ISI 2005: Intelligence and Security Informatics pp 523-529 | Cite as
Biomonitoring, Phylogenetics and Anomaly Aggregation Systems
Conference paper
Abstract
While some researchers have exploited the similarity between cyber attacks and epidemics we believe there is also potential to leverage considerable experience gained in other biological domains: phylogenetics, ecological niche modeling, and biomonitoring. Here we describe some new ideas for threat detection from biomonitoring, and approximate graph searching and matching for cross network aggregation. Generic anomaly aggregation systems using these methods could detect and model the inheritance and evolution of vulnerability and threats across multiple domains and time scales.
Keywords
West Nile Virus Anomaly Detection Intrusion Detection System Local Outlier Factor Threat Detection
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Preview
Unable to display preview. Download preview PDF.
References
- 1.Staniford, S., Paxson, V., Weaver, N.: How to 0wn the Internet in Your Spare Time. In: Proceedings of the 11th USENIX Security Symposium, Security 2002 (2002)Google Scholar
- 2.Linke, S., Norris, R.H., Faith, D.P., Stockwell, D.: ANNA: A new prediction method for bioassessment programs. Freshw. Biol. (in press)Google Scholar
- 3.Linke, S., Norris, R., Faith, D.P.: Australian River Assessment System: Improving AusRivAS Analytical Methods DDRAM and E-Ball (Phase I Final Report). Commonwealth of Australia, Canberra and University of Canberra, Canberra (2002)Google Scholar
- 4.Stockwell, D.R.B., Noble, I.R.: Induction Of Sets Of Rules From Animal Distribution Data - A Robust And Informative Method Of Data-Analysis. Mathematics And Computers In Simulation 33, 385–390 (1992)CrossRefGoogle Scholar
- 5.Peterson, A.T.: Predicting the geography of species’ invasions via ecological niche modeling. Q Rev. Biol. 78, 419–433 (2003)CrossRefGoogle Scholar
- 6.Erasmus, B., Van Jaarsveld, A., Chown, S., Kshatriya, M., Wessels, K.: Vulnerability of South African animal taxa to climate change. Glob. Ch. Biol. 8, 679–693 (2002)CrossRefGoogle Scholar
- 7.Peterson, A.T., Vieglais, D.A., Andreasen, J.K.: Migratory birds modeled as critical transport agents for West Nile Virus in North America. Vector Borne Zoonotic Dis. 3, 27–37 (2003)CrossRefGoogle Scholar
- 8.Costa, J., Peterson, A.T., Beard, C.B.: Ecologic niche modeling and differentiation of populations of Triatoma brasiliensis neiva, 1911, the most important Chagas’ disease vector in northeastern Brazil (hemiptera, reduviidae, triatominae). Am. J. Trop. Med. Hyg. 67, 516–520 (2002)Google Scholar
- 9.Peterson, A.T., Bauer, J.T., Mills, J.N.: Ecologic and geographic distribution of filovirus disease. Emerg. Infect. Dis. 10, 40–47 (2004)Google Scholar
- 10.Levine, R.S., Peterson, A.T., Benedict, M.Q.: Distribution of members of Anopheles quadrimaculatus say s.l (Diptera: Culicidae) and implications for their roles in malaria transmission in the United States. J. Med. Entomol. 41, 607–613 (2004)CrossRefGoogle Scholar
- 11.Levine, R.S., Peterson, A.T., Benedict, M.Q.: Geographic and ecologic distributions of the Anopheles gambiae complex predicted using a genetic algorithm. Am. J. Trop. Med. Hyg. 70, 105–109 (2004)Google Scholar
- 12.Beard, C., Pye, G., Steurer, F., Rodriguez, R., Campman, R., Peterson, A., Ramsey, J., Wirtz, R., Robinson, L.: Chagas disease in a domestic transmission cycle in southern Texas, USA. Emerg. Infect. Dis. 9, 103–105 (2003)Google Scholar
- 13.Shasha, D., Wang, J.T.L., Zhang, S.: Unordered Tree Mining with Applications to Phylogeny. In: Proceedings of the 20th International Conference on Data Engineering, Boston, Massachusetts (2004)Google Scholar
- 14.Shasha, D., Wang, J.T.L., Shan, H., Zhang, K.: ATreeGrep: Approximate Searching in Unordered Trees. In: Proceedings of the 14th International Conference on Scientific and Statistical Database Management, Edinburgh, Scotland (2002)Google Scholar
- 15.Wang, J.T.L., Zhang, K., Chang, G., Shasha, D.: Finding Approximate Patterns in Undirected Acyclic Graphs. Pattern Recogn. 35, 473–483 (2002)MATHCrossRefGoogle Scholar
- 16.Shasha, D., Wang, J.T.L., Giugno, R.: Algorithmics and Applications of Tree and Graph Searching. In: Proceedings of the 21st ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, Madison, Wisconsin (2002)Google Scholar
- 17.Vatis, M.: Cyber Attacks During the War on Terrorism: A Predictive Analysis. Dartmouth College (2001)Google Scholar
- 18.Caswell, B., Roesch, M.: SNORT Intrusion Detection System (2004)Google Scholar
- 19.CAIDA: Center for Internet Security (2003)Google Scholar
- 20.Ertoz, L., Eilertson, E., Lazarevic, A., Tan, P., Srivastava, J., Kumar, V., Dokas, P.: The MINDS - Minnesota Intrusion Detection System: Next Generation Data Mining. MIT Press, Cambridge (2004)Google Scholar
- 21.Lazarevic, A., Ertoz, L., Ozgur, A., Srivastava, J., Kumar, V.: A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection. In: Proceedings of Third SIAM Conference on Data Mining, San Francisco (2003)Google Scholar
- 22.Clarke, R., Furse, M., Wright, J., Moss, D.: Derivation of a biological quality index for river sites: Comparison of the observed with the expected fauna. J. Appl. Stats. 23, 311–332 (1996)CrossRefGoogle Scholar
- 23.Clarke, R., Wright, J., Furse, M.: RIVPACS models for predicting the expected macroinvertebrate fauna and assessing the ecological quality of rivers. Ecol. Model. 160, 219–233 (2003)CrossRefGoogle Scholar
- 24.Faith, D., Dostine, P., Humphrey, C.: Detection of moning impacts of aquatic macroinvertebrate communities - results of a disturbance experiment and the design of a multivariate BACIP monitoring program at Coronation Hill, Northern Territory. Aust. J. Ecol. 20, 167–180 (1995)CrossRefGoogle Scholar
- 25.Humphrey, C., Faith, D., Dostine, P.: Base-line rquirements for assessment of moining impact using biological monitoring. Aust. J. Ecol. 20, 150–166 (1995)CrossRefGoogle Scholar
- 26.Stockwell, D.R.B., Faith, D.P.: Investigation of alternative approaches to linking habitat variables with site classification in a RIVPACS model - Final Report (1996)Google Scholar
- 27.Eubank, S., Kumar, V.S.A., Marathe, M.V., Srinivasan, A., Wang, N.: Structural and algorithmic aspects of massive social networks. In: Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms, New Orleans, Louisiana (2004)Google Scholar
- 28.Moret, B.M.E., Nakhleh, L., Warnow, T., Linder, C.R., Tholse, A., Padolina, A., Sun, J., Timme, R.: Phylogenetic networks: modeling, reconstructibility, and accuracy. IEEE/ACM Transactions on Computational Biology and Bioinformatics 1, 13–23 (2004)CrossRefGoogle Scholar
- 29.Wang, J.T.L., Shapiro, B.A., Shasha, D., Zhang, K., Currey, K.M.: An Algorithm for Finding the Largest Approximately Common Substructures of Two Trees. IEEE Transactions on Pattern Analysis and Machine Intelligence 20, 889–895 (1998)CrossRefGoogle Scholar
- 30.Wang, J.T.L., Zhang, K.: Information Sciences 126, 165–189 (2000)Google Scholar
- 31.Wang, J.T.L., Zhang, K.: Finding Similar Consensus between Trees: An Algorithm and a Distance Hierarchy. Pattern Recogn. 34, 127–137 (2001)MATHCrossRefGoogle Scholar
- 32.Wang, J.T.L., Zhang, K., Chirn, G.-W.: Algorithms for Approximate Graph Matching. Information Sciences 82, 45–74 (1995)MATHCrossRefMathSciNetGoogle Scholar
- 33.Zhang, K., Wang, J.T.L., Shasha, D.: On the Editing Distance between Undirected Acyclic Graphs. International Journal of Foundations of Computer Science 7, 43–57 (1996)MATHCrossRefGoogle Scholar
- 34.Cook, D.J., Holder, L.B.: Graph-Based Data Mining. IEEE Intelligent Systems 15, 32–41 (2000)Google Scholar
- 35.Wang, J.T.L., Zaki, M.J., Toivonen, H.T.T., Shasha, D.: Data Mining in Bioinformatics. Springer, London (2004)Google Scholar
- 36.Whitney, A.: K programming language (2004)Google Scholar
Copyright information
© Springer-Verlag Berlin Heidelberg 2005