Skip to main content

Novelty Detection Using Elliptical Fuzzy Clustering in a Reproducing Kernel Hilbert Space

  • Conference paper
  • First Online:
Book cover Intelligent Data Engineering and Automated Learning – IDEAL 2018 (IDEAL 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11315))

Abstract

Nowadays novelty detection methods based on one-class classification are widely used for many important applications associated with computer and information security. In these areas, there is a need to detect anomalies in complex high-dimensional data. An effective approach for analyzing such data uses kernels that map the input feature space into a reproducing kernel Hilbert space (RKHS) for further outlier detection. The most popular methods of this type are support vector clustering (SVC) and kernel principle component analysis (KPCA). However, they have some drawbacks related to the shape and the position of contours they build in the RKHS. To overcome the disadvantages a new algorithm based on fuzzy clustering with Mahalanobis distance in the RKHS is proposed in this paper. Unlike SVC and KPCA it simultaneously builds elliptic contours and finds optimal center in the RKHS. The proposed method outperforms SVC and KPCA in such important security related problems as user authentication based on keystroke dynamics and detecting online extremist information on web forums.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kazachuk, M., et al.: One-class models for continuous authentication based on keystroke dynamics. In: Yin, H., et al. (eds.) IDEAL 2016. LNCS, vol. 9937, pp. 416–425. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-46257-8_45

    Chapter  Google Scholar 

  2. Ngai, E.W., Hu, Y., Wong, Y.H., Chen, Y., Sun, X.: The application of data mining techniques in financial fraud detection: a classification framework and an academic review of literature. Decis. Support Syst. 50(3), 559–569 (2011)

    Article  Google Scholar 

  3. Petrovskiy, M., Tsarev, D., Pospelova, I.: Pattern based information retrieval approach to discover extremist information on the internet. In: Ghosh, A., Pal, R., Prasath, R. (eds.) MIKE 2017. LNCS (LNAI), vol. 10682, pp. 240–249. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-71928-3_24

    Chapter  Google Scholar 

  4. Ben-Hur, A., Horn, D., Siegelmann, H.T., Vapnik, V.: Support vector clustering. J. Mach. Learn. Res. 2(Dec), 125–137 (2001)

    Google Scholar 

  5. Hoffmann, H.: Kernel PCA for novelty detection. Pattern Recogn. 40(3), 863–874 (2007)

    Article  Google Scholar 

  6. Scholkopf, B., Williamson, R.C., Smola, A.J., Shawe-Taylor, J., Platt, J.C.: Support vector method for novelty detection. In: Advances in Neural Information Processing Systems, pp. 582–588 (2000)

    Google Scholar 

  7. Petrovskiy, M.: A fuzzy kernel-based method for real-time network intrusion detection. In: Böhme, T., Heyer, G., Unger, H. (eds.) IICS 2003. LNCS, vol. 2877, pp. 189–200. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-39884-4_16

    Chapter  Google Scholar 

  8. Monaco, J.V., Bakelman, N., Cha, S.H., Tappert, C.C.: Developing a keystroke biometric system for continual authentication of computer users. In: 2012 European Intelligence and Security Informatics Conference (EISIC), pp. 210–216. IEEE (2012)

    Google Scholar 

  9. Tappert, C.C., Cha, S., Villani, M., Zack, R.S.: Keystroke biometric identification and authentication on long-text input. Int. J. Inf. Secur. Priv. (IJISP) 4, 32–60 (2010)

    Google Scholar 

  10. Zhang, Y., Zeng, S., Fan, L., Dang, Y., Larson, C.A., Chen, H.: Dark web forums portal: searching and analyzing jihadist forums. In: IEEE International Conference on Intelligence and Security Informatics, pp. 71–76. IEEE (2009)

    Google Scholar 

  11. The 20 Newsgroups data set. http://people.csail.mit.edu/jrennie/20Newsgroups/. Accessed 18 Aug 2017

Download references

Acknowledgements

The research is supported by RFFI Grant 16-29-09555.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mikhail Petrovskiy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kazachuk, M., Petrovskiy, M., Mashechkin, I., Gorohov, O. (2018). Novelty Detection Using Elliptical Fuzzy Clustering in a Reproducing Kernel Hilbert Space. In: Yin, H., Camacho, D., Novais, P., Tallón-Ballesteros, A. (eds) Intelligent Data Engineering and Automated Learning – IDEAL 2018. IDEAL 2018. Lecture Notes in Computer Science(), vol 11315. Springer, Cham. https://doi.org/10.1007/978-3-030-03496-2_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-03496-2_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-03495-5

  • Online ISBN: 978-3-030-03496-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics