Learning to Learn Sequential Network Attacks Using Hidden Markov Models

被引:11
作者
Chadza, Timothy [1 ,2 ]
Kyriakopoulos, Konstantinos G. [1 ]
Lambotharan, Sangarapillai [1 ]
机构
[1] Loughborough Univ, Wolfson Sch Mech Elect & Mfg Engn, Loughborough LE11 3TU, Leics, England
[2] Univ Malawi Polytech, Dept Elect Engn, Blantyre, Malawi
基金
英国工程与自然科学研究理事会;
关键词
Hidden Markov models; Training; Machine learning; Forecasting; Adaptation models; Computational modeling; Task analysis; Transfer learning; hidden Markov model; Viterbi decoding; forward-backward; sequential network attacks; PREDICTION;
D O I
10.1109/ACCESS.2020.3011293
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The global surge of cyber-attacks in the form of sequential network attacks has propelled the need for robust intrusion detection and prediction systems. Such attacks are difficult to reveal using current intrusion detection systems, since each individual attack phase may appear benign when examined outside of its context. In addition, there are challenges in building supervised learning models for such attacks, since there are limited labelled datasets available. Hence, there is a need for updating already built models to specific operational environments and for addressing the concept drift. A hidden Markov model (HMM) is a popular framework for sequential modelling, however, in addition to the above challenges, the model parameters are difficult to optimise. This paper proposes a transfer learning (TL) approach that exploits already learned knowledge, gained from a labelled source dataset, and adapts it on a different, unlabelled target dataset. The datasets may be from a different but related domain. Five unsupervised HMM techniques are developed utilising a TL approach and evaluated against conventional machine learning approaches. Baum-Welch (BW), Viterbi training, gradient descent, differential evolution (DE) and simulated annealing, are deployed for the detection of attack stages in the network traffic, as well as, forecasting both the next most probable attack stage and its method of manifestation. Specifically, for the prediction of the three next most likely states and observations, TL with DE achieved a maximum accuracy improvement of 48.3%, and 27.4%, respectively. Finally, the actual detection prediction for the three next most probable states and methods of manifestation reaches 78.9% and 96.3% using TL with BW and DE, respectively.
引用
收藏
页码:134480 / 134497
页数:18
相关论文
共 41 条
[1]   Cyber-Attack Modeling Analysis Techniques: An Overview [J].
AL-Mohannadi, Hamad ;
Mirza, Qublai ;
Namanya, Anitta ;
Awan, Irfan ;
Cullen, Andrea ;
Disso, Jules .
2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW), 2016, :69-76
[2]  
[Anonymous], 2011, LEADING ISSUES INFOR
[3]  
Argyriou A., 2008, Advances in Neural Information Processing Systems, P25
[4]  
Benyacoub B., 2013, P ACS INT C COMP SYS, P1
[5]  
Brownlee J., 2017, A gentle introduction to transfer learning for deep learning
[6]  
Canadian Institute for Cybersecurity, CSE CIC IDS2018 AWS
[7]   Contemporary Sequential Network Attacks Prediction using Hidden Markov Model [J].
Chadza, Timothy ;
Kyriakopoulos, Konstantinos G. ;
Lambotharan, Sangarapillai .
2019 17TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2019, :333-335
[8]   Analysis of hidden Markov model learning algorithms for the detection and prediction of multi-stage network attacks [J].
Chadza, Timothy ;
Kyriakopoulos, Konstantinos G. ;
Lambotharan, Sangarapillai .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 108 (108) :636-649
[9]  
CISCO & Affliates, SNORT NETW INTR DET
[10]  
Cummings J.J., PULLEDPORK