SlideShare a Scribd company logo
Temporal Relations Mining
Approach to Improve
DengueOutbreak and
IntrusionThreatsSeverity
PredictionAccuracy
Nurfadhlina Mohd Sharef, Nor
Azura Husin, Khairul Azhar
Kasmiran, Mohd Izuan Ninggal
Department of Computer
Science, Faculty of Computer
Science and Information
Technology, Universiti Putra
Malaysia, UPM Serdang,
Selangor, Malaysia
{nurfadhlina,n_azura,k_azhar,
mohdizuan}@upm.edu.my
12017 FOURTHASIAN CONFERENCEON DEFENSETECHNOLOGY,TOKYO
 Temporal relations and abstractions
 order instances chronologically and with periodic
patterns
 predict movement (increase or decrease) or quantify
the possibility of the predicted event to happen
 Identify whether there exist a series of combination of
supporting events’ occurrence sequence prior to the
occurrence of the target.
 focus on values of the time series attribute
 Not explored for dengue or intrusion prediction
22017 FOURTHASIAN CONFERENCEON DEFENSETECHNOLOGY,TOKYO
 Intrusion prediction
 Time series for intrusion prediction
 binary based forecasting (i.e., increase or decrease number of
attacks),
 numerical based prediction
 anomaly detection.
 Machine learning for threat prediction
 factors such as causal networks, attacker IP, and patch levels.
 Vector control
 physical-based activities to eliminate the mosquitoes
breeding spots
 Not based on temporal pattern and impact number of recent
cases
32017 FOURTHASIAN CONFERENCEON DEFENSETECHNOLOGY,TOKYO
4
5
 Previously
 data within different time series
 threat factor profiling
 model to predict the ATL and compute the OTL.
 sources integration, fuzzifying the threat
severity, computing asset (ATL) and
organisational (OTL) based threat level
 Temporal data are hourly, daily, weekly,
and so on
 not explore on the prediction of threat
occurrence according to the sequence of
other threats’ temporal relations
occurrence pattern.
 dengue outbreak prediction
 not considered temporal relations
RELATED WORKS
62017 FOURTHASIAN CONFERENCEON DEFENSETECHNOLOGY,TOKYO
 This paper
 features + temporal relations pattern mining + temporal aggregation
technique
 monitoring of the direction of the frequency of attacks (either steady,
increasing or decreasing, within the s values)
 the rising rainfall during northeast monsoon precede a decreasing trend in
dengue cases
 Questions
 What are contributing factors on the prediction model performance for
dengue cases and network severity threat?
 How to utilize temporal relations mining for the prediction of dengue
cases and network severity threat?
 What is the performance of the machine learning models in the
prediction of dengue case and network severity threat?
CONTRIBUTIONS
7
temporal abstractions (Shahar, 1997) and temporal logic
(Allen & Ferguson, 1994) to define patterns able to
describe temporal interactions among multiple time
series.
prediction tasks utilize trend-based features and
complex temporal patterns (ie., behaviour of ‘before’,
‘co-occurs’ which are among the relations in Allen’s
temporal logic)
2017 FOURTHASIAN CONFERENCEON DEFENSETECHNOLOGY,TOKYO
 Let D = {< xi , yi>} be a dataset such that xi ∈ X is the event records for object i up to
time ti , and yi ∈ Y is a numerical value (or class label) associated with attributes that
relate to the event at time ti .
 Learn a function f: X → Y that can predict accurately the value (or class label) for
future event.
 Space transformation ψ: X → X′ that maps each instance of the event xi to a fixed-size
feature vector that preserves the predictive temporal characteristics of xi as much as
possible.
 Object i, Oi is represented by a series of instances sorted according to the state
sequence.
 State is an abstraction for a specific attribute. For example, state E: Ai = D
represents a decreasing trend in the values of temporal variable Ai.
 State interval is a state that holds during an interval, (E, bi , ei ) is a realization of
state E in a data instance and has specific start time (bi) and end time (ei).
 A state sequence is a series of state intervals, where the state intervals are ordered
according to their start times.
 After abstracting all temporal variables, we represent every instance (i.e., dengue
case, attack log) in the database D as a state sequence.As a result, D can be viewed
as a set of state sequences.
82017 FOURTHASIAN CONFERENCEON DEFENSETECHNOLOGY,TOKYO
Step 1
• Sort the data according to sequence of occurrence.
• Define the temporal window size, s based on the temporal interval length, l in the
dataset such as hourly, daily, weekly, monthly and annually.
Step 2
• Determine aggregation operator, op such as summation or frequency of occurrence.
• For example, in the cyber threat dataset we may be interested to know the total
occurrence of each threat according to severity level, or threat category.
Step 3
• Determine bi and ei for s as part of the window sliding process.
• Data recorded within the window size would be aggregated according to suitable
operator.
Step 4
• Time series variables are converted into representation of temporal trend according to
a higher level description using temporal abstractions.
92017 FOURTHASIAN CONFERENCEON DEFENSETECHNOLOGY,TOKYO
 Root Mean Squared Error (RMSE)
 Multilayer Perceptron (MLP)
 support vector machine for regression (SMOReg)
 For the MLP, the learning rate is 0.3 and momentum is 0.2.
 For SMOReg, the Polynomial kernel is used where K(x, y) = <x, y>^p or K(x, y) =
(<x, y>+1)^p and exponent=1.0, while the RegSMOImproved is used as regular
optimizer with epsilon=1.0E-12, epsilon parameter of the epsilon insensitive
loss function=0.01, seed=1, tolerance=0.001 and variant=variant1 is used.
 Data normalized [0,1].
102017 FOURTHASIAN CONFERENCEON DEFENSETECHNOLOGY,TOKYO
DENGUE
OUTBREAK
PREDICTION
• Dataset by the Ministry of
Health (MoH), Malaysia
• predict NL and NC. Records of
dengue cases in 2010 and
2011 for Hulu Langat, which is
in Selangor, Malaysia
• l=week, s=1
112017 FOURTHASIAN CONFERENCEON DEFENSETECHNOLOGY,TOKYO
NETWORK THREAT
PREDICTION
• Warned against the threat
occurrence prior to receiving
the attack
• IPS
• labels severity level (i.e.,
Low, Info, and High).
• block, permit or allow
access not according to
the severity level.
Setting10=Setting1
Setting11=Setting2
Setting12=Setting3
Setting13=Setting5
Setting14=Setting7
op : frequency of the threat cases, l=hourly
s=1: previously 1 hour of the same day,
s=2: previously 2 hour of the same day,
s=11: at the same hour, the day before
s=12: at the same hour, two days before.
TH: threat with severity=High,
TI: threat with severity=Info
TL: threat with severity=Low.
12
 Temporal data mining
 intuitive method for correlations or sequential patterns in sets of
data stream.
 The results of the experiments
 window sliding size influence the performance of the model
 specific configuration a.t. dataset domain.
 various training and testing ratio
 more portions for the training help model to perform more reliably.
 Future works
 Performance of the approach to more comprehensive dengue and
intrusion logs.
 study the sequential relations series
 multiple events temporality such as the combination of day and hour to
observe whether there exist a similar pattern of occurrence between a
specific hour across several days
 multiple event order such as overlapping, start-after and end-by, and so
on.
132017 FOURTHASIAN CONFERENCEON DEFENSETECHNOLOGY,TOKYO
 Deep appreciation to ACDT17 committee for inviting and
sponsoring my presentation and participation in this conference
 Dr. Maslina Zolkepli for the discussion on possibility to develop
prediction model for water quality preservation.
 Another note of appreciation goes to Mrs. Norhashimah Mat
Sejani and Dr. MohdTaufikAbdullah for supporting with the
intrusion data preparation and discussion.
 A special thank is dedicated to the cyber threat profiling research
team for various meetups which has inspired the approach
introduced in this paper.
142017 FOURTHASIAN CONFERENCEON DEFENSETECHNOLOGY,TOKYO

More Related Content

Similar to Temporal Relations Mining Approach to Improve Dengue Outbreak and Intrusion Threats Severity Prediction Accuracy

An integrated event summarization approach for complex system management
An integrated event summarization approach for complex system managementAn integrated event summarization approach for complex system management
An integrated event summarization approach for complex system management
Venkat Projects
 
Proposed Event Processing Definitions ,September 20, 2006
Proposed Event Processing Definitions,September 20, 2006Proposed Event Processing Definitions,September 20, 2006
Proposed Event Processing Definitions ,September 20, 2006
Tim Bass
 
A framework for mining signatures from event sequences and its applications i...
A framework for mining signatures from event sequences and its applications i...A framework for mining signatures from event sequences and its applications i...
A framework for mining signatures from event sequences and its applications i...
JPINFOTECH JAYAPRAKASH
 
An integrated event summarization approach for complex system management
An integrated event summarization approach for complex system managementAn integrated event summarization approach for complex system management
An integrated event summarization approach for complex system management
Venkat Projects
 
Ijetcas14 467
Ijetcas14 467Ijetcas14 467
Ijetcas14 467
Iasir Journals
 
Integration Method of Local-global SVR and Parallel Time Variant PSO in Water...
Integration Method of Local-global SVR and Parallel Time Variant PSO in Water...Integration Method of Local-global SVR and Parallel Time Variant PSO in Water...
Integration Method of Local-global SVR and Parallel Time Variant PSO in Water...
TELKOMNIKA JOURNAL
 
Integrate fault tree analysis and fuzzy sets in quantitative risk assessment
Integrate fault tree analysis and fuzzy sets in quantitative risk assessmentIntegrate fault tree analysis and fuzzy sets in quantitative risk assessment
Integrate fault tree analysis and fuzzy sets in quantitative risk assessment
IAEME Publication
 
Improving predictability and performance by relating the number of events and...
Improving predictability and performance by relating the number of events and...Improving predictability and performance by relating the number of events and...
Improving predictability and performance by relating the number of events and...
Asoka Korale
 
Chaotic systems with pseudorandom number generate to protect the transmitted...
Chaotic systems with pseudorandom number generate to  protect the transmitted...Chaotic systems with pseudorandom number generate to  protect the transmitted...
Chaotic systems with pseudorandom number generate to protect the transmitted...
nooriasukmaningtyas
 
Project Risk Analysis in Aerospace Industry
Project Risk Analysis in Aerospace IndustryProject Risk Analysis in Aerospace Industry
Project Risk Analysis in Aerospace Industry
Intaver Insititute
 
SEQUENTIAL CLUSTERING-BASED EVENT DETECTION FOR NONINTRUSIVE LOAD MONITORING
SEQUENTIAL CLUSTERING-BASED EVENT DETECTION FOR NONINTRUSIVE LOAD MONITORINGSEQUENTIAL CLUSTERING-BASED EVENT DETECTION FOR NONINTRUSIVE LOAD MONITORING
SEQUENTIAL CLUSTERING-BASED EVENT DETECTION FOR NONINTRUSIVE LOAD MONITORING
cscpconf
 
SEQUENTIAL CLUSTERING-BASED EVENT DETECTION FOR NONINTRUSIVE LOAD MONITORING
SEQUENTIAL CLUSTERING-BASED EVENT DETECTION FOR NONINTRUSIVE LOAD MONITORINGSEQUENTIAL CLUSTERING-BASED EVENT DETECTION FOR NONINTRUSIVE LOAD MONITORING
SEQUENTIAL CLUSTERING-BASED EVENT DETECTION FOR NONINTRUSIVE LOAD MONITORING
csandit
 
Event detection and summarization based on social networks and semantic query...
Event detection and summarization based on social networks and semantic query...Event detection and summarization based on social networks and semantic query...
Event detection and summarization based on social networks and semantic query...
ijnlc
 
Integrate fault tree analysis and fuzzy sets in quantitative risk assessment
Integrate fault tree analysis and fuzzy sets in quantitative risk assessmentIntegrate fault tree analysis and fuzzy sets in quantitative risk assessment
Integrate fault tree analysis and fuzzy sets in quantitative risk assessment
IAEME Publication
 
SEMANTIC STUDIES OF A SYNCHRONOUS APPROACH TO ACTIVITY RECOGNITION
SEMANTIC STUDIES OF A SYNCHRONOUS APPROACH TO ACTIVITY RECOGNITIONSEMANTIC STUDIES OF A SYNCHRONOUS APPROACH TO ACTIVITY RECOGNITION
SEMANTIC STUDIES OF A SYNCHRONOUS APPROACH TO ACTIVITY RECOGNITION
cscpconf
 
Aq4201280292
Aq4201280292Aq4201280292
Aq4201280292
IJERA Editor
 
A Study on Performance Analysis of Different Prediction Techniques in Predict...
A Study on Performance Analysis of Different Prediction Techniques in Predict...A Study on Performance Analysis of Different Prediction Techniques in Predict...
A Study on Performance Analysis of Different Prediction Techniques in Predict...
IJRES Journal
 
50120130405032
5012013040503250120130405032
50120130405032
IAEME Publication
 
Pre-defense_talk
Pre-defense_talkPre-defense_talk
Pre-defense_talk
aphex34
 
Temporal Relations with Signals: the case of Italian Temporal Prepositions
Temporal Relations with Signals: the case of Italian Temporal PrepositionsTemporal Relations with Signals: the case of Italian Temporal Prepositions
Temporal Relations with Signals: the case of Italian Temporal Prepositions
TommasoC_80
 

Similar to Temporal Relations Mining Approach to Improve Dengue Outbreak and Intrusion Threats Severity Prediction Accuracy (20)

An integrated event summarization approach for complex system management
An integrated event summarization approach for complex system managementAn integrated event summarization approach for complex system management
An integrated event summarization approach for complex system management
 
Proposed Event Processing Definitions ,September 20, 2006
Proposed Event Processing Definitions,September 20, 2006Proposed Event Processing Definitions,September 20, 2006
Proposed Event Processing Definitions ,September 20, 2006
 
A framework for mining signatures from event sequences and its applications i...
A framework for mining signatures from event sequences and its applications i...A framework for mining signatures from event sequences and its applications i...
A framework for mining signatures from event sequences and its applications i...
 
An integrated event summarization approach for complex system management
An integrated event summarization approach for complex system managementAn integrated event summarization approach for complex system management
An integrated event summarization approach for complex system management
 
Ijetcas14 467
Ijetcas14 467Ijetcas14 467
Ijetcas14 467
 
Integration Method of Local-global SVR and Parallel Time Variant PSO in Water...
Integration Method of Local-global SVR and Parallel Time Variant PSO in Water...Integration Method of Local-global SVR and Parallel Time Variant PSO in Water...
Integration Method of Local-global SVR and Parallel Time Variant PSO in Water...
 
Integrate fault tree analysis and fuzzy sets in quantitative risk assessment
Integrate fault tree analysis and fuzzy sets in quantitative risk assessmentIntegrate fault tree analysis and fuzzy sets in quantitative risk assessment
Integrate fault tree analysis and fuzzy sets in quantitative risk assessment
 
Improving predictability and performance by relating the number of events and...
Improving predictability and performance by relating the number of events and...Improving predictability and performance by relating the number of events and...
Improving predictability and performance by relating the number of events and...
 
Chaotic systems with pseudorandom number generate to protect the transmitted...
Chaotic systems with pseudorandom number generate to  protect the transmitted...Chaotic systems with pseudorandom number generate to  protect the transmitted...
Chaotic systems with pseudorandom number generate to protect the transmitted...
 
Project Risk Analysis in Aerospace Industry
Project Risk Analysis in Aerospace IndustryProject Risk Analysis in Aerospace Industry
Project Risk Analysis in Aerospace Industry
 
SEQUENTIAL CLUSTERING-BASED EVENT DETECTION FOR NONINTRUSIVE LOAD MONITORING
SEQUENTIAL CLUSTERING-BASED EVENT DETECTION FOR NONINTRUSIVE LOAD MONITORINGSEQUENTIAL CLUSTERING-BASED EVENT DETECTION FOR NONINTRUSIVE LOAD MONITORING
SEQUENTIAL CLUSTERING-BASED EVENT DETECTION FOR NONINTRUSIVE LOAD MONITORING
 
SEQUENTIAL CLUSTERING-BASED EVENT DETECTION FOR NONINTRUSIVE LOAD MONITORING
SEQUENTIAL CLUSTERING-BASED EVENT DETECTION FOR NONINTRUSIVE LOAD MONITORINGSEQUENTIAL CLUSTERING-BASED EVENT DETECTION FOR NONINTRUSIVE LOAD MONITORING
SEQUENTIAL CLUSTERING-BASED EVENT DETECTION FOR NONINTRUSIVE LOAD MONITORING
 
Event detection and summarization based on social networks and semantic query...
Event detection and summarization based on social networks and semantic query...Event detection and summarization based on social networks and semantic query...
Event detection and summarization based on social networks and semantic query...
 
Integrate fault tree analysis and fuzzy sets in quantitative risk assessment
Integrate fault tree analysis and fuzzy sets in quantitative risk assessmentIntegrate fault tree analysis and fuzzy sets in quantitative risk assessment
Integrate fault tree analysis and fuzzy sets in quantitative risk assessment
 
SEMANTIC STUDIES OF A SYNCHRONOUS APPROACH TO ACTIVITY RECOGNITION
SEMANTIC STUDIES OF A SYNCHRONOUS APPROACH TO ACTIVITY RECOGNITIONSEMANTIC STUDIES OF A SYNCHRONOUS APPROACH TO ACTIVITY RECOGNITION
SEMANTIC STUDIES OF A SYNCHRONOUS APPROACH TO ACTIVITY RECOGNITION
 
Aq4201280292
Aq4201280292Aq4201280292
Aq4201280292
 
A Study on Performance Analysis of Different Prediction Techniques in Predict...
A Study on Performance Analysis of Different Prediction Techniques in Predict...A Study on Performance Analysis of Different Prediction Techniques in Predict...
A Study on Performance Analysis of Different Prediction Techniques in Predict...
 
50120130405032
5012013040503250120130405032
50120130405032
 
Pre-defense_talk
Pre-defense_talkPre-defense_talk
Pre-defense_talk
 
Temporal Relations with Signals: the case of Italian Temporal Prepositions
Temporal Relations with Signals: the case of Italian Temporal PrepositionsTemporal Relations with Signals: the case of Italian Temporal Prepositions
Temporal Relations with Signals: the case of Italian Temporal Prepositions
 

More from Nurfadhlina Mohd Sharef

Regenerating learning experience with AI
Regenerating learning experience with AIRegenerating learning experience with AI
Regenerating learning experience with AI
Nurfadhlina Mohd Sharef
 
Enhancing academic productivity using Gen AI
Enhancing academic productivity using Gen AIEnhancing academic productivity using Gen AI
Enhancing academic productivity using Gen AI
Nurfadhlina Mohd Sharef
 
ChatGPT in Teaching and Learning
ChatGPT in Teaching and LearningChatGPT in Teaching and Learning
ChatGPT in Teaching and Learning
Nurfadhlina Mohd Sharef
 
Struggle to success: How generative ai can transform your university experience?
Struggle to success: How generative ai can transform your university experience?Struggle to success: How generative ai can transform your university experience?
Struggle to success: How generative ai can transform your university experience?
Nurfadhlina Mohd Sharef
 
Ada Apa Dengan ChatGPT
Ada Apa Dengan ChatGPTAda Apa Dengan ChatGPT
Ada Apa Dengan ChatGPT
Nurfadhlina Mohd Sharef
 
Teaching with ChatGPT-Practical Tips and Strategies
Teaching with ChatGPT-Practical Tips and StrategiesTeaching with ChatGPT-Practical Tips and Strategies
Teaching with ChatGPT-Practical Tips and Strategies
Nurfadhlina Mohd Sharef
 
Artificial Intelligence in Education
Artificial Intelligence in EducationArtificial Intelligence in Education
Artificial Intelligence in Education
Nurfadhlina Mohd Sharef
 
Usage of ChatGPT at Higher Learning Institutions.pptx
Usage of ChatGPT at Higher Learning Institutions.pptxUsage of ChatGPT at Higher Learning Institutions.pptx
Usage of ChatGPT at Higher Learning Institutions.pptx
Nurfadhlina Mohd Sharef
 
ChatGPT: Friend or Foe?
ChatGPT: Friend or Foe?ChatGPT: Friend or Foe?
ChatGPT: Friend or Foe?
Nurfadhlina Mohd Sharef
 
Meaningful Online Learning Experience
Meaningful Online Learning ExperienceMeaningful Online Learning Experience
Meaningful Online Learning Experience
Nurfadhlina Mohd Sharef
 
Online Instructional Design
Online Instructional DesignOnline Instructional Design
Online Instructional Design
Nurfadhlina Mohd Sharef
 
Introduction to eLearning at Universiti Putra Malaysia
Introduction to eLearning at Universiti Putra MalaysiaIntroduction to eLearning at Universiti Putra Malaysia
Introduction to eLearning at Universiti Putra Malaysia
Nurfadhlina Mohd Sharef
 
Data raya dan kecerdasan buatan
Data raya dan kecerdasan buatanData raya dan kecerdasan buatan
Data raya dan kecerdasan buatan
Nurfadhlina Mohd Sharef
 
CIKGUAIBOT: A CHATBOT TO TEACH ARTIFICIAL INTELLIGENCE IN MALAY
CIKGUAIBOT: A CHATBOT TO TEACH ARTIFICIAL INTELLIGENCE IN MALAYCIKGUAIBOT: A CHATBOT TO TEACH ARTIFICIAL INTELLIGENCE IN MALAY
CIKGUAIBOT: A CHATBOT TO TEACH ARTIFICIAL INTELLIGENCE IN MALAY
Nurfadhlina Mohd Sharef
 
Learning analytics based intelligent simulator for personalised learning slide
Learning analytics based intelligent simulator for personalised learning slideLearning analytics based intelligent simulator for personalised learning slide
Learning analytics based intelligent simulator for personalised learning slide
Nurfadhlina Mohd Sharef
 
ICADEIS 2020 keynote
ICADEIS 2020 keynoteICADEIS 2020 keynote
ICADEIS 2020 keynote
Nurfadhlina Mohd Sharef
 
Basketball players performance analytic as experiential learning approach
Basketball players performance analytic as experiential learning approachBasketball players performance analytic as experiential learning approach
Basketball players performance analytic as experiential learning approach
Nurfadhlina Mohd Sharef
 
Enhancing Multi-Aspect Collaborative Filtering for Personalized Recommendation
Enhancing Multi-Aspect Collaborative Filtering for Personalized RecommendationEnhancing Multi-Aspect Collaborative Filtering for Personalized Recommendation
Enhancing Multi-Aspect Collaborative Filtering for Personalized Recommendation
Nurfadhlina Mohd Sharef
 
Aspect Extraction Performance With Common Pattern of Dependency Relation in ...
Aspect Extraction Performance With Common Pattern of  Dependency Relation in ...Aspect Extraction Performance With Common Pattern of  Dependency Relation in ...
Aspect Extraction Performance With Common Pattern of Dependency Relation in ...
Nurfadhlina Mohd Sharef
 
Multi-layers Convolutional Neural Network for Tweet Sentiment Classification
Multi-layers Convolutional Neural Network for Tweet Sentiment ClassificationMulti-layers Convolutional Neural Network for Tweet Sentiment Classification
Multi-layers Convolutional Neural Network for Tweet Sentiment Classification
Nurfadhlina Mohd Sharef
 

More from Nurfadhlina Mohd Sharef (20)

Regenerating learning experience with AI
Regenerating learning experience with AIRegenerating learning experience with AI
Regenerating learning experience with AI
 
Enhancing academic productivity using Gen AI
Enhancing academic productivity using Gen AIEnhancing academic productivity using Gen AI
Enhancing academic productivity using Gen AI
 
ChatGPT in Teaching and Learning
ChatGPT in Teaching and LearningChatGPT in Teaching and Learning
ChatGPT in Teaching and Learning
 
Struggle to success: How generative ai can transform your university experience?
Struggle to success: How generative ai can transform your university experience?Struggle to success: How generative ai can transform your university experience?
Struggle to success: How generative ai can transform your university experience?
 
Ada Apa Dengan ChatGPT
Ada Apa Dengan ChatGPTAda Apa Dengan ChatGPT
Ada Apa Dengan ChatGPT
 
Teaching with ChatGPT-Practical Tips and Strategies
Teaching with ChatGPT-Practical Tips and StrategiesTeaching with ChatGPT-Practical Tips and Strategies
Teaching with ChatGPT-Practical Tips and Strategies
 
Artificial Intelligence in Education
Artificial Intelligence in EducationArtificial Intelligence in Education
Artificial Intelligence in Education
 
Usage of ChatGPT at Higher Learning Institutions.pptx
Usage of ChatGPT at Higher Learning Institutions.pptxUsage of ChatGPT at Higher Learning Institutions.pptx
Usage of ChatGPT at Higher Learning Institutions.pptx
 
ChatGPT: Friend or Foe?
ChatGPT: Friend or Foe?ChatGPT: Friend or Foe?
ChatGPT: Friend or Foe?
 
Meaningful Online Learning Experience
Meaningful Online Learning ExperienceMeaningful Online Learning Experience
Meaningful Online Learning Experience
 
Online Instructional Design
Online Instructional DesignOnline Instructional Design
Online Instructional Design
 
Introduction to eLearning at Universiti Putra Malaysia
Introduction to eLearning at Universiti Putra MalaysiaIntroduction to eLearning at Universiti Putra Malaysia
Introduction to eLearning at Universiti Putra Malaysia
 
Data raya dan kecerdasan buatan
Data raya dan kecerdasan buatanData raya dan kecerdasan buatan
Data raya dan kecerdasan buatan
 
CIKGUAIBOT: A CHATBOT TO TEACH ARTIFICIAL INTELLIGENCE IN MALAY
CIKGUAIBOT: A CHATBOT TO TEACH ARTIFICIAL INTELLIGENCE IN MALAYCIKGUAIBOT: A CHATBOT TO TEACH ARTIFICIAL INTELLIGENCE IN MALAY
CIKGUAIBOT: A CHATBOT TO TEACH ARTIFICIAL INTELLIGENCE IN MALAY
 
Learning analytics based intelligent simulator for personalised learning slide
Learning analytics based intelligent simulator for personalised learning slideLearning analytics based intelligent simulator for personalised learning slide
Learning analytics based intelligent simulator for personalised learning slide
 
ICADEIS 2020 keynote
ICADEIS 2020 keynoteICADEIS 2020 keynote
ICADEIS 2020 keynote
 
Basketball players performance analytic as experiential learning approach
Basketball players performance analytic as experiential learning approachBasketball players performance analytic as experiential learning approach
Basketball players performance analytic as experiential learning approach
 
Enhancing Multi-Aspect Collaborative Filtering for Personalized Recommendation
Enhancing Multi-Aspect Collaborative Filtering for Personalized RecommendationEnhancing Multi-Aspect Collaborative Filtering for Personalized Recommendation
Enhancing Multi-Aspect Collaborative Filtering for Personalized Recommendation
 
Aspect Extraction Performance With Common Pattern of Dependency Relation in ...
Aspect Extraction Performance With Common Pattern of  Dependency Relation in ...Aspect Extraction Performance With Common Pattern of  Dependency Relation in ...
Aspect Extraction Performance With Common Pattern of Dependency Relation in ...
 
Multi-layers Convolutional Neural Network for Tweet Sentiment Classification
Multi-layers Convolutional Neural Network for Tweet Sentiment ClassificationMulti-layers Convolutional Neural Network for Tweet Sentiment Classification
Multi-layers Convolutional Neural Network for Tweet Sentiment Classification
 

Recently uploaded

Challenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more importantChallenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more important
Sm321
 
Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......
Sachin Paul
 
Monthly Management report for the Month of May 2024
Monthly Management report for the Month of May 2024Monthly Management report for the Month of May 2024
Monthly Management report for the Month of May 2024
facilitymanager11
 
A presentation that explain the Power BI Licensing
A presentation that explain the Power BI LicensingA presentation that explain the Power BI Licensing
A presentation that explain the Power BI Licensing
AlessioFois2
 
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Aggregage
 
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
taqyea
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
nuttdpt
 
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
wyddcwye1
 
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
hyfjgavov
 
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataPredictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Kiwi Creative
 
Intelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicineIntelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicine
AndrzejJarynowski
 
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
bopyb
 
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
mkkikqvo
 
writing report business partner b1+ .pdf
writing report business partner b1+ .pdfwriting report business partner b1+ .pdf
writing report business partner b1+ .pdf
VyNguyen709676
 
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
a9qfiubqu
 
UofT毕业证如何办理
UofT毕业证如何办理UofT毕业证如何办理
UofT毕业证如何办理
exukyp
 
"Financial Odyssey: Navigating Past Performance Through Diverse Analytical Lens"
"Financial Odyssey: Navigating Past Performance Through Diverse Analytical Lens""Financial Odyssey: Navigating Past Performance Through Diverse Analytical Lens"
"Financial Odyssey: Navigating Past Performance Through Diverse Analytical Lens"
sameer shah
 
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
Timothy Spann
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
ihavuls
 
一比一原版(CU毕业证)卡尔顿大学毕业证如何办理
一比一原版(CU毕业证)卡尔顿大学毕业证如何办理一比一原版(CU毕业证)卡尔顿大学毕业证如何办理
一比一原版(CU毕业证)卡尔顿大学毕业证如何办理
bmucuha
 

Recently uploaded (20)

Challenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more importantChallenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more important
 
Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......
 
Monthly Management report for the Month of May 2024
Monthly Management report for the Month of May 2024Monthly Management report for the Month of May 2024
Monthly Management report for the Month of May 2024
 
A presentation that explain the Power BI Licensing
A presentation that explain the Power BI LicensingA presentation that explain the Power BI Licensing
A presentation that explain the Power BI Licensing
 
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
 
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
 
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
 
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
 
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataPredictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
 
Intelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicineIntelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicine
 
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
 
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
 
writing report business partner b1+ .pdf
writing report business partner b1+ .pdfwriting report business partner b1+ .pdf
writing report business partner b1+ .pdf
 
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
 
UofT毕业证如何办理
UofT毕业证如何办理UofT毕业证如何办理
UofT毕业证如何办理
 
"Financial Odyssey: Navigating Past Performance Through Diverse Analytical Lens"
"Financial Odyssey: Navigating Past Performance Through Diverse Analytical Lens""Financial Odyssey: Navigating Past Performance Through Diverse Analytical Lens"
"Financial Odyssey: Navigating Past Performance Through Diverse Analytical Lens"
 
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
 
一比一原版(CU毕业证)卡尔顿大学毕业证如何办理
一比一原版(CU毕业证)卡尔顿大学毕业证如何办理一比一原版(CU毕业证)卡尔顿大学毕业证如何办理
一比一原版(CU毕业证)卡尔顿大学毕业证如何办理
 

Temporal Relations Mining Approach to Improve Dengue Outbreak and Intrusion Threats Severity Prediction Accuracy

  • 1. Temporal Relations Mining Approach to Improve DengueOutbreak and IntrusionThreatsSeverity PredictionAccuracy Nurfadhlina Mohd Sharef, Nor Azura Husin, Khairul Azhar Kasmiran, Mohd Izuan Ninggal Department of Computer Science, Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, UPM Serdang, Selangor, Malaysia {nurfadhlina,n_azura,k_azhar, mohdizuan}@upm.edu.my 12017 FOURTHASIAN CONFERENCEON DEFENSETECHNOLOGY,TOKYO
  • 2.  Temporal relations and abstractions  order instances chronologically and with periodic patterns  predict movement (increase or decrease) or quantify the possibility of the predicted event to happen  Identify whether there exist a series of combination of supporting events’ occurrence sequence prior to the occurrence of the target.  focus on values of the time series attribute  Not explored for dengue or intrusion prediction 22017 FOURTHASIAN CONFERENCEON DEFENSETECHNOLOGY,TOKYO
  • 3.  Intrusion prediction  Time series for intrusion prediction  binary based forecasting (i.e., increase or decrease number of attacks),  numerical based prediction  anomaly detection.  Machine learning for threat prediction  factors such as causal networks, attacker IP, and patch levels.  Vector control  physical-based activities to eliminate the mosquitoes breeding spots  Not based on temporal pattern and impact number of recent cases 32017 FOURTHASIAN CONFERENCEON DEFENSETECHNOLOGY,TOKYO
  • 4. 4
  • 5. 5
  • 6.  Previously  data within different time series  threat factor profiling  model to predict the ATL and compute the OTL.  sources integration, fuzzifying the threat severity, computing asset (ATL) and organisational (OTL) based threat level  Temporal data are hourly, daily, weekly, and so on  not explore on the prediction of threat occurrence according to the sequence of other threats’ temporal relations occurrence pattern.  dengue outbreak prediction  not considered temporal relations RELATED WORKS 62017 FOURTHASIAN CONFERENCEON DEFENSETECHNOLOGY,TOKYO
  • 7.  This paper  features + temporal relations pattern mining + temporal aggregation technique  monitoring of the direction of the frequency of attacks (either steady, increasing or decreasing, within the s values)  the rising rainfall during northeast monsoon precede a decreasing trend in dengue cases  Questions  What are contributing factors on the prediction model performance for dengue cases and network severity threat?  How to utilize temporal relations mining for the prediction of dengue cases and network severity threat?  What is the performance of the machine learning models in the prediction of dengue case and network severity threat? CONTRIBUTIONS 7 temporal abstractions (Shahar, 1997) and temporal logic (Allen & Ferguson, 1994) to define patterns able to describe temporal interactions among multiple time series. prediction tasks utilize trend-based features and complex temporal patterns (ie., behaviour of ‘before’, ‘co-occurs’ which are among the relations in Allen’s temporal logic) 2017 FOURTHASIAN CONFERENCEON DEFENSETECHNOLOGY,TOKYO
  • 8.  Let D = {< xi , yi>} be a dataset such that xi ∈ X is the event records for object i up to time ti , and yi ∈ Y is a numerical value (or class label) associated with attributes that relate to the event at time ti .  Learn a function f: X → Y that can predict accurately the value (or class label) for future event.  Space transformation ψ: X → X′ that maps each instance of the event xi to a fixed-size feature vector that preserves the predictive temporal characteristics of xi as much as possible.  Object i, Oi is represented by a series of instances sorted according to the state sequence.  State is an abstraction for a specific attribute. For example, state E: Ai = D represents a decreasing trend in the values of temporal variable Ai.  State interval is a state that holds during an interval, (E, bi , ei ) is a realization of state E in a data instance and has specific start time (bi) and end time (ei).  A state sequence is a series of state intervals, where the state intervals are ordered according to their start times.  After abstracting all temporal variables, we represent every instance (i.e., dengue case, attack log) in the database D as a state sequence.As a result, D can be viewed as a set of state sequences. 82017 FOURTHASIAN CONFERENCEON DEFENSETECHNOLOGY,TOKYO
  • 9. Step 1 • Sort the data according to sequence of occurrence. • Define the temporal window size, s based on the temporal interval length, l in the dataset such as hourly, daily, weekly, monthly and annually. Step 2 • Determine aggregation operator, op such as summation or frequency of occurrence. • For example, in the cyber threat dataset we may be interested to know the total occurrence of each threat according to severity level, or threat category. Step 3 • Determine bi and ei for s as part of the window sliding process. • Data recorded within the window size would be aggregated according to suitable operator. Step 4 • Time series variables are converted into representation of temporal trend according to a higher level description using temporal abstractions. 92017 FOURTHASIAN CONFERENCEON DEFENSETECHNOLOGY,TOKYO
  • 10.  Root Mean Squared Error (RMSE)  Multilayer Perceptron (MLP)  support vector machine for regression (SMOReg)  For the MLP, the learning rate is 0.3 and momentum is 0.2.  For SMOReg, the Polynomial kernel is used where K(x, y) = <x, y>^p or K(x, y) = (<x, y>+1)^p and exponent=1.0, while the RegSMOImproved is used as regular optimizer with epsilon=1.0E-12, epsilon parameter of the epsilon insensitive loss function=0.01, seed=1, tolerance=0.001 and variant=variant1 is used.  Data normalized [0,1]. 102017 FOURTHASIAN CONFERENCEON DEFENSETECHNOLOGY,TOKYO
  • 11. DENGUE OUTBREAK PREDICTION • Dataset by the Ministry of Health (MoH), Malaysia • predict NL and NC. Records of dengue cases in 2010 and 2011 for Hulu Langat, which is in Selangor, Malaysia • l=week, s=1 112017 FOURTHASIAN CONFERENCEON DEFENSETECHNOLOGY,TOKYO
  • 12. NETWORK THREAT PREDICTION • Warned against the threat occurrence prior to receiving the attack • IPS • labels severity level (i.e., Low, Info, and High). • block, permit or allow access not according to the severity level. Setting10=Setting1 Setting11=Setting2 Setting12=Setting3 Setting13=Setting5 Setting14=Setting7 op : frequency of the threat cases, l=hourly s=1: previously 1 hour of the same day, s=2: previously 2 hour of the same day, s=11: at the same hour, the day before s=12: at the same hour, two days before. TH: threat with severity=High, TI: threat with severity=Info TL: threat with severity=Low. 12
  • 13.  Temporal data mining  intuitive method for correlations or sequential patterns in sets of data stream.  The results of the experiments  window sliding size influence the performance of the model  specific configuration a.t. dataset domain.  various training and testing ratio  more portions for the training help model to perform more reliably.  Future works  Performance of the approach to more comprehensive dengue and intrusion logs.  study the sequential relations series  multiple events temporality such as the combination of day and hour to observe whether there exist a similar pattern of occurrence between a specific hour across several days  multiple event order such as overlapping, start-after and end-by, and so on. 132017 FOURTHASIAN CONFERENCEON DEFENSETECHNOLOGY,TOKYO
  • 14.  Deep appreciation to ACDT17 committee for inviting and sponsoring my presentation and participation in this conference  Dr. Maslina Zolkepli for the discussion on possibility to develop prediction model for water quality preservation.  Another note of appreciation goes to Mrs. Norhashimah Mat Sejani and Dr. MohdTaufikAbdullah for supporting with the intrusion data preparation and discussion.  A special thank is dedicated to the cyber threat profiling research team for various meetups which has inspired the approach introduced in this paper. 142017 FOURTHASIAN CONFERENCEON DEFENSETECHNOLOGY,TOKYO