Few-shot weakly-supervised cybersecurity anomaly detection

被引:3
作者
Kale, Rahul [1 ]
Thing, Vrizlynn L. L. [1 ]
机构
[1] ST Engn, Singapore, Singapore
关键词
Cybersecurity; Anomaly detection; Machine learning; Few-shot learning; Weakly-supervised learning; LEARNING-BASED MODEL;
D O I
10.1016/j.cose.2023.103194
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With increased reliance on Internet based technologies, cyberattacks compromising users' sensitive data are becoming more prevalent. The scale and frequency of these attacks are escalating rapidly, affecting systems and devices connected to the Internet. The traditional defense mechanisms may not be suffi-ciently equipped to handle the complex and ever-changing new threats. The significant breakthroughs in the machine learning methods including deep learning, had attracted interests from the cybersecurity research community for further enhancements in the existing anomaly detection methods. Unfortunately, collecting labelled anomaly data for all new evolving and sophisticated attacks is not practical. Training and tuning the machine learning model for anomaly detection using only a handful of labelled data sam-ples is a pragmatic approach. Therefore, few-shot weakly supervised anomaly detection is an encouraging research direction. In this paper, we propose an enhancement to an existing few-shot weakly-supervised deep learning anomaly detection framework. This framework incorporates data augmentation, representa-tion learning and ordinal regression. We then evaluated and showed the performance of our implemented framework on three benchmark datasets: NSL-KDD, CIC-IDS2018, and TON_IoT.(c) 2023 Elsevier Ltd. All rights reserved.
引用
收藏
页数:10
相关论文
共 34 条
[1]   Hybrid Anomaly Detection by Using Clustering for Wireless Sensor Network [J].
Ahmad, Bilal ;
Jian, Wang ;
Ali, Zain Anwar ;
Tanvir, Sania ;
Khan, M. Sadiq Ali .
WIRELESS PERSONAL COMMUNICATIONS, 2019, 106 (04) :1841-1853
[2]   GANomaly: Semi-supervised Anomaly Detection via Adversarial Training [J].
Akcay, Samet ;
Atapour-Abarghouei, Amir ;
Breckon, Toby P. .
COMPUTER VISION - ACCV 2018, PT III, 2019, 11363 :622-637
[3]   DAEMON: Unsupervised Anomaly Detection and Interpretation for Multivariate Time Series [J].
Chen, Xuanhao ;
Deng, Liwei ;
Huang, Feiteng ;
Zhang, Chengwei ;
Zhang, Zongquan ;
Zhao, Yan ;
Zheng, Kai .
2021 IEEE 37TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2021), 2021, :2225-2230
[4]   Few-shot Network Anomaly Detection via Cross-network Meta-learning [J].
Ding, Kaize ;
Zhou, Qinghai ;
Tong, Hanghang ;
Liu, Huan .
PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE 2021 (WWW 2021), 2021, :2448-2456
[5]   Network anomaly detection based on selective ensemble algorithm [J].
Du, Hongle ;
Zhang, Yan .
JOURNAL OF SUPERCOMPUTING, 2021, 77 (03) :2875-2896
[6]   Dealing With COVID-19 Network Traffic Spikes [J].
Elsayed, Mahmoud Said ;
Le-Khac, Nhien-An ;
Jurcut, Anca Delia .
IEEE SECURITY & PRIVACY, 2021, 19 (01) :90-94
[7]   An introduction to ROC analysis [J].
Fawcett, Tom .
PATTERN RECOGNITION LETTERS, 2006, 27 (08) :861-874
[8]   On the nature and types of anomalies: a review of deviations in data [J].
Foorthuis, Ralph .
INTERNATIONAL JOURNAL OF DATA SCIENCE AND ANALYTICS, 2021, 12 (04) :297-331
[9]   A Hybrid Deep Learning-Based Model for Anomaly Detection in Cloud Datacenter Networks [J].
Garg, Sahil ;
Kaur, Kuljeet ;
Kumar, Neeraj ;
Kaddoum, Georges ;
Zomaya, Albert Y. ;
Ranjan, Rajiv .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2019, 16 (03) :924-935
[10]   A framework to assess impacts of cyber attacks in manufacturing [J].
Giehl, Alexander ;
Wiedermann, Norbert ;
Plaga, Sven .
PROCEEDINGS OF 2019 11TH INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2019), 2019, :127-132