Functional networks: from brain dynamics to information systems security. David Papo

Size: px
Start display at page:

Download "Functional networks: from brain dynamics to information systems security. David Papo"

Transcription

1 Functional networks: from brain dynamics to information systems security David Papo URJC, Móstoles, 31 October 2014

2 Goal To illustrate the motivation for a functional network representation in information systems security. 2

3 Outline 1) Networks in neuroscience: potential and methods 2) Mini introduction to networks 3) Network theory and Information systems security issues: some suggestions 3

4 Networks in the brain 4

5 Some facts about the brain Circuitry: ~ neurons (~ 10 4 synapses/neuron) ~ km of cables 10 5 neurons, 10 8 synapses, 4 km of axons (diameter: ~ 0.3 µm) per mm 3 Theoretical band-pass ~ 1 terabit/s (~ total internet capacity 2002) Storage capacity: bytes Computation rate: 3.6 X synaptic operations Computational efficiency: synaptic operations/joule Energy consumption: ~ 2% total body weight ~ 15% cardiac output ~ 20% total oxygen consumption ~ 25% total glucose consumption ~ 50% energy is used to send signals (axons &synapses) How does the brain cope with the energetic problem? 5

6 Appropriate design Component miniaturisation Elimination of superfluous signals Sparse information codes Distribution in space and time Multiscale-ness 6

7 The brain in action Brain activity consists of transient spatio-temporal patterns of correlated activity Even at rest, this activity is non random Contains structure both in space and in time: neuronal assemblies form at all spatial scales and with non-trivial temporal patterns Observed function results from the renormalization of activity at all these scales Patterns seen during task-induced activation are already present in spontaneous activity Understanding the effect of perturbations without perturbing the system 7

8 Statistical Mechanics approach ~ neurons (~ 10 4 synapses) ~ km of cables 1 mm 3 of rat cortex contains: 10 5 neurons 10 8 synapses 4 km of axons Theoretical band-pass ~ 1 terabit/s (~ total internet capacity 2002) Anatomical network Physical cables Dynamical network Information packets Complex networks representation Statistical mechanics approach Observable macroscopic properties emerge as a result of the interactions of a huge number of microscopic particles (The characteristics of each particle are not important) 8

9 Describing systems as complex networks Network set of nodes connected by links Graph theory set of mathematical tools allowing a quantitative characterization of a system at many spatial and temporal scales From: R.V. Solé and S. Valverde Lecture Notes in Physics, 60, 189, 2004 Read more at: Boccaletti et al., Phys. Rep., (2006) 9

10 A fleeting foray into complex network theory 10

11 What s a network? Network: Set of labeled nodes and links uniting them Adjacency matrix: The matrix of entries a(i,j)=1 if there is a link between node i and j a(i,j)=0 otherwise

12 Degree distribution Degree if node i: Number of links of node i k i j a ij Network: 1 Degree distribution: P(k): how many nodes have degree k P(k)

13 Clustering coefficient Local clustering coefficient C i # of closed triangles k i (k i 1)/2 Network 1 Clustering coefficient of nodes 2,3 2 3 C C

14 Shortest distance The shortest distance between two nodes is the minimal number of links than a path must hop to go from the source to the destination The shortest distance between node 4 and node 1 is 3 between node 3 and node 1 is

15 Communities Dolphins social network High-school dating networks A community is a set of nodes with a similar connectivity pattern. S. Fortunato Phys. Rep

16 Protein-protein networks Social networks

17 Extraction of sector information in financial markets Minimal-Spanning-Trees Planar maximally filtered graphs NYSE daily returns USA equity market Bonanno et al. (2003) Tumminello et al. (2007) 17

18 Community structure Communities More links inside than outside 18

19 Community structure There is no absolute definition of community, only a relative one. A network has a community structure if it is more ordered than a random version of it (null model). Null model: class of random networks with the same degree sequence of the original one. There are many algorithms for community detection. 19

20 A new paradigm for brain function A new paradigm for brain function From few degrees of freedom to statistical mechanics Micro, meso and macroscopic scales (N.B. scales are relative) Emergence of function Network topological properties at all scales rather than specific node s ones From important parts to general organizing principles Nodes and node centrality Global properties: SW, scale-free; assortativity (but at what scales?); core-periphery Mesoscale properties: motifs, community structure Relationships across scales: hierarchical structure; self-similarity, self-dissimilarity 21

21 A new paradigm for brain function From structure to dynamics to function Anatomical vs dynamical networks Anatomy structure; dynamics function The brain as a biophysical object Observed activity as the result of an evolutionary process :Morphospaces Efficiency and costs e.g. SW: high efficiency for low wiring costs Robustness and Adaptativity E.g. modularity Characterizing brain disease and cognitive function Anatomical networks, Resting state, Task-activated dynamical networks Relationships between them? Healthy brains vs. psychiatric/neurological diseases 22

22 Detecting alerts: the case of epilepsy Seizure etiology and propagation Abnormal pattern of synchronization across brain regions Focal, multifocal, extended support Spatio-temporal nature of seizure propagation Plurality of predictors [behavioural, neurophysiological] Are they related to each other? } Seizure detection (retroactive or in real time) Spiking activity even in normal brains Seizure prediction (proactive) Nonlinear correlations Sensitivity vs. Specificity 23

23 Building networks from experimental data Define the network nodes. Estimate a metric of association between nodes. Generate an association matrix and apply a threshold to each element adjacency matrix or undirected graph. Calculate network parameters of interest (compare to population of random networks). 24

24 Building Networks Eguiluz et al. (2005) 25

25 Functional networks as correlation

26 Functional networks as causality

27 Networks and Security 28

28 Credit card fraud Detecting clusters of similar users Peer group analysis: system that allows identifying accounts that are behaving differently from others at one moment in time whereas they were behaving the same previously. Normal behavior Suspected fraud Bolton, R. J., & Hand, D. J. (2001). Unsupervised profiling methods for fraud detection. Credit Scoring and Credit Control VII,

29 Credit card fraud Detecting clusters of similar users Problem: Complexity of defining similarity Why functional networks? Great flexibility in the type of co-occurrence Relationships can be non-linear 30

30 Credit card fraud Detecting clusters of similar users Problem: Why functional networks? Difficulty in detecting groups of users Sub-networks are not complete: A may be similar to B, B to C, but A and C may be different Detecting meso-scales and communities in real data sets Serrà, J., Zanin, M., Herrera, P., & Serra, X. (2012). Characterization and exploitation of community structure in cover song networks. Pattern Recognition Letters, 33 (9),

31 Credit card fraud Detecting clusters of similar users Problem: Why functional networks? Changes in groups. For instance, a student that starts working thus changing his/her habits Meso-scale goes beyond a single group Analysis of time-varying networks 32

32 Credit card fraud Detecting clusters of similar stores Similarly to peer group analysis, it is possible to detect groups of similar stores. Problems: Store name is not fully identifying, as a single entity may use different names Low volume stores may not have the same risk as their peer group The solution: content analysis using functional networks Stores are connected when realizing similar transactions in similar volumes Use of text mining to complement low-level numerical information Possible use of multi-layer structures Detecting and measuring risk with predictive models using content mining US B1

33 Credit card fraud Forecasting legal transactions Why analyzing transactions, when they can be forecasted? Detect patterns in the use of credit card, to forecast a legal transaction before its realization Similar to recommender systems in on-line stores Zanin, M., Cano, P., Buldú, J. M., & Celma, O. (2008, January). Complex networks in recommendation systems. In Proc. 2nd WSEAS Int. Conf. on Computer Engineering and Applications, Acapulco, Mexico. Lü, L., Medo, M., Yeung, C. H., Zhang, Y. C., Zhang, Z. K., & Zhou, T. (2012). Recommender systems. Physics Reports, 519(1),

34 Network security Spatio-temporal correlations Attacks to a network are usually distributed among its nodes. Moreover, attacks against a network may also involve multiple steps: evidence is typically distributed over time as well. Computer networks as dynamical systems Events as observables of their dynamics Jiang, G., & Cybenko, G. (2004, June). Temporal and spatial distributed event correlation for network security. In American Control Conference, Proceedings of the 2004 (Vol. 2, pp ). 35 IEEE.

35 High-level semantic Low-level data Network security Spatio-temporal correlations Types of observables: Firewall warning Intrusion Detection System (IDS) alerts Software log files Internet and Ethernet communications Users and programs activity CPU and memory load 36

36 Network security Spatio-temporal correlations Major problem: High number of false alarms Reconstruct the topological space of true alarms Pairwise connected when they co-occur in a real attack Nodes represent alarms 37

37 Network security Advantages: Spatio-temporal correlations 1. Strengthens the diagnosis 2. Reduces the overall number of alarms 3. Improves the content of the alarms Morin, B., & Debar, H. (2003, January). Correlation of intrusion symptoms: an application of chronicles. In Recent Advances in Intrusion Detection (pp ). Springer Berlin Heidelberg. 38

38 Network security Spatio-temporal correlations What about causality? Reconstruct functional networks based on causality relations between alerts Cascade effect Cascade effect Root alert 39

39 Network security Advantages: Spatio-temporal correlations 1. Post-event analysis of attacks 2. Identification of root alarms, i.e. those acting at the beginning of the attack 3. Identification of redundant alarms Lee, W., & Qin, X. (2005). Statistical causality analysis of INFOSEC alert data. In Managing Cyber Threats (pp ). Springer 40 US.

40 Network security Spatio-temporal correlations Alternative solution: Monitoring the appearance of some standard attack patterns Pattern 1 Pattern 2 Pattern n 41

41 Network security Major problem: Spatio-temporal correlations The system is reactive, in that the same (or very similar) patterns should have appeared in the past Pattern matching cannot work under unknown conditions! 42

42 Network security Spatio-temporal correlations Problem: Reactive vs. proactive system Why functional networks? Detect variations from a normal (base-line) network The red node is not expected to be central Security alert 43

43 Conclusions Substantial similarities between issues encountered when studying normal and pathological brain activity on the one hand, and information systems security on the other hand. Functional networks (and the tools of graph analysis and complex network theory) can be used to tackle some of these common problems 44

44 45

A Hierarchial Model for Visual Perception

A Hierarchial Model for Visual Perception A Hierarchial Model for Visual Perception Bolei Zhou 1 and Liqing Zhang 2 1 MOE-Microsoft Laboratory for Intelligent Computing and Intelligent Systems, and Department of Biomedical Engineering, Shanghai

More information

Algorithms and Applications in Social Networks. 2017/2018, Semester B Slava Novgorodov

Algorithms and Applications in Social Networks. 2017/2018, Semester B Slava Novgorodov Algorithms and Applications in Social Networks 2017/2018, Semester B Slava Novgorodov 1 Lesson #1 Administrative questions Course overview Introduction to Social Networks Basic definitions Network properties

More information

Properties of Biological Networks

Properties of Biological Networks Properties of Biological Networks presented by: Ola Hamud June 12, 2013 Supervisor: Prof. Ron Pinter Based on: NETWORK BIOLOGY: UNDERSTANDING THE CELL S FUNCTIONAL ORGANIZATION By Albert-László Barabási

More information

Effect of age and dementia on topology of brain functional networks. Paul McCarthy, Luba Benuskova, Liz Franz University of Otago, New Zealand

Effect of age and dementia on topology of brain functional networks. Paul McCarthy, Luba Benuskova, Liz Franz University of Otago, New Zealand Effect of age and dementia on topology of brain functional networks Paul McCarthy, Luba Benuskova, Liz Franz University of Otago, New Zealand 1 Structural changes in aging brain Age-related changes in

More information

International Journal of Research in Advent Technology, Vol.7, No.3, March 2019 E-ISSN: Available online at

International Journal of Research in Advent Technology, Vol.7, No.3, March 2019 E-ISSN: Available online at Performance Evaluation of Ensemble Method Based Outlier Detection Algorithm Priya. M 1, M. Karthikeyan 2 Department of Computer and Information Science, Annamalai University, Annamalai Nagar, Tamil Nadu,

More information

SELF-HEALING NETWORKS: REDUNDANCY AND STRUCTURE

SELF-HEALING NETWORKS: REDUNDANCY AND STRUCTURE SELF-HEALING NETWORKS: REDUNDANCY AND STRUCTURE Guido Caldarelli IMT, CNR-ISC and LIMS, London UK DTRA Grant HDTRA1-11-1-0048 INTRODUCTION The robustness and the shape Baran, P. On distributed Communications

More information

An Exploratory Journey Into Network Analysis A Gentle Introduction to Network Science and Graph Visualization

An Exploratory Journey Into Network Analysis A Gentle Introduction to Network Science and Graph Visualization An Exploratory Journey Into Network Analysis A Gentle Introduction to Network Science and Graph Visualization Pedro Ribeiro (DCC/FCUP & CRACS/INESC-TEC) Part 1 Motivation and emergence of Network Science

More information

What is a network? Network Analysis

What is a network? Network Analysis What is a network? Network Analysis Valerie Cardenas Nicolson Associate Adjunct Professor Department of Radiology and Biomedical Imaging Complex weblike structures Cell is network of chemicals connected

More information

Networks in economics and finance. Lecture 1 - Measuring networks

Networks in economics and finance. Lecture 1 - Measuring networks Networks in economics and finance Lecture 1 - Measuring networks What are networks and why study them? A network is a set of items (nodes) connected by edges or links. Units (nodes) Individuals Firms Banks

More information

A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks

A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks S. Balachandran, D. Dasgupta, L. Wang Intelligent Security Systems Research Lab Department of Computer Science The University of

More information

CTI Capability Maturity Model Marco Lourenco

CTI Capability Maturity Model Marco Lourenco 1 CTI Capability Maturity Model Cyber Threat Intelligence Course NIS Summer School 2018, Crete October 2018 MARCO LOURENCO - ENISA Cyber Security Analyst Lead European Union Agency for Network and Information

More information

Improving the Efficiency of Fast Using Semantic Similarity Algorithm

Improving the Efficiency of Fast Using Semantic Similarity Algorithm International Journal of Scientific and Research Publications, Volume 4, Issue 1, January 2014 1 Improving the Efficiency of Fast Using Semantic Similarity Algorithm D.KARTHIKA 1, S. DIVAKAR 2 Final year

More information

Different attack manifestations Network packets OS calls Audit records Application logs Different types of intrusion detection Host vs network IT

Different attack manifestations Network packets OS calls Audit records Application logs Different types of intrusion detection Host vs network IT Different attack manifestations Network packets OS calls Audit records Application logs Different types of intrusion detection Host vs network IT environment (e.g., Windows vs Linux) Levels of abstraction

More information

An Introduction to Complex Systems Science

An Introduction to Complex Systems Science DEIS, Campus of Cesena Alma Mater Studiorum Università di Bologna andrea.roli@unibo.it Disclaimer The field of Complex systems science is wide and it involves numerous themes and disciplines. This talk

More information

Real-Time Model-Free Detection of Low-Quality Synchrophasor Data

Real-Time Model-Free Detection of Low-Quality Synchrophasor Data Real-Time Model-Free Detection of Low-Quality Synchrophasor Data Meng Wu and Le Xie Department of Electrical and Computer Engineering Texas A&M University College Station, TX NASPI Work Group meeting March

More information

Basics of Network Analysis

Basics of Network Analysis Basics of Network Analysis Hiroki Sayama sayama@binghamton.edu Graph = Network G(V, E): graph (network) V: vertices (nodes), E: edges (links) 1 Nodes = 1, 2, 3, 4, 5 2 3 Links = 12, 13, 15, 23,

More information

BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks

BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks 1 BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks Pan Hui, Jon Crowcroft, Eiko Yoneki Presented By: Shaymaa Khater 2 Outline Introduction. Goals. Data Sets. Community Detection Algorithms

More information

Performance Analysis of A Feed-Forward Artifical Neural Network With Small-World Topology

Performance Analysis of A Feed-Forward Artifical Neural Network With Small-World Topology Available online at www.sciencedirect.com Procedia Technology (202 ) 29 296 INSODE 20 Performance Analysis of A Feed-Forward Artifical Neural Network With Small-World Topology Okan Erkaymaz a, Mahmut Özer

More information

User Signature Identification and Image Pixel Pattern Verification

User Signature Identification and Image Pixel Pattern Verification Global Journal of Pure and Applied Mathematics. ISSN 0973-1768 Volume 13, Number 7 (2017), pp. 3193-3202 Research India Publications http://www.ripublication.com User Signature Identification and Image

More information

Image Classification Using Wavelet Coefficients in Low-pass Bands

Image Classification Using Wavelet Coefficients in Low-pass Bands Proceedings of International Joint Conference on Neural Networks, Orlando, Florida, USA, August -7, 007 Image Classification Using Wavelet Coefficients in Low-pass Bands Weibao Zou, Member, IEEE, and Yan

More information

Relative Constraints as Features

Relative Constraints as Features Relative Constraints as Features Piotr Lasek 1 and Krzysztof Lasek 2 1 Chair of Computer Science, University of Rzeszow, ul. Prof. Pigonia 1, 35-510 Rzeszow, Poland, lasek@ur.edu.pl 2 Institute of Computer

More information

R. R. Badre Associate Professor Department of Computer Engineering MIT Academy of Engineering, Pune, Maharashtra, India

R. R. Badre Associate Professor Department of Computer Engineering MIT Academy of Engineering, Pune, Maharashtra, India Volume 7, Issue 4, April 2017 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Service Ranking

More information

Sampling Large Graphs for Anticipatory Analysis

Sampling Large Graphs for Anticipatory Analysis Sampling Large Graphs for Anticipatory Analysis Lauren Edwards*, Luke Johnson, Maja Milosavljevic, Vijay Gadepally, Benjamin A. Miller IEEE High Performance Extreme Computing Conference September 16, 2015

More information

Climate Precipitation Prediction by Neural Network

Climate Precipitation Prediction by Neural Network Journal of Mathematics and System Science 5 (205) 207-23 doi: 0.7265/259-529/205.05.005 D DAVID PUBLISHING Juliana Aparecida Anochi, Haroldo Fraga de Campos Velho 2. Applied Computing Graduate Program,

More information

CS-E5740. Complex Networks. Network analysis: key measures and characteristics

CS-E5740. Complex Networks. Network analysis: key measures and characteristics CS-E5740 Complex Networks Network analysis: key measures and characteristics Course outline 1. Introduction (motivation, definitions, etc. ) 2. Static network models: random and small-world networks 3.

More information

A new predictive image compression scheme using histogram analysis and pattern matching

A new predictive image compression scheme using histogram analysis and pattern matching University of Wollongong Research Online University of Wollongong in Dubai - Papers University of Wollongong in Dubai 00 A new predictive image compression scheme using histogram analysis and pattern matching

More information

Locating ego-centers in depth for hippocampal place cells

Locating ego-centers in depth for hippocampal place cells 204 5th Joint Symposium on Neural Computation Proceedings UCSD (1998) Locating ego-centers in depth for hippocampal place cells Kechen Zhang,' Terrence J. Sejeowski112 & Bruce L. ~cnau~hton~ 'Howard Hughes

More information

Anomaly Detection in Communication Networks

Anomaly Detection in Communication Networks Anomaly Detection in Communication Networks Prof. D. J. Parish High Speed networks Group Department of Electronic and Electrical Engineering D.J.Parish@lboro.ac.uk Loughborough University Overview u u

More information

Data Sources for Cyber Security Research

Data Sources for Cyber Security Research Data Sources for Cyber Security Research Melissa Turcotte mturcotte@lanl.gov Advanced Research in Cyber Systems, Los Alamos National Laboratory 14 June 2018 Background Advanced Research in Cyber Systems,

More information

Scalable Experimental Network of Excitable Boolean Nodes

Scalable Experimental Network of Excitable Boolean Nodes Scalable Experimental Network of Excitable Boolean Nodes David P. Rosin 1,2,*, Damien Rontani 1, Daniel J. Gauthier 1 and Eckehard Schöll 2 Dynamics Days US 2012, Baltimore, Maryland, USA 1 Duke University,

More information

Cyber attack detection using decision tree approach

Cyber attack detection using decision tree approach Cyber attack detection using decision tree approach Amit Shinde Department of Industrial Engineering, Arizona State University,Tempe, AZ, USA {amit.shinde@asu.edu} In this information age, information

More information

Available Online through

Available Online through Available Online through www.ijptonline.com ISSN: 0975-766X CODEN: IJPTFI Research Article ANALYSIS OF CT LIVER IMAGES FOR TUMOUR DIAGNOSIS BASED ON CLUSTERING TECHNIQUE AND TEXTURE FEATURES M.Krithika

More information

Detect Cyber Threats with Securonix Proxy Traffic Analyzer

Detect Cyber Threats with Securonix Proxy Traffic Analyzer Detect Cyber Threats with Securonix Proxy Traffic Analyzer Introduction Many organizations encounter an extremely high volume of proxy data on a daily basis. The volume of proxy data can range from 100

More information

ENERGY-EFFICIENT TRUST SYSTEM THROUGH WATCHDOG OPTIMIZATION

ENERGY-EFFICIENT TRUST SYSTEM THROUGH WATCHDOG OPTIMIZATION International Journal of Power Control and Computation(IJPCSC) Vol 8. No.1 2016 Pp.44-50 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0976-268X ENERGY-EFFICIENT TRUST SYSTEM THROUGH WATCHDOG

More information

Flexibility and Robustness of Hierarchical Fuzzy Signature Structures with Perturbed Input Data

Flexibility and Robustness of Hierarchical Fuzzy Signature Structures with Perturbed Input Data Flexibility and Robustness of Hierarchical Fuzzy Signature Structures with Perturbed Input Data B. Sumudu U. Mendis Department of Computer Science The Australian National University Canberra, ACT 0200,

More information

City, University of London Institutional Repository

City, University of London Institutional Repository City Research Online City, University of London Institutional Repository Citation: Andrienko, N., Andrienko, G., Fuchs, G., Rinzivillo, S. & Betz, H-D. (2015). Real Time Detection and Tracking of Spatial

More information

A Hybrid Communication Architecture for Internet of Things (IOT) Application in Smart Grid

A Hybrid Communication Architecture for Internet of Things (IOT) Application in Smart Grid A Hybrid Communication Architecture for Internet of Things (IOT) Application in Smart Grid Yijia Cao Hunan University, China 2014-10 10-21 OUTLINE 1 IOT Application in Smart Grid 2 3 Requirements for Communication

More information

Response Network Emerging from Simple Perturbation

Response Network Emerging from Simple Perturbation Journal of the Korean Physical Society, Vol 44, No 3, March 2004, pp 628 632 Response Network Emerging from Simple Perturbation S-W Son, D-H Kim, Y-Y Ahn and H Jeong Department of Physics, Korea Advanced

More information

Handling Multi Objectives of with Multi Objective Dynamic Particle Swarm Optimization

Handling Multi Objectives of with Multi Objective Dynamic Particle Swarm Optimization Handling Multi Objectives of with Multi Objective Dynamic Particle Swarm Optimization Richa Agnihotri #1, Dr. Shikha Agrawal #1, Dr. Rajeev Pandey #1 # Department of Computer Science Engineering, UIT,

More information

A Comparative Study of SVM Kernel Functions Based on Polynomial Coefficients and V-Transform Coefficients

A Comparative Study of SVM Kernel Functions Based on Polynomial Coefficients and V-Transform Coefficients www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 6 Issue 3 March 2017, Page No. 20765-20769 Index Copernicus value (2015): 58.10 DOI: 18535/ijecs/v6i3.65 A Comparative

More information

Performance Degradation Assessment and Fault Diagnosis of Bearing Based on EMD and PCA-SOM

Performance Degradation Assessment and Fault Diagnosis of Bearing Based on EMD and PCA-SOM Performance Degradation Assessment and Fault Diagnosis of Bearing Based on EMD and PCA-SOM Lu Chen and Yuan Hang PERFORMANCE DEGRADATION ASSESSMENT AND FAULT DIAGNOSIS OF BEARING BASED ON EMD AND PCA-SOM.

More information

Second Session (only if there should still be places available after the first one)

Second Session (only if there should still be places available after the first one) Ph.D course in Astrophysics Early Universe Physics Galaxies Stellar Evolution Gravitation Theory High Energy Astrophysics Large Scale Structure Relativistic Astrophysics Prof. Carlo Baccigalupi Astrophysics

More information

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 206) A Network Intrusion Detection System Architecture Based on Snort and Computational Intelligence Tao Liu, a, Da

More information

Mass Classification Method in Mammogram Using Fuzzy K-Nearest Neighbour Equality

Mass Classification Method in Mammogram Using Fuzzy K-Nearest Neighbour Equality Mass Classification Method in Mammogram Using Fuzzy K-Nearest Neighbour Equality Abstract: Mass classification of objects is an important area of research and application in a variety of fields. In this

More information

Fuzzy Intrusion Detection

Fuzzy Intrusion Detection Fuzzy Intrusion Detection John E. Dickerson, Jukka Juslin, Ourania Koukousoula, Julie A. Dickerson Electrical and Computer Engineering Department Iowa State University Ames, IA, USA {jedicker,juslin,koukouso,julied}@iastate.edu

More information

Community detection. Leonid E. Zhukov

Community detection. Leonid E. Zhukov Community detection Leonid E. Zhukov School of Data Analysis and Artificial Intelligence Department of Computer Science National Research University Higher School of Economics Network Science Leonid E.

More information

Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis

Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Keywords: Intelligent Next-Generation Firewall (ingfw), Unknown Threat, Abnormal Parameter, Abnormal Behavior,

More information

Anomaly Detection on Data Streams with High Dimensional Data Environment

Anomaly Detection on Data Streams with High Dimensional Data Environment Anomaly Detection on Data Streams with High Dimensional Data Environment Mr. D. Gokul Prasath 1, Dr. R. Sivaraj, M.E, Ph.D., 2 Department of CSE, Velalar College of Engineering & Technology, Erode 1 Assistant

More information

Multivariate Correlation Analysis based detection of DOS with Tracebacking

Multivariate Correlation Analysis based detection of DOS with Tracebacking 1 Multivariate Correlation Analysis based detection of DOS with Tracebacking Jasheeda P Student Department of CSE Kathir College of Engineering Coimbatore jashi108@gmail.com T.K.P.Rajagopal Associate Professor

More information

A Naïve Soft Computing based Approach for Gene Expression Data Analysis

A Naïve Soft Computing based Approach for Gene Expression Data Analysis Available online at www.sciencedirect.com Procedia Engineering 38 (2012 ) 2124 2128 International Conference on Modeling Optimization and Computing (ICMOC-2012) A Naïve Soft Computing based Approach for

More information

Salient Region Detection and Segmentation in Images using Dynamic Mode Decomposition

Salient Region Detection and Segmentation in Images using Dynamic Mode Decomposition Salient Region Detection and Segmentation in Images using Dynamic Mode Decomposition Sikha O K 1, Sachin Kumar S 2, K P Soman 2 1 Department of Computer Science 2 Centre for Computational Engineering and

More information

Contextual Co-occurrence Information for Object Representation and Categorization

Contextual Co-occurrence Information for Object Representation and Categorization Vol.8, No.1 (2015), pp.95-104 http://dx.doi.org/10.14257/ijdta.2015.8.1.11 Contextual Co-occurrence Information for Object Representation and Categorization 1 Soheila Sheikhbahaei and 2 Zahra Sadeghi 1

More information

Behavioral Analysis for Intrusion Resilience. Ahmed Fawaz Dec 6, 2016

Behavioral Analysis for Intrusion Resilience. Ahmed Fawaz Dec 6, 2016 Behavioral Analysis for Intrusion Resilience Ahmed Fawaz Dec 6, 2016 1 Recent Cyber Attacks on Private and Public Entities 2 Design for Resiliency Diverse Monitoring Secure Monitoring Monitoring Fusion

More information

Resource Usage Monitoring for Web Systems Using Real-time Statistical Analysis of Log Data

Resource Usage Monitoring for Web Systems Using Real-time Statistical Analysis of Log Data Resource Usage Monitoring for Web Systems Using Real- Statistical Analysis of Log Data MATSUKI YOSHINO, ATSURO HANDA Software Division, Hitachi Ltd. 53, Totsuka-cho, Totsuka-ku, Yokohama, 244-8555 JAPAN

More information

Deep Tensor: Eliciting New Insights from Graph Data that Express Relationships between People and Things

Deep Tensor: Eliciting New Insights from Graph Data that Express Relationships between People and Things Deep Tensor: Eliciting New Insights from Graph Data that Express Relationships between People and Things Koji Maruhashi An important problem in information and communications technology (ICT) is classifying

More information

Video Syntax Analysis

Video Syntax Analysis 1 Video Syntax Analysis Wei-Ta Chu 2008/10/9 Outline 2 Scene boundary detection Key frame selection 3 Announcement of HW #1 Shot Change Detection Goal: automatic shot change detection Requirements 1. Write

More information

European Network on New Sensing Technologies for Air Pollution Control and Environmental Sustainability - EuNetAir COST Action TD1105

European Network on New Sensing Technologies for Air Pollution Control and Environmental Sustainability - EuNetAir COST Action TD1105 European Network on New Sensing Technologies for Air Pollution Control and Environmental Sustainability - EuNetAir COST Action TD1105 A Holistic Approach in the Development and Deployment of WSN-based

More information

The Gene Modular Detection of Random Boolean Networks by Dynamic Characteristics Analysis

The Gene Modular Detection of Random Boolean Networks by Dynamic Characteristics Analysis Journal of Materials, Processing and Design (2017) Vol. 1, Number 1 Clausius Scientific Press, Canada The Gene Modular Detection of Random Boolean Networks by Dynamic Characteristics Analysis Xueyi Bai1,a,

More information

Gene Clustering & Classification

Gene Clustering & Classification BINF, Introduction to Computational Biology Gene Clustering & Classification Young-Rae Cho Associate Professor Department of Computer Science Baylor University Overview Introduction to Gene Clustering

More information

DDoS Attack Detection Using Moment in Statistics with Discriminant Analysis

DDoS Attack Detection Using Moment in Statistics with Discriminant Analysis DDoS Attack Detection Using Moment in Statistics with Discriminant Analysis Pradit Pitaksathienkul 1 and Pongpisit Wuttidittachotti 2 King Mongkut s University of Technology North Bangkok, Thailand 1 praditp9@gmail.com

More information

A graph theoretical approach for a multistep mapping software for the FACETS project

A graph theoretical approach for a multistep mapping software for the FACETS project A graph theoretical approach for a multistep mapping software for the FACETS project Karsten Wendt Technische Universität Dresden ETIT/IEE - HPSN D-01062 Dresden GERMANY wendt@iee.et.tu-dresden.de Matthias

More information

Image Segmentation Techniques for Object-Based Coding

Image Segmentation Techniques for Object-Based Coding Image Techniques for Object-Based Coding Junaid Ahmed, Joseph Bosworth, and Scott T. Acton The Oklahoma Imaging Laboratory School of Electrical and Computer Engineering Oklahoma State University {ajunaid,bosworj,sacton}@okstate.edu

More information

Neuromorphic Hardware. Adrita Arefin & Abdulaziz Alorifi

Neuromorphic Hardware. Adrita Arefin & Abdulaziz Alorifi Neuromorphic Hardware Adrita Arefin & Abdulaziz Alorifi Introduction Neuromorphic hardware uses the concept of VLSI systems consisting of electronic analog circuits to imitate neurobiological architecture

More information

Stability Assessment of Electric Power Systems using Growing Neural Gas and Self-Organizing Maps

Stability Assessment of Electric Power Systems using Growing Neural Gas and Self-Organizing Maps Stability Assessment of Electric Power Systems using Growing Gas and Self-Organizing Maps Christian Rehtanz, Carsten Leder University of Dortmund, 44221 Dortmund, Germany Abstract. Liberalized competitive

More information

Graph Theory. Graph Theory. COURSE: Introduction to Biological Networks. Euler s Solution LECTURE 1: INTRODUCTION TO NETWORKS.

Graph Theory. Graph Theory. COURSE: Introduction to Biological Networks. Euler s Solution LECTURE 1: INTRODUCTION TO NETWORKS. Graph Theory COURSE: Introduction to Biological Networks LECTURE 1: INTRODUCTION TO NETWORKS Arun Krishnan Koenigsberg, Russia Is it possible to walk with a route that crosses each bridge exactly once,

More information

Applying Supervised Learning

Applying Supervised Learning Applying Supervised Learning When to Consider Supervised Learning A supervised learning algorithm takes a known set of input data (the training set) and known responses to the data (output), and trains

More information

Efficient Image Compression of Medical Images Using the Wavelet Transform and Fuzzy c-means Clustering on Regions of Interest.

Efficient Image Compression of Medical Images Using the Wavelet Transform and Fuzzy c-means Clustering on Regions of Interest. Efficient Image Compression of Medical Images Using the Wavelet Transform and Fuzzy c-means Clustering on Regions of Interest. D.A. Karras, S.A. Karkanis and D. E. Maroulis University of Piraeus, Dept.

More information

Introduction to ANSYS DesignXplorer

Introduction to ANSYS DesignXplorer Lecture 4 14. 5 Release Introduction to ANSYS DesignXplorer 1 2013 ANSYS, Inc. September 27, 2013 s are functions of different nature where the output parameters are described in terms of the input parameters

More information

A Novel Technique for Finding Influential Nodes

A Novel Technique for Finding Influential Nodes A Novel Technique for Finding Influential Nodes Mini Singh Ahuja Department of Computer science, Guru Nanak Dev University, Regional Campus, Gurdaspur Abstract In complex networks there is a big issue

More information

CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION

CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION 5.1 INTRODUCTION Generally, deployment of Wireless Sensor Network (WSN) is based on a many

More information

COMPUTER FORENSICS (CFRS)

COMPUTER FORENSICS (CFRS) Computer Forensics (CFRS) 1 COMPUTER FORENSICS (CFRS) 500 Level Courses CFRS 500: Introduction to Forensic Technology and Analysis. 3 credits. Presents an overview of technologies of interest to forensics

More information

NETWORK FAULT DETECTION - A CASE FOR DATA MINING

NETWORK FAULT DETECTION - A CASE FOR DATA MINING NETWORK FAULT DETECTION - A CASE FOR DATA MINING Poonam Chaudhary & Vikram Singh Department of Computer Science Ch. Devi Lal University, Sirsa ABSTRACT: Parts of the general network fault management problem,

More information

Machine Learning in Biology

Machine Learning in Biology Università degli studi di Padova Machine Learning in Biology Luca Silvestrin (Dottorando, XXIII ciclo) Supervised learning Contents Class-conditional probability density Linear and quadratic discriminant

More information

Pattern Mining in Frequent Dynamic Subgraphs

Pattern Mining in Frequent Dynamic Subgraphs Pattern Mining in Frequent Dynamic Subgraphs Karsten M. Borgwardt, Hans-Peter Kriegel, Peter Wackersreuther Institute of Computer Science Ludwig-Maximilians-Universität Munich, Germany kb kriegel wackersr@dbs.ifi.lmu.de

More information

International Journal of Data Mining & Knowledge Management Process (IJDKP) Vol.7, No.3, May Dr.Zakea Il-Agure and Mr.Hicham Noureddine Itani

International Journal of Data Mining & Knowledge Management Process (IJDKP) Vol.7, No.3, May Dr.Zakea Il-Agure and Mr.Hicham Noureddine Itani LINK MINING PROCESS Dr.Zakea Il-Agure and Mr.Hicham Noureddine Itani Higher Colleges of Technology, United Arab Emirates ABSTRACT Many data mining and knowledge discovery methodologies and process models

More information

Level-By-Level Offset Based Wake up Pattern with Hybrid Data Gathering Protocol in a WSN

Level-By-Level Offset Based Wake up Pattern with Hybrid Data Gathering Protocol in a WSN Vol. 2, Special Issue 1, December 20 Level-By-Level Offset Based Wake up Pattern with Hybrid Data Gathering Protocol in a WSN Shilpa Alias 1, Simy M Baby 2 M. Tech Student, Dept. Applied Electronics, Ilahia

More information

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS Saulius Grusnys, Ingrida Lagzdinyte Kaunas University of Technology, Department of Computer Networks, Studentu 50,

More information

Comparative analysis of data mining methods for predicting credit default probabilities in a retail bank portfolio

Comparative analysis of data mining methods for predicting credit default probabilities in a retail bank portfolio Comparative analysis of data mining methods for predicting credit default probabilities in a retail bank portfolio Adela Ioana Tudor, Adela Bâra, Simona Vasilica Oprea Department of Economic Informatics

More information

Color-Based Classification of Natural Rock Images Using Classifier Combinations

Color-Based Classification of Natural Rock Images Using Classifier Combinations Color-Based Classification of Natural Rock Images Using Classifier Combinations Leena Lepistö, Iivari Kunttu, and Ari Visa Tampere University of Technology, Institute of Signal Processing, P.O. Box 553,

More information

Online Bad Data Detection for Synchrophasor Systems via Spatio-temporal Correlations

Online Bad Data Detection for Synchrophasor Systems via Spatio-temporal Correlations LOGO Online Bad Data Detection for Synchrophasor Systems via Spatio-temporal s Le Xie Texas A&M University NASPI International Synchrophasor Symposium March 24, 2016 Content 1 Introduction 2 Technical

More information

Big Data Challenges in Large IP Networks

Big Data Challenges in Large IP Networks Big Data Challenges in Large IP Networks Feature Extraction & Predictive Alarms for network management Wednesday 28 th Feb 2018 Dave Yearling British Telecommunications plc 2017 What we will cover Making

More information

ALTERNATIVES TO BETWEENNESS CENTRALITY: A MEASURE OF CORRELATION COEFFICIENT

ALTERNATIVES TO BETWEENNESS CENTRALITY: A MEASURE OF CORRELATION COEFFICIENT ALTERNATIVES TO BETWEENNESS CENTRALITY: A MEASURE OF CORRELATION COEFFICIENT Xiaojia He 1 and Natarajan Meghanathan 2 1 University of Georgia, GA, USA, 2 Jackson State University, MS, USA 2 natarajan.meghanathan@jsums.edu

More information

This shows a typical architecture that enterprises use to secure their networks: The network is divided into a number of segments Firewalls restrict

This shows a typical architecture that enterprises use to secure their networks: The network is divided into a number of segments Firewalls restrict 1 This shows a typical architecture that enterprises use to secure their networks: The network is divided into a number of segments Firewalls restrict access between segments This creates a layered defense

More information

Introductory Concepts for Voxel-Based Statistical Analysis

Introductory Concepts for Voxel-Based Statistical Analysis Introductory Concepts for Voxel-Based Statistical Analysis John Kornak University of California, San Francisco Department of Radiology and Biomedical Imaging Department of Epidemiology and Biostatistics

More information

AUTOMATED SECURITY ASSESSMENT AND MANAGEMENT OF THE ELECTRIC POWER GRID

AUTOMATED SECURITY ASSESSMENT AND MANAGEMENT OF THE ELECTRIC POWER GRID AUTOMATED SECURITY ASSESSMENT AND MANAGEMENT OF THE ELECTRIC POWER GRID Sherif Abdelwahed Department of Electrical and Computer Engineering Mississippi State University Autonomic Security Management Modern

More information

Extracting Information from Complex Networks

Extracting Information from Complex Networks Extracting Information from Complex Networks 1 Complex Networks Networks that arise from modeling complex systems: relationships Social networks Biological networks Distinguish from random networks uniform

More information

Link-Based Wormhole Detection in Wireless Sensor Networks

Link-Based Wormhole Detection in Wireless Sensor Networks Link-Based Wormhole Detection in Wireless Sensor Networks Xiaoyuan Zhou, Lijun Chen National Key Laboratory for Novel Software Technology Nanjing University Nanjing, P.R. China, 2123 zxy@smail.nju.edu.cn,

More information

An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks

An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks December 1. 2006 Jong Oh Choi Department of Computer Science Yonsei University jochoi@emerald.yonsei.ac.kr Contents Motivation

More information

Structural Analysis of Paper Citation and Co-Authorship Networks using Network Analysis Techniques

Structural Analysis of Paper Citation and Co-Authorship Networks using Network Analysis Techniques Structural Analysis of Paper Citation and Co-Authorship Networks using Network Analysis Techniques Kouhei Sugiyama, Hiroyuki Ohsaki and Makoto Imase Graduate School of Information Science and Technology,

More information

Failure in Complex Social Networks

Failure in Complex Social Networks Journal of Mathematical Sociology, 33:64 68, 2009 Copyright # Taylor & Francis Group, LLC ISSN: 0022-250X print/1545-5874 online DOI: 10.1080/00222500802536988 Failure in Complex Social Networks Damon

More information

C. Poultney S. Cho pra (NYU Courant Institute) Y. LeCun

C. Poultney S. Cho pra (NYU Courant Institute) Y. LeCun Efficient Learning of Sparse Overcomplete Representations with an Energy-Based Model Marc'Aurelio Ranzato C. Poultney S. Cho pra (NYU Courant Institute) Y. LeCun CIAR Summer School Toronto 2006 Why Extracting

More information

Nick Hamilton Institute for Molecular Bioscience. Essential Graph Theory for Biologists. Image: Matt Moores, The Visible Cell

Nick Hamilton Institute for Molecular Bioscience. Essential Graph Theory for Biologists. Image: Matt Moores, The Visible Cell Nick Hamilton Institute for Molecular Bioscience Essential Graph Theory for Biologists Image: Matt Moores, The Visible Cell Outline Core definitions Which are the most important bits? What happens when

More information

Intelligent Network Management Using Graph Differential Anomaly Visualization Qi Liao

Intelligent Network Management Using Graph Differential Anomaly Visualization Qi Liao Intelligent Network Management Using Graph Differential Anomaly Visualization Qi Liao Network Management What is going on in the network? Public servers Private servers Wireless Users DMZ Applications

More information

Sparse Models in Image Understanding And Computer Vision

Sparse Models in Image Understanding And Computer Vision Sparse Models in Image Understanding And Computer Vision Jayaraman J. Thiagarajan Arizona State University Collaborators Prof. Andreas Spanias Karthikeyan Natesan Ramamurthy Sparsity Sparsity of a vector

More information

UMOBILE ACM ICN 2017 Tutorial Opportunistic wireless aspects in NDN

UMOBILE ACM ICN 2017 Tutorial Opportunistic wireless aspects in NDN UMOBILE ACM ICN 2017 Tutorial Opportunistic wireless aspects in NDN ACM ICN 2017 Berlin 26.09.2017 Paulo Mendes, COPELABS / University Lusofona (paulo.mendes@ulusofona.pt) Omar Aponte, COPELABS / University

More information

Image Inpainting Using Sparsity of the Transform Domain

Image Inpainting Using Sparsity of the Transform Domain Image Inpainting Using Sparsity of the Transform Domain H. Hosseini*, N.B. Marvasti, Student Member, IEEE, F. Marvasti, Senior Member, IEEE Advanced Communication Research Institute (ACRI) Department of

More information

Evolutionary Algorithm Approaches for Detecting Computer Network Intrusion (Extended Abstract)

Evolutionary Algorithm Approaches for Detecting Computer Network Intrusion (Extended Abstract) Evolutionary Algorithm Approaches for Detecting Computer Network Intrusion (Extended Abstract) Kevin P. Anchor, Paul D. Williams, Gregg H. Gunsch, and Gary B. Lamont Department of Electrical and Computer

More information

FCA-based Search for Duplicate objects in Ontologies

FCA-based Search for Duplicate objects in Ontologies FCA-based Search for Duplicate objects in Ontologies Dmitry A. Ilvovsky and Mikhail A. Klimushkin National Research University Higher School of Economics, School of Applied Mathematics and Informational

More information

Variable Selection 6.783, Biomedical Decision Support

Variable Selection 6.783, Biomedical Decision Support 6.783, Biomedical Decision Support (lrosasco@mit.edu) Department of Brain and Cognitive Science- MIT November 2, 2009 About this class Why selecting variables Approaches to variable selection Sparsity-based

More information

Introduction to Data Mining

Introduction to Data Mining Introduction to JULY 2011 Afsaneh Yazdani What motivated? Wide availability of huge amounts of data and the imminent need for turning such data into useful information and knowledge What motivated? Data

More information