Skip to main content

Biomonitoring, Phylogenetics and Anomaly Aggregation Systems

  • Conference paper
  • 4005 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3495))

Abstract

While some researchers have exploited the similarity between cyber attacks and epidemics we believe there is also potential to leverage considerable experience gained in other biological domains: phylogenetics, ecological niche modeling, and biomonitoring. Here we describe some new ideas for threat detection from biomonitoring, and approximate graph searching and matching for cross network aggregation. Generic anomaly aggregation systems using these methods could detect and model the inheritance and evolution of vulnerability and threats across multiple domains and time scales.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Staniford, S., Paxson, V., Weaver, N.: How to 0wn the Internet in Your Spare Time. In: Proceedings of the 11th USENIX Security Symposium, Security 2002 (2002)

    Google Scholar 

  2. Linke, S., Norris, R.H., Faith, D.P., Stockwell, D.: ANNA: A new prediction method for bioassessment programs. Freshw. Biol. (in press)

    Google Scholar 

  3. Linke, S., Norris, R., Faith, D.P.: Australian River Assessment System: Improving AusRivAS Analytical Methods DDRAM and E-Ball (Phase I Final Report). Commonwealth of Australia, Canberra and University of Canberra, Canberra (2002)

    Google Scholar 

  4. Stockwell, D.R.B., Noble, I.R.: Induction Of Sets Of Rules From Animal Distribution Data - A Robust And Informative Method Of Data-Analysis. Mathematics And Computers In Simulation 33, 385–390 (1992)

    Article  Google Scholar 

  5. Peterson, A.T.: Predicting the geography of species’ invasions via ecological niche modeling. Q Rev. Biol. 78, 419–433 (2003)

    Article  Google Scholar 

  6. Erasmus, B., Van Jaarsveld, A., Chown, S., Kshatriya, M., Wessels, K.: Vulnerability of South African animal taxa to climate change. Glob. Ch. Biol. 8, 679–693 (2002)

    Article  Google Scholar 

  7. Peterson, A.T., Vieglais, D.A., Andreasen, J.K.: Migratory birds modeled as critical transport agents for West Nile Virus in North America. Vector Borne Zoonotic Dis. 3, 27–37 (2003)

    Article  Google Scholar 

  8. Costa, J., Peterson, A.T., Beard, C.B.: Ecologic niche modeling and differentiation of populations of Triatoma brasiliensis neiva, 1911, the most important Chagas’ disease vector in northeastern Brazil (hemiptera, reduviidae, triatominae). Am. J. Trop. Med. Hyg. 67, 516–520 (2002)

    Google Scholar 

  9. Peterson, A.T., Bauer, J.T., Mills, J.N.: Ecologic and geographic distribution of filovirus disease. Emerg. Infect. Dis. 10, 40–47 (2004)

    Google Scholar 

  10. Levine, R.S., Peterson, A.T., Benedict, M.Q.: Distribution of members of Anopheles quadrimaculatus say s.l (Diptera: Culicidae) and implications for their roles in malaria transmission in the United States. J. Med. Entomol. 41, 607–613 (2004)

    Article  Google Scholar 

  11. Levine, R.S., Peterson, A.T., Benedict, M.Q.: Geographic and ecologic distributions of the Anopheles gambiae complex predicted using a genetic algorithm. Am. J. Trop. Med. Hyg. 70, 105–109 (2004)

    Google Scholar 

  12. Beard, C., Pye, G., Steurer, F., Rodriguez, R., Campman, R., Peterson, A., Ramsey, J., Wirtz, R., Robinson, L.: Chagas disease in a domestic transmission cycle in southern Texas, USA. Emerg. Infect. Dis. 9, 103–105 (2003)

    Google Scholar 

  13. Shasha, D., Wang, J.T.L., Zhang, S.: Unordered Tree Mining with Applications to Phylogeny. In: Proceedings of the 20th International Conference on Data Engineering, Boston, Massachusetts (2004)

    Google Scholar 

  14. Shasha, D., Wang, J.T.L., Shan, H., Zhang, K.: ATreeGrep: Approximate Searching in Unordered Trees. In: Proceedings of the 14th International Conference on Scientific and Statistical Database Management, Edinburgh, Scotland (2002)

    Google Scholar 

  15. Wang, J.T.L., Zhang, K., Chang, G., Shasha, D.: Finding Approximate Patterns in Undirected Acyclic Graphs. Pattern Recogn. 35, 473–483 (2002)

    Article  MATH  Google Scholar 

  16. Shasha, D., Wang, J.T.L., Giugno, R.: Algorithmics and Applications of Tree and Graph Searching. In: Proceedings of the 21st ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, Madison, Wisconsin (2002)

    Google Scholar 

  17. Vatis, M.: Cyber Attacks During the War on Terrorism: A Predictive Analysis. Dartmouth College (2001)

    Google Scholar 

  18. Caswell, B., Roesch, M.: SNORT Intrusion Detection System (2004)

    Google Scholar 

  19. CAIDA: Center for Internet Security (2003)

    Google Scholar 

  20. Ertoz, L., Eilertson, E., Lazarevic, A., Tan, P., Srivastava, J., Kumar, V., Dokas, P.: The MINDS - Minnesota Intrusion Detection System: Next Generation Data Mining. MIT Press, Cambridge (2004)

    Google Scholar 

  21. Lazarevic, A., Ertoz, L., Ozgur, A., Srivastava, J., Kumar, V.: A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection. In: Proceedings of Third SIAM Conference on Data Mining, San Francisco (2003)

    Google Scholar 

  22. Clarke, R., Furse, M., Wright, J., Moss, D.: Derivation of a biological quality index for river sites: Comparison of the observed with the expected fauna. J. Appl. Stats. 23, 311–332 (1996)

    Article  Google Scholar 

  23. Clarke, R., Wright, J., Furse, M.: RIVPACS models for predicting the expected macroinvertebrate fauna and assessing the ecological quality of rivers. Ecol. Model. 160, 219–233 (2003)

    Article  Google Scholar 

  24. Faith, D., Dostine, P., Humphrey, C.: Detection of moning impacts of aquatic macroinvertebrate communities - results of a disturbance experiment and the design of a multivariate BACIP monitoring program at Coronation Hill, Northern Territory. Aust. J. Ecol. 20, 167–180 (1995)

    Article  Google Scholar 

  25. Humphrey, C., Faith, D., Dostine, P.: Base-line rquirements for assessment of moining impact using biological monitoring. Aust. J. Ecol. 20, 150–166 (1995)

    Article  Google Scholar 

  26. Stockwell, D.R.B., Faith, D.P.: Investigation of alternative approaches to linking habitat variables with site classification in a RIVPACS model - Final Report (1996)

    Google Scholar 

  27. Eubank, S., Kumar, V.S.A., Marathe, M.V., Srinivasan, A., Wang, N.: Structural and algorithmic aspects of massive social networks. In: Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms, New Orleans, Louisiana (2004)

    Google Scholar 

  28. Moret, B.M.E., Nakhleh, L., Warnow, T., Linder, C.R., Tholse, A., Padolina, A., Sun, J., Timme, R.: Phylogenetic networks: modeling, reconstructibility, and accuracy. IEEE/ACM Transactions on Computational Biology and Bioinformatics 1, 13–23 (2004)

    Article  Google Scholar 

  29. Wang, J.T.L., Shapiro, B.A., Shasha, D., Zhang, K., Currey, K.M.: An Algorithm for Finding the Largest Approximately Common Substructures of Two Trees. IEEE Transactions on Pattern Analysis and Machine Intelligence 20, 889–895 (1998)

    Article  Google Scholar 

  30. Wang, J.T.L., Zhang, K.: Information Sciences 126, 165–189 (2000)

    Google Scholar 

  31. Wang, J.T.L., Zhang, K.: Finding Similar Consensus between Trees: An Algorithm and a Distance Hierarchy. Pattern Recogn. 34, 127–137 (2001)

    Article  MATH  Google Scholar 

  32. Wang, J.T.L., Zhang, K., Chirn, G.-W.: Algorithms for Approximate Graph Matching. Information Sciences 82, 45–74 (1995)

    Article  MATH  MathSciNet  Google Scholar 

  33. Zhang, K., Wang, J.T.L., Shasha, D.: On the Editing Distance between Undirected Acyclic Graphs. International Journal of Foundations of Computer Science 7, 43–57 (1996)

    Article  MATH  Google Scholar 

  34. Cook, D.J., Holder, L.B.: Graph-Based Data Mining. IEEE Intelligent Systems 15, 32–41 (2000)

    Google Scholar 

  35. Wang, J.T.L., Zaki, M.J., Toivonen, H.T.T., Shasha, D.: Data Mining in Bioinformatics. Springer, London (2004)

    Google Scholar 

  36. Whitney, A.: K programming language (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Stockwell, D.R.B., Wang, J.T.L. (2005). Biomonitoring, Phylogenetics and Anomaly Aggregation Systems. In: Kantor, P., et al. Intelligence and Security Informatics. ISI 2005. Lecture Notes in Computer Science, vol 3495. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11427995_53

Download citation

  • DOI: https://doi.org/10.1007/11427995_53

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25999-2

  • Online ISBN: 978-3-540-32063-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics