Evidential classification and feature selection for cyber-threat hunting

被引:8
作者
Beechey, Matthew [1 ]
Kyriakopoulos, Konstantinos G. [1 ]
Lambotharan, Sangarapillai [1 ]
机构
[1] Loughborough Univ, Wolfson Sch Mech Elect & Mfg Engn, Loughborough, Leics, England
关键词
Feature selection; Dempster-Shafer Theory; Evidence theory; Evidential classification; Logistic regression;
D O I
10.1016/j.knosys.2021.107120
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, there has been an immense research interest in applying Machine Learning for defending networked systems from cyber threats. A particular challenge in this domain is the identification and selection of appropriate features that ensure prompt and correct cyber threat detection. This work proposes a novel approach that leverages recent advances in evidence theory to provide a deep insight on the effect of each feature's uncertainty on the overall classification decision. As a result, a network security analyst may rank the features in a dataset from the most to the least ambiguous, without requiring expert domain knowledge in cyber threats. Ultimately, this enables the creation of cyber threat phenotypes, which may be used to detect and differentiate between similarly manifested cyber threats. The proposed approach is evaluated on a recent, challenging scenario of network security attacks and compared against multiple feature selection techniques. Based on the selected features, cyber threat classification analysis is performed using seven state-of-the-art ML classification algorithms. The results indicate the proposed evidence-based feature selection method performs better, or, at least as good, to the state-of-the-art. Against the best performing state-of-the-art technique, Decision Tree, the proposed technique's features enabled the classification process to take place in 93.25% of the time, whilst maintaining a high F1 Score of 0.99. Furthermore, the proposed technique's features enable a faster classification process requiring, on average, just 29.25% of the time compared to the average across other evaluated techniques. (C) 2021 Elsevier B.V. All rights reserved.
引用
收藏
页数:14
相关论文
共 45 条
[1]  
Alpaydin E., 2010, Introduction to machine learning, V2nd
[2]   Permutation importance: a corrected feature importance measure [J].
Altmann, Andre ;
Tolosi, Laura ;
Sander, Oliver ;
Lengauer, Thomas .
BIOINFORMATICS, 2010, 26 (10) :1340-1347
[3]  
Amini A., 2019, INT C LEARNING REPRE, P1
[4]  
[Anonymous], 1992, ANOVA REPEATED MEASU
[5]   Using Pattern-of-Life as Contextual Information for Anomaly-BAased Intrusion Detection Systems [J].
Aparicio-Navarro, Francisco J. ;
Kyriakopoulos, Konstantinos G. ;
Gong, Yu ;
Parish, David J. ;
Chambers, Jonathon A. .
IEEE ACCESS, 2017, 5 :22177-22193
[6]   Automatic Dataset Labelling and Feature Selection for Intrusion Detection Systems [J].
Aparicio-Navarro, Francisco J. ;
Kyriakopoulos, Konstantinos G. ;
Parish, David J. .
2014 IEEE MILITARY COMMUNICATIONS CONFERENCE: AFFORDABLE MISSION SUCCESS: MEETING THE CHALLENGE (MILCOM 2014), 2014, :46-51
[7]  
Bhattacharyya DK., 2013, Network anomaly detection: A machine learning perspective
[8]  
Borsuk M.E., 2008, Encyclopedia of Ecology, P307
[9]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32
[10]  
Canadian Institute of Cybersecurity, 2018, CSE CIC IDS2018 AWS