A SVM-Based Behavior Monitoring Algorithm towards Detection of Un-desired Events in Critical Infrastructures

  • Y. Jiang
  • J. Jiang
  • P. Capodieci
Conference paper
Part of the Advances in Intelligent and Soft Computing book series (AINSC, volume 63)


In this paper, we report our recent research activities under MICIE, a European project funded under Framework-7 Programme, in which a SVM-based behavior modeling and learning algorithm is described. The proposed algorithm further exploits the adapted learning capability in SVM by using statistics analysis and K-S test verification to introduce an automated parameter control mechanism, and hence the SVM learning and detection can be made adaptive to the statistics of the input data. Experiments on telecommunication network data sets support that the proposed algorithm is able to detect undesired events effectively, presenting a good potential for development of computer-aided monitoring software tools for protection of critical infrastructures.


Outlier Detection Anomaly Detection Critical Infrastructure Information Communication Technology Network Traffic Data 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
  2. 2.
    Patcha, A., Park, J.-M.: An overview of anomaly detection techniques: Existing solutions and latest technological trends. Computer Networks 51, 3448–3470 (2007)CrossRefGoogle Scholar
  3. 3.
    Rajasegarar, S., Leckie, C., Palaniswami, M.: Anomaly detection in wireless sen-sor networks. IEEE Wireless Communications (August 2008)Google Scholar
  4. 4.
    Han, S.-J., Cho, S.-B.: Evolutionary Neural Networks for Anomaly Detection Based on the Behavior of a Program. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics 36(3) (2006)Google Scholar
  5. 5.
    Muthuraman, S., Jiang, J.: Anomaly detection in telecommunication network performance data. In: Proceedings of the 2007 International Conference on Artificial Intelligence, Monte Carlo Resort, Las Vegas, Nevada, USA (June 2007)Google Scholar
  6. 6.
    Shon, T., Moon, J.: A hybrid machine learning approach to network anomaly detection. Information Sciences 177, 3799–3821 (2007)CrossRefGoogle Scholar
  7. 7.
    Manevitz, L.M., Yousef, M.: One-Class SVMs for document classification. Journal of Machine Learning Research 2, 139–154 (2001)CrossRefGoogle Scholar
  8. 8.
    Keerthi, S.S., Lin, C.J.: Asymptotic behaviors of support vector machines with Gaussian Kernel. Neural Computation 15(7), 1667–1689 (2003)zbMATHCrossRefGoogle Scholar
  9. 9.
    Schölkopf, B., Williamson, R., et al.: Support vector method for novelty detection. In: Neural Information processing Systems, pp. 582–588. MIT Press, Cambridge (2000)Google Scholar
  10. 10.
    Li, Y., Jiang, J.: Combination of SVM knowledge for microcalcification de-tection in digital mammograms. LNCS, vol. 317, pp. 359–365. Springer, Heidelberg (2004)Google Scholar
  11. 11.
    Kalatzis, I., Piliouras, N., et al.: Comparative evaluation of probabilistic neural network versus support vector machines classifiers in discriminating EPR signals of depressive patients from healthy control. In: Image and Signal Processing and Analysis, ISPA 2003, September 18-20, vol. 2, pp. 981–985 (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Y. Jiang
    • 1
  • J. Jiang
    • 1
  • P. Capodieci
    • 2
  1. 1.Digital Media & Systems Research InstituteUniversity of BradfordUK
  2. 2.Selex Communications S.p.AItaly

Personalised recommendations