{"id":24465,"date":"2020-05-30T06:00:00","date_gmt":"2020-05-30T13:00:00","guid":{"rendered":"https:\/\/insidebigdata.com\/?p=24465"},"modified":"2020-09-20T18:22:40","modified_gmt":"2020-09-21T01:22:40","slug":"research-highlights-midas-real-time-anomaly-fake-news-intrusion-detection","status":"publish","type":"post","link":"https:\/\/insidebigdata.com\/2020\/05\/30\/research-highlights-midas-real-time-anomaly-fake-news-intrusion-detection\/","title":{"rendered":"Research Highlights: MIDAS &#8211; Real-time Anomaly\/Fake News\/Intrusion Detection"},"content":{"rendered":"\n<p>In the insideBIGDATA Research Highlights column we take a look at new and upcoming results from the research community for data science, machine learning, AI and deep learning. Our readers need to get a glimpse for technology coming down the pipeline that will make their efforts more strategic and competitive. In this installment we review <em>MIDAS &#8211; Real-time Anomaly\/Fake News\/Intrusion Detection<\/em> developed by Ph.D. candidate Siddharth Bhatia and his team at the National University of Singapore.<\/p>\n\n\n\n<p>MIDAS finds anomalies or malicious entities in time-evolving graphs. MIDAS can be used to detect intrusions, Denial of Service (DoS), and Distributed Denial of Service (DDoS) attacks. MIDAS is a new approach to anomaly detection that outperforms baseline approaches both in speed and accuracy. It can also be used to detect fake profiles in Social Networks like Twitter, Facebook, Amazon reviews, and Financial Frauds. MIDAS requires constant memory to detect these anomalies in real-time so as to minimize the harm caused by them.&nbsp;Also, MIDAS is up to 48% more accurate while being up to 644 times faster than the state of the art approaches.<\/p>\n\n\n\n<p>MIDAS is currently being deployed in real-world systems to improve their performance. Different cybersecurity firms are seeking specially tuned versions of MIDAS according to their requirements.&nbsp;Different developers have implemented MIDAS in Python, Ruby, Rust, R, and Golang in addition to the C++ version that was originally released. MIDAS source code and different implementations are open source, and available on the <a rel=\"noreferrer noopener\" href=\"https:\/\/github.com\/bhatiasiddharth\/MIDAS\/\" target=\"_blank\">Github Project Page.<\/a><\/p>\n\n\n\n<p>At the National University of Singapore, Ph.D. candidate\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.comp.nus.edu.sg\/~sbhatia\/\" target=\"_blank\">Siddharth Bhatia<\/a>\u00a0and his team have developed MIDAS. The MIDAS research paper can be found <a rel=\"noreferrer noopener\" href=\"https:\/\/www.comp.nus.edu.sg\/~sbhatia\/assets\/pdf\/midas.pdf\" target=\"_blank\">HERE<\/a>. The video below summarizes work with MIDAS: Microcluster-Based Detector of Anomalies in Edge Streams.<\/p>\n\n\n\n<p>NOTE: the team recently posted 2 new anomaly detection research papers on arXiv.org: <a href=\"https:\/\/arxiv.org\/pdf\/2009.08452.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">paper 1<\/a> and <a href=\"https:\/\/arxiv.org\/pdf\/2009.08451.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">paper 2<\/a>. <\/p>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\"  id=\"_ytid_12868\"  width=\"480\" height=\"270\"  data-origwidth=\"480\" data-origheight=\"270\" src=\"https:\/\/www.youtube.com\/embed\/Bd4PyLCHrto?enablejsapi=1&#038;autoplay=0&#038;cc_load_policy=0&#038;cc_lang_pref=&#038;iv_load_policy=1&#038;loop=0&#038;modestbranding=0&#038;rel=1&#038;fs=1&#038;playsinline=0&#038;autohide=2&#038;theme=dark&#038;color=red&#038;controls=1&#038;\" class=\"__youtube_prefs__  epyt-is-override  no-lazyload\" title=\"YouTube player\"  allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen data-no-lazy=\"1\" data-skipgform_ajax_framebjll=\"\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><em>Sign up for the free insideBIGDATA&nbsp;<a rel=\"noreferrer noopener\" href=\"http:\/\/insidebigdata.com\/newsletter\/\" target=\"_blank\">newsletter<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the insideBIGDATA Research Highlights column we take a look at new and upcoming results from the research community for data science, machine learning, AI and deep learning. Our readers need to get a glimpse for technology coming down the pipeline that will make their efforts more strategic and competitive. In this installment we review MIDAS &#8211; Real-time Anomaly\/Fake News\/Intrusion Detection developed by Ph.D. candidate Siddharth Bhatia and his team at the National University of Singapore.<\/p>\n","protected":false},"author":10513,"featured_media":22375,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"categories":[526,182,87,180,67,56,84,1],"tags":[437,718,798,96],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Research Highlights: MIDAS - Real-time Anomaly\/Fake News\/Intrusion Detection - insideBIGDATA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/insidebigdata.com\/2020\/05\/30\/research-highlights-midas-real-time-anomaly-fake-news-intrusion-detection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Research Highlights: MIDAS - Real-time Anomaly\/Fake News\/Intrusion Detection - insideBIGDATA\" \/>\n<meta property=\"og:description\" content=\"In the insideBIGDATA Research Highlights column we take a look at new and upcoming results from the research community for data science, machine learning, AI and deep learning. Our readers need to get a glimpse for technology coming down the pipeline that will make their efforts more strategic and competitive. In this installment we review MIDAS - Real-time Anomaly\/Fake News\/Intrusion Detection developed by Ph.D. candidate Siddharth Bhatia and his team at the National University of Singapore.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/insidebigdata.com\/2020\/05\/30\/research-highlights-midas-real-time-anomaly-fake-news-intrusion-detection\/\" \/>\n<meta property=\"og:site_name\" content=\"insideBIGDATA\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/insidebigdata\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-30T13:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-21T01:22:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/insidebigdata.com\/wp-content\/uploads\/2019\/03\/Anomaly_detection_SHUTTERSTOCK.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"193\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Editorial Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@insideBigData\" \/>\n<meta name=\"twitter:site\" content=\"@insideBigData\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editorial Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/insidebigdata.com\/2020\/05\/30\/research-highlights-midas-real-time-anomaly-fake-news-intrusion-detection\/\",\"url\":\"https:\/\/insidebigdata.com\/2020\/05\/30\/research-highlights-midas-real-time-anomaly-fake-news-intrusion-detection\/\",\"name\":\"Research Highlights: MIDAS - Real-time Anomaly\/Fake News\/Intrusion Detection - insideBIGDATA\",\"isPartOf\":{\"@id\":\"https:\/\/insidebigdata.com\/#website\"},\"datePublished\":\"2020-05-30T13:00:00+00:00\",\"dateModified\":\"2020-09-21T01:22:40+00:00\",\"author\":{\"@id\":\"https:\/\/insidebigdata.com\/#\/schema\/person\/2949e412c144601cdbcc803bd234e1b9\"},\"breadcrumb\":{\"@id\":\"https:\/\/insidebigdata.com\/2020\/05\/30\/research-highlights-midas-real-time-anomaly-fake-news-intrusion-detection\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/insidebigdata.com\/2020\/05\/30\/research-highlights-midas-real-time-anomaly-fake-news-intrusion-detection\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/insidebigdata.com\/2020\/05\/30\/research-highlights-midas-real-time-anomaly-fake-news-intrusion-detection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/insidebigdata.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Research Highlights: MIDAS &#8211; Real-time Anomaly\/Fake News\/Intrusion Detection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/insidebigdata.com\/#website\",\"url\":\"https:\/\/insidebigdata.com\/\",\"name\":\"insideBIGDATA\",\"description\":\"Your Source for AI, Data Science, Deep Learning &amp; Machine Learning Strategies\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/insidebigdata.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/insidebigdata.com\/#\/schema\/person\/2949e412c144601cdbcc803bd234e1b9\",\"name\":\"Editorial Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/insidebigdata.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e137ce7ea40e38bd4d25bb7860cfe3e4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e137ce7ea40e38bd4d25bb7860cfe3e4?s=96&d=mm&r=g\",\"caption\":\"Editorial Team\"},\"sameAs\":[\"http:\/\/www.insidebigdata.com\"],\"url\":\"https:\/\/insidebigdata.com\/author\/editorial\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Research Highlights: MIDAS - Real-time Anomaly\/Fake News\/Intrusion Detection - insideBIGDATA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/insidebigdata.com\/2020\/05\/30\/research-highlights-midas-real-time-anomaly-fake-news-intrusion-detection\/","og_locale":"en_US","og_type":"article","og_title":"Research Highlights: MIDAS - Real-time Anomaly\/Fake News\/Intrusion Detection - insideBIGDATA","og_description":"In the insideBIGDATA Research Highlights column we take a look at new and upcoming results from the research community for data science, machine learning, AI and deep learning. Our readers need to get a glimpse for technology coming down the pipeline that will make their efforts more strategic and competitive. In this installment we review MIDAS - Real-time Anomaly\/Fake News\/Intrusion Detection developed by Ph.D. candidate Siddharth Bhatia and his team at the National University of Singapore.","og_url":"https:\/\/insidebigdata.com\/2020\/05\/30\/research-highlights-midas-real-time-anomaly-fake-news-intrusion-detection\/","og_site_name":"insideBIGDATA","article_publisher":"http:\/\/www.facebook.com\/insidebigdata","article_published_time":"2020-05-30T13:00:00+00:00","article_modified_time":"2020-09-21T01:22:40+00:00","og_image":[{"width":300,"height":193,"url":"https:\/\/insidebigdata.com\/wp-content\/uploads\/2019\/03\/Anomaly_detection_SHUTTERSTOCK.jpg","type":"image\/jpeg"}],"author":"Editorial Team","twitter_card":"summary_large_image","twitter_creator":"@insideBigData","twitter_site":"@insideBigData","twitter_misc":{"Written by":"Editorial Team","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/insidebigdata.com\/2020\/05\/30\/research-highlights-midas-real-time-anomaly-fake-news-intrusion-detection\/","url":"https:\/\/insidebigdata.com\/2020\/05\/30\/research-highlights-midas-real-time-anomaly-fake-news-intrusion-detection\/","name":"Research Highlights: MIDAS - Real-time Anomaly\/Fake News\/Intrusion Detection - insideBIGDATA","isPartOf":{"@id":"https:\/\/insidebigdata.com\/#website"},"datePublished":"2020-05-30T13:00:00+00:00","dateModified":"2020-09-21T01:22:40+00:00","author":{"@id":"https:\/\/insidebigdata.com\/#\/schema\/person\/2949e412c144601cdbcc803bd234e1b9"},"breadcrumb":{"@id":"https:\/\/insidebigdata.com\/2020\/05\/30\/research-highlights-midas-real-time-anomaly-fake-news-intrusion-detection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/insidebigdata.com\/2020\/05\/30\/research-highlights-midas-real-time-anomaly-fake-news-intrusion-detection\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/insidebigdata.com\/2020\/05\/30\/research-highlights-midas-real-time-anomaly-fake-news-intrusion-detection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/insidebigdata.com\/"},{"@type":"ListItem","position":2,"name":"Research Highlights: MIDAS &#8211; Real-time Anomaly\/Fake News\/Intrusion Detection"}]},{"@type":"WebSite","@id":"https:\/\/insidebigdata.com\/#website","url":"https:\/\/insidebigdata.com\/","name":"insideBIGDATA","description":"Your Source for AI, Data Science, Deep Learning &amp; Machine Learning Strategies","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/insidebigdata.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/insidebigdata.com\/#\/schema\/person\/2949e412c144601cdbcc803bd234e1b9","name":"Editorial Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/insidebigdata.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e137ce7ea40e38bd4d25bb7860cfe3e4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e137ce7ea40e38bd4d25bb7860cfe3e4?s=96&d=mm&r=g","caption":"Editorial Team"},"sameAs":["http:\/\/www.insidebigdata.com"],"url":"https:\/\/insidebigdata.com\/author\/editorial\/"}]}},"jetpack_featured_media_url":"https:\/\/insidebigdata.com\/wp-content\/uploads\/2019\/03\/Anomaly_detection_SHUTTERSTOCK.jpg","jetpack_shortlink":"https:\/\/wp.me\/p9eA3j-6mB","jetpack-related-posts":[{"id":31665,"url":"https:\/\/insidebigdata.com\/2023\/02\/20\/research-highlights-mit-develops-first-generative-model-for-anomaly-detection-that-combines-both-reconstruction-based-and-prediction-based-models\/","url_meta":{"origin":24465,"position":0},"title":"Research Highlights: MIT Develops First Generative Model for Anomaly Detection that Combines both Reconstruction-based and Prediction-based Models","date":"February 20, 2023","format":false,"excerpt":"Kalyan Veeramachaneni and his team at the MIT Data-to-AI (DAI) Lab have developed the first generative model, the AutoEncoder with Regression (AER) for time series anomaly detection, that combines both reconstruction-based and prediction-based models. They\u2019ve been building it for three years\u2014AER has been learning and extracting intelligence for signals and\u2026","rel":"","context":"In &quot;AI Deep Learning&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":31552,"url":"https:\/\/insidebigdata.com\/2023\/02\/03\/anomaly-detection-its-real-life-uses-and-the-latest-advances\/","url_meta":{"origin":24465,"position":1},"title":"Anomaly Detection: Its Real-Life Uses and the Latest Advances","date":"February 3, 2023","format":false,"excerpt":"In this contributed article, Al Gharakhanian, Machine Learning Development Director, Cognityze, takes a look at anomaly detection in terms of real-life use cases, addressing critical factors, along with the relationship with machine learning and artificial neural networks.","rel":"","context":"In &quot;AI Deep Learning&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":14037,"url":"https:\/\/insidebigdata.com\/2015\/11\/13\/numenta-anomaly-benchmark-evaluates-anomaly-detection-techniques-for-real-time-streaming-data\/","url_meta":{"origin":24465,"position":2},"title":"Numenta Anomaly Benchmark Evaluates Anomaly Detection Techniques for Real-time, Streaming Data","date":"November 13, 2015","format":false,"excerpt":"Numenta, Inc., a leader in machine intelligence, launched the Numenta Anomaly Benchmark (NAB), an open-source benchmark and tool designed to help data researchers evaluate the effectiveness of algorithms for anomaly detection in streaming, real-time applications.","rel":"","context":"In &quot;Big Data&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":27358,"url":"https:\/\/insidebigdata.com\/2021\/10\/15\/best-of-arxiv-org-for-ai-machine-learning-and-deep-learning-september-2021\/","url_meta":{"origin":24465,"position":3},"title":"Best of arXiv.org for AI, Machine Learning, and Deep Learning \u2013 September 2021","date":"October 15, 2021","format":false,"excerpt":"In this recurring monthly feature, we will filter all the recent research papers appearing in the arXiv.org preprint server for subjects relating to AI, machine learning and deep learning \u2013 from disciplines including statistics, mathematics and computer science \u2013 and provide you with a useful \u201cbest of\u201d list for the\u2026","rel":"","context":"In &quot;AI Deep Learning&quot;","img":{"alt_text":"","src":"https:\/\/i0.wp.com\/insidebigdata.com\/wp-content\/uploads\/2013\/12\/arxiv.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":12802,"url":"https:\/\/insidebigdata.com\/2015\/02\/27\/blue-coat-systems-prelert-partner-provide-anomaly-detection-security-solutions\/","url_meta":{"origin":24465,"position":4},"title":"Blue Coat Systems and Prelert Partner to Provide Anomaly Detection in Security Solutions","date":"February 27, 2015","format":false,"excerpt":"Prelert, a leading provider of machine learning anomaly detection, and Blue Coat Systems, Inc., a market leader in enterprise security, announced a partnership to integrate Prelert\u2019s machine learning analytics into Blue Coat\u2019s portfolio of security solutions.","rel":"","context":"In &quot;Big Data&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":11113,"url":"https:\/\/insidebigdata.com\/2014\/08\/26\/prelert-extends-anomaly-detection-elasticsearch\/","url_meta":{"origin":24465,"position":5},"title":"Prelert Extends Anomaly Detection to Elasticsearch","date":"August 26, 2014","format":false,"excerpt":"Prelert, the anomaly detection company, today announced the release of an Elasticsearch Connector to help developers quickly and easily deploy its machine learning-based Anomaly Detective\u00ae engine on their Elasticsearch ELK (Elasticsearch, Logstash, Kibana) stack.","rel":"","context":"In &quot;Big Data&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/posts\/24465"}],"collection":[{"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/users\/10513"}],"replies":[{"embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/comments?post=24465"}],"version-history":[{"count":0,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/posts\/24465\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/media\/22375"}],"wp:attachment":[{"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/media?parent=24465"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/categories?post=24465"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/tags?post=24465"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}