Atypicality for vector Gaussian models

Atypical sequences are subsequences of long sequences that deviate from the `normal' data. In previous papers we have developed an information-theoretic approach to such sequences for discrete and real-valued data. In the current paper we extend the principle of real-valued data that follows vector Gaussian models, which allows for finding relationship between data. We include a simple application to stock market data.

[1]  Ioannis Ch. Paschalidis,et al.  Spatio-temporal network anomaly detection by assessing deviations of empirical measures , 2009, IEEE/ACM Trans. Netw..

[2]  A. Nies Computability and randomness , 2009 .

[3]  G. Smaragdakis,et al.  Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures , 2009, IEEE/ACM Transactions on Networking.

[4]  Dong Xiang,et al.  Information-theoretic measures for anomaly detection , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[5]  Mohammad Zulkernine,et al.  Information-Theoretic Detection of SQL Injection Attacks , 2012, 2012 IEEE 14th International Symposium on High-Assurance Systems Engineering.

[6]  E. S. Pearson,et al.  ON THE USE AND INTERPRETATION OF CERTAIN TEST CRITERIA FOR PURPOSES OF STATISTICAL INFERENCE PART I , 1928 .

[7]  Vipin Kumar,et al.  Anomaly Detection for Discrete Sequences: A Survey , 2012, IEEE Transactions on Knowledge and Data Engineering.

[8]  Hyoung-Kee Choi,et al.  Effective discovery of attacks using entropy of packet dynamics , 2009, IEEE Network.

[9]  J. Rissanen A UNIVERSAL PRIOR FOR INTEGERS AND ESTIMATION BY MINIMUM DESCRIPTION LENGTH , 1983 .

[10]  T. Y. Lin,et al.  Kolmogorov complexity based automata modeling for intrusion detection , 2005, 2005 IEEE International Conference on Granular Computing.

[11]  Nan Wang,et al.  An Anomaly Detection Algorithm Based on Lossless Compression , 2012, 2012 IEEE Seventh International Conference on Networking, Architecture, and Storage.

[12]  Lorie M. Liebrock,et al.  An application of information theory to intrusion detection , 2006, Fourth IEEE International Workshop on Information Assurance (IWIA'06).

[13]  Anders Høst-Madsen,et al.  Atypical information theory for real-valued data , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).

[14]  G.J. Saulnier,et al.  Minimum description length principles for detection and classification of FTP exploits , 2004, IEEE MILCOM 2004. Military Communications Conference, 2004..

[15]  Peter Elias,et al.  Universal codeword sets and representations of the integers , 1975, IEEE Trans. Inf. Theory.

[16]  Wanlei Zhou,et al.  Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics , 2011, IEEE Transactions on Information Forensics and Security.

[17]  Feng Pan,et al.  Anomaly detection based-on the regularity of normal behaviors , 2006, 2006 1st International Symposium on Systems and Control in Aerospace and Astronautics.

[18]  Anders Høst-Madsen,et al.  Information theory for atypical sequences , 2013, 2013 IEEE Information Theory Workshop (ITW).

[19]  Ming Li,et al.  An Introduction to Kolmogorov Complexity and Its Applications , 2019, Texts in Computer Science.

[20]  Ioan Tabus,et al.  Sparse Modeling for Lossless Audio Compression , 2013, IEEE Transactions on Audio, Speech, and Language Processing.