skip to main content
10.1145/3383972.3384016acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicmlcConference Proceedingsconference-collections
research-article

Subconcept Based One Class Classification Method with Cluster Updating

Authors Info & Claims
Published:26 May 2020Publication History

ABSTRACT

One class classification is an effective way to perform anomaly detection or outlier detection. Previous work has empirically shown that complexity in the background (also known as target) class degrades the performance of one-class classifiers, and one source of data complexity is the presence of subconcepts in that class. Learning over subconcepts individually can mitigate the effects of domain complexity and improve one class classification performance. Unless a clustering could be derived from domain knowledge, the approach used to search for subconcepts is unsupervised clustering. However, in some cases, the examples belonging to some of the clusters may be too scattered, while, in others, clusters may be affected by the small disjunct problem where some clusters comprise only of a few examples that cannot be used to train a robust classifier. To handle these problems, this paper presents a method to update the clusters obtained by the clustering process prior to learning over them. In addition, it introduces the c-Nearest-Cluster (c-NC) method for combining the individual classifiers derived from each subconcept. Our experiments on classical outlier detection datasets and on cyber security datasets show that our method can improve upon the classification performance obtained by the recently proposed subconcept based one class classification method.

References

  1. C. Bellinger, S. Sharma, O. R. Zaiane, et al. Sampling a Longer Life: Binary versus One-class classification revisited, Proceedings of Machine Learning Research, 2017, 74:64--78.Google ScholarGoogle Scholar
  2. C. Bellinger, S. Sharma, N. Japkowicz. One-Class versus Binary Classification: Which and When? 11th International Conference on Machine Learning and Applications (ICMLA), 2012:102--106.Google ScholarGoogle Scholar
  3. S. Sharma, A. Somayaji, N. Japkowicz. Learning over subconcepts: Strategies for 1-class classification. Computational Intelligence, 2018, 34(2): 440--467.Google ScholarGoogle ScholarCross RefCross Ref
  4. F. T. Liu, K. M. Ting, Z. H. Zhou. Isolation forest. In 2008 Eighth IEEE International Conference on Data Mining, 2008, pp. 413--422.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. C. Bellinger, S. Sharma, N. Japkowicz. One-class classification--From theory to practice: A case-study in radioactive threat detection. Expert Systems with Applications, 2018, 108: 223--232.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. Yu, S. Kang. Clustering-based proxy measure for optimizing one-class classifiers. Pattern Recognition Letters, 2019, 117: 37--44.Google ScholarGoogle ScholarCross RefCross Ref
  7. H. Zuo, O. Wu, W. Hu, et al. Recognition of blue movies by fusion of audio and video, In IEEE International Conference on Multimedia and Expo, 2008, pp. 37--40.Google ScholarGoogle Scholar
  8. B. Krawczyk, M. Woźniak. Dynamic classifier selection for one-class classification. Knowledge-Based Systems, 2016, 107, 43--53.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D.M.J. Tax, R.P.W. Duin, Support vector data description, Machine Learning, 2004, 54 (1): 45--66.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. B. Chen, A. Feng, S. Chen, B. Li, One-cluster clustering based data description, Jisuanji Xuebao/Chinese J. Comput. 2007, 30(8): 1325--1332.Google ScholarGoogle Scholar
  11. L. Swersky, H. O. Marques, J. Sander, et al. On the evaluation of outlier detection and one-class classification methods. In IEEE International Conference on Data Science and Advanced Analytics (DSAA), 2016: 1--10.Google ScholarGoogle Scholar
  12. E. R. de Faria, A. C. P. de Leon Ferreira, J. Gama. MINAS: multiclass learning algorithm for novelty detection in data streams. Data mining and knowledge discovery, 2016, 30(3): 640--680.Google ScholarGoogle Scholar
  13. ODDS library, http://odds.cs.stonybrook.eduGoogle ScholarGoogle Scholar
  14. G. Creech, J. Hu. Generation of a new IDS test dataset: Time to retire the KDD collection. In IEEE Wireless Communications and Networking Conference (WCNC), 2013, pp. 4487--4492.Google ScholarGoogle ScholarCross RefCross Ref
  15. W. Haider, J. Hu, J. Slay, et al. Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling. Journal of Network and Computer Applications, 2017, 87, C: 185--192.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. M. Xie, J. Hu. Evaluating host-based anomaly detection systems: A preliminary analysis of adfa-ld. In 6th International Congress on Image and Signal Processing (CISP), 2013, pp. 1711--1716.Google ScholarGoogle ScholarCross RefCross Ref
  17. K. Xu, F. Wang. Behavioral Graph Analysis of Internet Applications. In Global Telecommunications Conference. 2015, pp. 1763--1768.Google ScholarGoogle Scholar

Index Terms

  1. Subconcept Based One Class Classification Method with Cluster Updating

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICMLC '20: Proceedings of the 2020 12th International Conference on Machine Learning and Computing
      February 2020
      607 pages
      ISBN:9781450376426
      DOI:10.1145/3383972

      Copyright © 2020 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 26 May 2020

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)8
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader