TY - JOUR
T1 - PADUA
T2 - Parallel architecture to detect unexplained activities
AU - Molinaro, Cristian
AU - Moscato, Vincenzo
AU - Picariello, Antonio
AU - Pugliese, Andrea
AU - Rullo, Antonino
AU - Subrahmanian, V. S.
PY - 2014/7
Y1 - 2014/7
N2 - There are numerous applications (e.g., video surveillance, fraud detection, cybersecurity) in which we wish to identify unexplained sets of events. Most related past work has been domain-dependent (e.g., video surveillance, cybersecurity) and has focused on the valuable class of statistical anomalies in which statistically unusual events are considered. In contrast, suppose there is a set A of known activity models (both harmless and harmful) and a log L of time-stamped observations. We define a part L′ ⊆ L of the log to represent an unexplained situation when none of the known activity models can explain L′ with a score exceeding a userspecified threshold. We represent activities via probabilistic penalty graphs (PPGs) and show how a set of PPGs can be combined into one Super-PPG for which we define an index structure. Given a compute cluster of (K+1) nodes (one of which is a master node), we show how to split a Super-PPG into K subgraphs, each of which can be independently processed by a compute node. We provide algorithms for the individual compute nodes to ensure seamless handoffs that maximally leverage parallelism. PADUA is domain-independent and can be applied to many domains (perhaps with some specialization). We conducted detailed experiments with PADUA on two real-world datasets-the ITEA CANDELA video surveillance dataset and a network traffic dataset appropriate for cybersecurity applications. PADUA scales extremely well with the number of processors and significantly outperforms past work both in accuracy and time. Thus, PADUA represents the first parallel architecture and algorithm for identifying unexplained situations in observation data, offering both scalability and accuracy.
AB - There are numerous applications (e.g., video surveillance, fraud detection, cybersecurity) in which we wish to identify unexplained sets of events. Most related past work has been domain-dependent (e.g., video surveillance, cybersecurity) and has focused on the valuable class of statistical anomalies in which statistically unusual events are considered. In contrast, suppose there is a set A of known activity models (both harmless and harmful) and a log L of time-stamped observations. We define a part L′ ⊆ L of the log to represent an unexplained situation when none of the known activity models can explain L′ with a score exceeding a userspecified threshold. We represent activities via probabilistic penalty graphs (PPGs) and show how a set of PPGs can be combined into one Super-PPG for which we define an index structure. Given a compute cluster of (K+1) nodes (one of which is a master node), we show how to split a Super-PPG into K subgraphs, each of which can be independently processed by a compute node. We provide algorithms for the individual compute nodes to ensure seamless handoffs that maximally leverage parallelism. PADUA is domain-independent and can be applied to many domains (perhaps with some specialization). We conducted detailed experiments with PADUA on two real-world datasets-the ITEA CANDELA video surveillance dataset and a network traffic dataset appropriate for cybersecurity applications. PADUA scales extremely well with the number of processors and significantly outperforms past work both in accuracy and time. Thus, PADUA represents the first parallel architecture and algorithm for identifying unexplained situations in observation data, offering both scalability and accuracy.
KW - Activity detection
KW - Parallel computation
KW - Temporal stochastic automata
KW - Unexplained activities
UR - http://www.scopus.com/inward/record.url?scp=84906497580&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84906497580&partnerID=8YFLogxK
U2 - 10.1145/2633685
DO - 10.1145/2633685
M3 - Article
AN - SCOPUS:84906497580
SN - 1533-5399
VL - 14
JO - ACM Transactions on Internet Technology
JF - ACM Transactions on Internet Technology
IS - 1
M1 - 3
ER -