Some Properties of the Gaussian Kernel for One Class Learning

This paper proposes a novel approach for directly tuning the gaussian kernel matrix for one class learning. The popular gaussian kernel includes a free parameter, σ, that requires tuning typically performed through validation. The value of this parameter impacts model performance significantly. This paper explores an automated method for tuning this kernel based upon a hill climbing optimization of statistics obtained from the kernel matrix.

[1]  B. Sick,et al.  Feature selection for intrusion detection: an evolutionary wrapper approach , 2004, 2004 IEEE International Joint Conference on Neural Networks (IEEE Cat. No.04CH37541).

[2]  Matthias Schonlau,et al.  Detecting masquerades in intrusion detection based on unpopular commands , 2000, Inf. Process. Lett..

[3]  Andreas Stafylopatis,et al.  A clustering method based on boosting , 2004, Pattern Recognit. Lett..

[4]  Leo Breiman,et al.  Bagging Predictors , 1996, Machine Learning.

[5]  Boleslaw K. Szymanski,et al.  Computer Intrusion Detection Through Predictive Models , 2004 .

[6]  Tin Kam Ho,et al.  The Random Subspace Method for Constructing Decision Forests , 1998, IEEE Trans. Pattern Anal. Mach. Intell..

[7]  Robert P. W. Duin,et al.  Support Vector Data Description , 2004, Machine Learning.

[8]  O. Aalen,et al.  Understanding the shape of the hazard rate: A proce ss point of view , 2002 .

[9]  Thomas S. Huang,et al.  One-class SVM for learning in image retrieval , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[10]  Robert P. W. Duin,et al.  Support vector domain description , 1999, Pattern Recognit. Lett..

[11]  William DuMouchel,et al.  A Fast Computer Intrusion Detection Algorithm Based on Hypothesis Testing of Command Transition Probabilities , 1998, KDD.

[12]  Salvatore J. Stolfo,et al.  One-Class Training for Masquerade Detection , 2003 .

[13]  Nello Cristianini,et al.  Kernel Methods for Pattern Analysis , 2004 .

[14]  A. Karr,et al.  Computer Intrusion: Detecting Masquerades , 2001 .

[15]  Piero P. Bonissone,et al.  Unsupervised Fuzzy Ensembles and Their Use in Intrusion Detection , 2005, ESANN.

[16]  Kristin P. Bennett,et al.  Support vector machines: hype or hallelujah? , 2000, SKDD.

[17]  Leo Breiman,et al.  Bagging Predictors , 1996, Machine Learning.

[18]  Bernhard Schölkopf,et al.  Estimating the Support of a High-Dimensional Distribution , 2001, Neural Computation.

[19]  Boleslaw K. Szymanski,et al.  FUZZY ROC CURVES FOR THE 1 CLASS SVM: APPLICATION TO INTRUSION DETECTION , 2005 .