Unsupervised Anomaly Detection Approach for Cyberattack Identification

被引:4
作者
Segurola-Gil, Lander [1 ,2 ]
Moreno-Moreno, Mikel [1 ]
Irigoien, Itziar [2 ]
Florez-Tapia, Ane Miren [1 ]
机构
[1] Basque Res & Technol Alliance, Digital Secur, Vicomtech, Mikeletegi 57, Donostia San Sebastian 20009, Spain
[2] Univ Basque Country UPV EHU, Dept Comp Sci & Artificial Intelligence, Manuel Lardizabal Pasealekua 1, Donostia San Sebastian 20018, Spain
关键词
Unsupervised techniques; Anomaly detection; Feature selection; Model optimization; INTERNET; THINGS;
D O I
10.1007/s13042-024-02237-w
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the increasing amount of devices connected to the huge net known as the internet, it is not surprising the corresponding growth of cyber attacks. The era of the Internet of Things (IoT) has proved to be an environment in which malicious activities have been able to proliferate with great comfort. Due to this kind of threat, having powerful machine learning-based classifiers is almost a critical need nowadays. Besides, to properly face new and previously unseen attacks unsupervised learners need to be involved. An unsupervised network threat detector is provided in this work. The proposed approach is based on three steps. The main one is a novel anomaly score, which relies on modeling the tails of the empirical distributions and on an interpretation of the well-known Bayes theorem. A step for an unsupervised feature selection and another one for data reduction are also considered, both aimed at gaining robustness of the procedure. All three steps are in a completely unsupervised way, facilitating an ad hoc scenario deploying. The whole method showed good performance reaching 98.44%\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$98.44\%$$\end{document} and 98.14%\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$98.14\%$$\end{document} in the F1-score over different datasets. The obtained results are competitive with other state-of-the-art methods.
引用
收藏
页码:5291 / 5302
页数:12
相关论文
共 36 条
[31]   Design and Evaluation of Unsupervised Machine Learning Models for Anomaly Detection in Streaming Cybersecurity Logs [J].
Sanchez-Zas, Carmen ;
Larriva-Novo, Xavier ;
Villagra, Victor A. ;
Rodrigo, Mario Sanz ;
Moreno, Jose Ignacio .
MATHEMATICS, 2022, 10 (21)
[32]   NBcoded: Network Attack Classifiers Based on Encoder and Naive Bayes Model for Resource Limited Devices [J].
Segurola-Gil, Lander ;
Zola, Francesco ;
Echeberria-Barrio, Xabier ;
Orduna-Urrutia, Raul .
MACHINE LEARNING AND PRINCIPLES AND PRACTICE OF KNOWLEDGE DISCOVERY IN DATABASES, PT II, 2021, 1525 :55-70
[33]   CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques [J].
Shafiq, Muhammad ;
Tian, Zhihong ;
Bashir, Ali Kashif ;
Du, Xiaojiang ;
Guizani, Mohsen .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (05) :3242-3254
[34]   Unsupervised Machine Learning for Networking: Techniques, Applications and Research Challenges [J].
Usama, Muhammad ;
Qadir, Junaid ;
Raza, Aunn ;
Arif, Hunain ;
Yau, Kok-Lim Alvin ;
Elkhatib, Yehia ;
Hussain, Amir ;
Al-Fuqaha, Ala .
IEEE ACCESS, 2019, 7 :65579-65615
[35]   Unsupervised feature selection by regularized self-representation [J].
Zhu, Pengfei ;
Zuo, Wangmeng ;
Zhang, Lei ;
Hu, Qinghua ;
Shiu, Simon C. K. .
PATTERN RECOGNITION, 2015, 48 (02) :438-446
[36]   Network traffic analysis through node behaviour classification: a graph-based approach with temporal dissection and data-level preprocessing [J].
Zola, F. ;
Segurola-Gil, L. ;
Bruse, J. L. ;
Galar, M. ;
Orduna-Urrutia, R. .
COMPUTERS & SECURITY, 2022, 115