Biomonitoring, Phylogenetics and Anomaly Aggregation Systems

  • David R. B. Stockwell
  • Jason T. L. Wang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3495)

Abstract

While some researchers have exploited the similarity between cyber attacks and epidemics we believe there is also potential to leverage considerable experience gained in other biological domains: phylogenetics, ecological niche modeling, and biomonitoring. Here we describe some new ideas for threat detection from biomonitoring, and approximate graph searching and matching for cross network aggregation. Generic anomaly aggregation systems using these methods could detect and model the inheritance and evolution of vulnerability and threats across multiple domains and time scales.

Keywords

West Nile Virus Anomaly Detection Intrusion Detection System Local Outlier Factor Threat Detection 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Staniford, S., Paxson, V., Weaver, N.: How to 0wn the Internet in Your Spare Time. In: Proceedings of the 11th USENIX Security Symposium, Security 2002 (2002)Google Scholar
  2. 2.
    Linke, S., Norris, R.H., Faith, D.P., Stockwell, D.: ANNA: A new prediction method for bioassessment programs. Freshw. Biol. (in press)Google Scholar
  3. 3.
    Linke, S., Norris, R., Faith, D.P.: Australian River Assessment System: Improving AusRivAS Analytical Methods DDRAM and E-Ball (Phase I Final Report). Commonwealth of Australia, Canberra and University of Canberra, Canberra (2002)Google Scholar
  4. 4.
    Stockwell, D.R.B., Noble, I.R.: Induction Of Sets Of Rules From Animal Distribution Data - A Robust And Informative Method Of Data-Analysis. Mathematics And Computers In Simulation 33, 385–390 (1992)CrossRefGoogle Scholar
  5. 5.
    Peterson, A.T.: Predicting the geography of species’ invasions via ecological niche modeling. Q Rev. Biol. 78, 419–433 (2003)CrossRefGoogle Scholar
  6. 6.
    Erasmus, B., Van Jaarsveld, A., Chown, S., Kshatriya, M., Wessels, K.: Vulnerability of South African animal taxa to climate change. Glob. Ch. Biol. 8, 679–693 (2002)CrossRefGoogle Scholar
  7. 7.
    Peterson, A.T., Vieglais, D.A., Andreasen, J.K.: Migratory birds modeled as critical transport agents for West Nile Virus in North America. Vector Borne Zoonotic Dis. 3, 27–37 (2003)CrossRefGoogle Scholar
  8. 8.
    Costa, J., Peterson, A.T., Beard, C.B.: Ecologic niche modeling and differentiation of populations of Triatoma brasiliensis neiva, 1911, the most important Chagas’ disease vector in northeastern Brazil (hemiptera, reduviidae, triatominae). Am. J. Trop. Med. Hyg. 67, 516–520 (2002)Google Scholar
  9. 9.
    Peterson, A.T., Bauer, J.T., Mills, J.N.: Ecologic and geographic distribution of filovirus disease. Emerg. Infect. Dis. 10, 40–47 (2004)Google Scholar
  10. 10.
    Levine, R.S., Peterson, A.T., Benedict, M.Q.: Distribution of members of Anopheles quadrimaculatus say s.l (Diptera: Culicidae) and implications for their roles in malaria transmission in the United States. J. Med. Entomol. 41, 607–613 (2004)CrossRefGoogle Scholar
  11. 11.
    Levine, R.S., Peterson, A.T., Benedict, M.Q.: Geographic and ecologic distributions of the Anopheles gambiae complex predicted using a genetic algorithm. Am. J. Trop. Med. Hyg. 70, 105–109 (2004)Google Scholar
  12. 12.
    Beard, C., Pye, G., Steurer, F., Rodriguez, R., Campman, R., Peterson, A., Ramsey, J., Wirtz, R., Robinson, L.: Chagas disease in a domestic transmission cycle in southern Texas, USA. Emerg. Infect. Dis. 9, 103–105 (2003)Google Scholar
  13. 13.
    Shasha, D., Wang, J.T.L., Zhang, S.: Unordered Tree Mining with Applications to Phylogeny. In: Proceedings of the 20th International Conference on Data Engineering, Boston, Massachusetts (2004)Google Scholar
  14. 14.
    Shasha, D., Wang, J.T.L., Shan, H., Zhang, K.: ATreeGrep: Approximate Searching in Unordered Trees. In: Proceedings of the 14th International Conference on Scientific and Statistical Database Management, Edinburgh, Scotland (2002)Google Scholar
  15. 15.
    Wang, J.T.L., Zhang, K., Chang, G., Shasha, D.: Finding Approximate Patterns in Undirected Acyclic Graphs. Pattern Recogn. 35, 473–483 (2002)MATHCrossRefGoogle Scholar
  16. 16.
    Shasha, D., Wang, J.T.L., Giugno, R.: Algorithmics and Applications of Tree and Graph Searching. In: Proceedings of the 21st ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, Madison, Wisconsin (2002)Google Scholar
  17. 17.
    Vatis, M.: Cyber Attacks During the War on Terrorism: A Predictive Analysis. Dartmouth College (2001)Google Scholar
  18. 18.
    Caswell, B., Roesch, M.: SNORT Intrusion Detection System (2004)Google Scholar
  19. 19.
    CAIDA: Center for Internet Security (2003)Google Scholar
  20. 20.
    Ertoz, L., Eilertson, E., Lazarevic, A., Tan, P., Srivastava, J., Kumar, V., Dokas, P.: The MINDS - Minnesota Intrusion Detection System: Next Generation Data Mining. MIT Press, Cambridge (2004)Google Scholar
  21. 21.
    Lazarevic, A., Ertoz, L., Ozgur, A., Srivastava, J., Kumar, V.: A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection. In: Proceedings of Third SIAM Conference on Data Mining, San Francisco (2003)Google Scholar
  22. 22.
    Clarke, R., Furse, M., Wright, J., Moss, D.: Derivation of a biological quality index for river sites: Comparison of the observed with the expected fauna. J. Appl. Stats. 23, 311–332 (1996)CrossRefGoogle Scholar
  23. 23.
    Clarke, R., Wright, J., Furse, M.: RIVPACS models for predicting the expected macroinvertebrate fauna and assessing the ecological quality of rivers. Ecol. Model. 160, 219–233 (2003)CrossRefGoogle Scholar
  24. 24.
    Faith, D., Dostine, P., Humphrey, C.: Detection of moning impacts of aquatic macroinvertebrate communities - results of a disturbance experiment and the design of a multivariate BACIP monitoring program at Coronation Hill, Northern Territory. Aust. J. Ecol. 20, 167–180 (1995)CrossRefGoogle Scholar
  25. 25.
    Humphrey, C., Faith, D., Dostine, P.: Base-line rquirements for assessment of moining impact using biological monitoring. Aust. J. Ecol. 20, 150–166 (1995)CrossRefGoogle Scholar
  26. 26.
    Stockwell, D.R.B., Faith, D.P.: Investigation of alternative approaches to linking habitat variables with site classification in a RIVPACS model - Final Report (1996)Google Scholar
  27. 27.
    Eubank, S., Kumar, V.S.A., Marathe, M.V., Srinivasan, A., Wang, N.: Structural and algorithmic aspects of massive social networks. In: Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms, New Orleans, Louisiana (2004)Google Scholar
  28. 28.
    Moret, B.M.E., Nakhleh, L., Warnow, T., Linder, C.R., Tholse, A., Padolina, A., Sun, J., Timme, R.: Phylogenetic networks: modeling, reconstructibility, and accuracy. IEEE/ACM Transactions on Computational Biology and Bioinformatics 1, 13–23 (2004)CrossRefGoogle Scholar
  29. 29.
    Wang, J.T.L., Shapiro, B.A., Shasha, D., Zhang, K., Currey, K.M.: An Algorithm for Finding the Largest Approximately Common Substructures of Two Trees. IEEE Transactions on Pattern Analysis and Machine Intelligence 20, 889–895 (1998)CrossRefGoogle Scholar
  30. 30.
    Wang, J.T.L., Zhang, K.: Information Sciences 126, 165–189 (2000)Google Scholar
  31. 31.
    Wang, J.T.L., Zhang, K.: Finding Similar Consensus between Trees: An Algorithm and a Distance Hierarchy. Pattern Recogn. 34, 127–137 (2001)MATHCrossRefGoogle Scholar
  32. 32.
    Wang, J.T.L., Zhang, K., Chirn, G.-W.: Algorithms for Approximate Graph Matching. Information Sciences 82, 45–74 (1995)MATHCrossRefMathSciNetGoogle Scholar
  33. 33.
    Zhang, K., Wang, J.T.L., Shasha, D.: On the Editing Distance between Undirected Acyclic Graphs. International Journal of Foundations of Computer Science 7, 43–57 (1996)MATHCrossRefGoogle Scholar
  34. 34.
    Cook, D.J., Holder, L.B.: Graph-Based Data Mining. IEEE Intelligent Systems 15, 32–41 (2000)Google Scholar
  35. 35.
    Wang, J.T.L., Zaki, M.J., Toivonen, H.T.T., Shasha, D.: Data Mining in Bioinformatics. Springer, London (2004)Google Scholar
  36. 36.
    Whitney, A.: K programming language (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • David R. B. Stockwell
    • 1
  • Jason T. L. Wang
    • 2
  1. 1.San Diego Supercomputer CenterUniversity of California San DiegoLa Jolla
  2. 2.Department of Computer ScienceNew Jersey Institute of TechnologyNewark

Personalised recommendations