-Mengen Verknüpfung und Fuzzy-Arithmetik zur Sensordaten-Fusion [Fuzzy sets and fuzzy arithmetic for sensor data fusion]. VDI-Verlag Publ., 2001, vol. 8.

9. Keogh E., Xi X., Wei L., Ratanamahatana C.A. The UCR time series classification/clustering homepage. Available at: http://www.cs.ucr.edu/~eamonn/time_series_data/ (accessed July 14, 2014).

10. Song Q., Chissom B.S. Fuzzy time series and its models.

Fuzzy Sets and Systems. 1993, vol. 54, no. 3, pp. 269-277.

Литература

1. Ye N. A Markov chain model of temporal behavior for anomaly detection. Proc. of 2000 IEEE Workshop on Information Assurance and Security. United States Military Academy, West Point Publ., NY, 2000, pp. 171-174.

2. Суханов А.В. Стохастическая марковская модель поиска аномалий в темпоральных данных // Конгресс по интеллект. системам и информ. технологиям «IS&IT'13»: сб. докл.: В 4 т. М.: Физматлит, 2013. Т. 1. С. 177-181.

3. Ковалев С.М., Гуда А.Н., Бутакова М.А. Гибридная стохастическая модель обнаружения особых типов паттернов в темпоральных данных // Вестн. РГУПС. 2013. № 3 (51). С. 36-42.

4. Wang J., Rossell D., Cassandras C.G., Paschalidis I.Ch. Network anomaly detection: A survey and comparative analysis of stochastic and deterministic methods. CoRR, 2013, pp. 182-187.

5. Tax D. One-class classification: Concept-learning in the absence of counter-examples. Doctoral Dissertation, Univ. of Delft Publ., The Netherlands, 2001.

6. Zadeh L. The concept of a linguistic variable and its application to approximate reasoning. Moscow, Mir Publ., 1976, 166 p.

7. Carinena P., Bugarin A., Mucienrtes M. Fuzzy temporal rules: a rule-based approach for fuzzy temporal knowledge representation and reasoning. Technologies for constructing intelligent systems. Vol. 2, Springer-Verlag Publ., 2002, pp. 237-250.

8. Scheuner U. Fuzzy-Mengen Verknüpfung und Fuzzy-Arithmetik zur Sensordaten-Fusion [Fuzzy sets and fuzzy arithmetic for sensor data fusion]. VDI-Verlag Publ., 2001, vol. 8.

9. Keogh E., Xi X., Wei L., Ratanamahatana C.A. The UCR time series classification/clustering homepage. URL: http://www. cs.ucr.edu/~eamonn/time_series_data/ (дата обращения: 14.07.2014).

10. Song Q., Chissom B.S. Fuzzy time series and its models. Fuzzy Sets and Systems. 1993, vol. 54, no. 3, pp. 269-277.

Уважаемые авторы!

Редакция международного журнала «Программные продукты и системы» в своей работе руководствуется политикой редакционной коллегии журнала и сводом принципов «Кодекса этики научных публикаций», разработанным и утвержденным Комитетом по этике научных публикаций (Committee on Publication Ethics - COPE), требуя соблюдения этих правил от всех участников издательского процесса.

Подробности на сайте www.swsys.ru

i Надоели баннеры? Вы всегда можете отключить рекламу.