Unsupervised Anomaly Detection Approach for Cyberattack Identification

被引:3
作者
Segurola-Gil, Lander [1 ,2 ]
Moreno-Moreno, Mikel [1 ]
Irigoien, Itziar [2 ]
Florez-Tapia, Ane Miren [1 ]
机构
[1] Basque Res & Technol Alliance, Digital Secur, Vicomtech, Mikeletegi 57, Donostia San Sebastian 20009, Spain
[2] Univ Basque Country UPV EHU, Dept Comp Sci & Artificial Intelligence, Manuel Lardizabal Pasealekua 1, Donostia San Sebastian 20018, Spain
关键词
Unsupervised techniques; Anomaly detection; Feature selection; Model optimization; INTERNET; THINGS;
D O I
10.1007/s13042-024-02237-w
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the increasing amount of devices connected to the huge net known as the internet, it is not surprising the corresponding growth of cyber attacks. The era of the Internet of Things (IoT) has proved to be an environment in which malicious activities have been able to proliferate with great comfort. Due to this kind of threat, having powerful machine learning-based classifiers is almost a critical need nowadays. Besides, to properly face new and previously unseen attacks unsupervised learners need to be involved. An unsupervised network threat detector is provided in this work. The proposed approach is based on three steps. The main one is a novel anomaly score, which relies on modeling the tails of the empirical distributions and on an interpretation of the well-known Bayes theorem. A step for an unsupervised feature selection and another one for data reduction are also considered, both aimed at gaining robustness of the procedure. All three steps are in a completely unsupervised way, facilitating an ad hoc scenario deploying. The whole method showed good performance reaching 98.44%\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$98.44\%$$\end{document} and 98.14%\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$98.14\%$$\end{document} in the F1-score over different datasets. The obtained results are competitive with other state-of-the-art methods.
引用
收藏
页码:5291 / 5302
页数:12
相关论文
共 36 条
[1]   IoT Botnet Anomaly Detection Using Unsupervised Deep Learning [J].
Apostol, Ioana ;
Preda, Marius ;
Nila, Constantin ;
Bica, Ion .
ELECTRONICS, 2021, 10 (16)
[2]  
Arnold BC, 2008, ECON STUD INEQUAL SO, V5, P119, DOI 10.1007/978-0-387-72796-7_7
[3]   Botnets and Internet of Things Security [J].
Bertino, Elisa ;
Islam, Nayeem .
COMPUTER, 2017, 50 (02) :76-79
[4]   A Hierarchical Hybrid Intrusion Detection Approach in IoT Scenarios [J].
Bovenzi, Giampaolo ;
Aceto, Giuseppe ;
Ciuonzo, Domenico ;
Persico, Valerio ;
Pescape, Antonio .
2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
[5]   Unsupervised Network Intrusion Detection Systems: Detecting the Unknown without Knowledge [J].
Casas, Pedro ;
Mazel, Johan ;
Owezarski, Philippe .
COMPUTER COMMUNICATIONS, 2012, 35 (07) :772-783
[6]   Minority Resampling Boosted Unsupervised Learning With Hyperdimensional Computing for Threat Detection at the Edge of Internet of Things [J].
Christopher, Vivek ;
Aathman, Tharmasanthiran ;
Mahendrakumaran, Kayathiri ;
Nawaratne, Rashmika ;
De Silva, Daswin ;
Nanayakkara, Vishaka ;
Alahakoon, Damminda .
IEEE ACCESS, 2021, 9 :126646-126657
[7]  
Daniel W., 1999, Biostatistics: A foundation for analysis in the health sciences, V141
[8]  
Dean T, 2017, U.S. Patent, Patent No. [US20170230392A1, 20170230392]
[9]   Comparing and Analyzing Applications of Intelligent Techniques in Cyberattack Detection [J].
Dixit, Priyanka ;
Kohli, Rashi ;
Acevedo-Duque, Angel ;
Gonzalez-Diaz, Romel Ramon ;
Jhaveri, Rutvij H. .
SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
[10]  
Dlamini G., 2019, I C COMP SYST APPLIC, P1, DOI DOI 10.1109/aiccsa47632.2019.9035217