Determining Viability of Deep Learning on Cybersecurity Log Analytics

被引:0
|
作者
Lorenzen, Casey [1 ]
Agrawal, Rajeev [1 ]
King, Jason [1 ]
机构
[1] US Army Engineer Res & Dev Ctr, Informat Technol Lab, Vicksburg, MS 39180 USA
来源
2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA) | 2018年
关键词
Deep Learning; Cybersecurity; High Performance Computing;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Department of Defense currently maintains a network known as the Defense Research Engineering Network (DREN), which provides various Department of Defense (DoD) sites across the nation connectivity to HPC resource centers. To ensure the security of the DREN system, a defense system known as the Cybersecurity Environment for Detection, Analysis, and Reporting (CEDAR) was created. CEDAR contains a variety of cybersecurity sensors, which constantly monitor and record real time network activity on the DREN. Over time, CEDAR has accumulated massive quantities of valuable cybersecurity data, which necessitates a form of automation in the process of reviewing this data. We propose the application of deep learning techniques to CEDAR data in an attempt to automatically detect potentially malicious activity in a more agile and adaptable manner. These deep learning techniques can be carried out in a high performance computing (HPC) environment, allowing for the rapid utilization of large amounts of data. Our most effective model is able to classify CEDAR alerts as malicious with an accuracy sufficient to greatly reduce human analyst workloads.
引用
收藏
页码:4806 / 4811
页数:6
相关论文
共 50 条
  • [1] Learning Representations for Log Data in Cybersecurity
    Arnaldo, Ignacio
    Cuesta-Infante, Alfredo
    Arun, Ankit
    Lam, Mei
    Bassias, Costas
    Veeramachaneni, Kalyan
    CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING (CSCML 2017), 2017, 10332 : 250 - 268
  • [2] Data Analytics for Cybersecurity Based on Machine Learning Algorithms
    Wang, Lidong
    Mosher, Reed L.
    Duett, Patti
    Falls, Terril C.
    SOUTHEASTCON 2023, 2023, : 810 - 814
  • [3] Machine Learning and Deep Learning Methods for Cybersecurity
    Xin, Yang
    Kong, Lingshuang
    Liu, Zhi
    Chen, Yuling
    Li, Yanmiao
    Zhu, Hongliang
    Gao, Mingcheng
    Hou, Haixia
    Wang, Chunhua
    IEEE ACCESS, 2018, 6 : 35365 - 35381
  • [4] Application of deep learning to cybersecurity: A survey
    Mandavifar, Samaneh
    Ghorbani, Ali A.
    NEUROCOMPUTING, 2019, 347 : 149 - 176
  • [5] Deep Learning in Cybersecurity: Challenges and Approaches
    Imamverdiyev, Yadigar N.
    Abdullayeva, Fargana J.
    INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2020, 10 (02) : 82 - 105
  • [6] Machine Learning and Deep Learning Approaches for CyberSecurity: A Review
    Halbouni, Asmaa
    Gunawan, Teddy Surya
    Habaebi, Mohamed Hadi
    Halbouni, Murad
    Kartiwi, Mira
    Ahmad, Robiah
    IEEE ACCESS, 2022, 10 : 19572 - 19585
  • [7] Deep learning applications on cybersecurity: A practical approach
    Miranda-Garcia, Alberto
    Rego, Agustin Zubillaga
    Pastor-Lopez, Iker
    Sanz, Borja
    Tellaeche, Alberto
    Gaviria, Jose
    Bringas, Pablo G.
    NEUROCOMPUTING, 2024, 563
  • [8] A Model Proposal of Cybersecurity for the IIoT: Enhancing IIoT Cybersecurity through Machine Learning and Deep Learning Techniques
    Buja, Atdhe
    Apostolova, Marika
    Luma, Artan
    ADVANCES IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING, 2024, 4 (03): : 2408 - 2415
  • [9] Cybersecurity in Deep Learning Techniques: Detecting Network Attacks
    Ghazal, Shatha Fawaz
    Mjlae, Salameh A.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (11) : 221 - 230
  • [10] Attacks to Automatous Vehicles: A Deep Learning Algorithm for Cybersecurity
    Aldhyani, Theyazn H. H.
    Alkahtani, Hasan
    SENSORS, 2022, 22 (01)