Determining Viability of Deep Learning on Cybersecurity Log Analytics

被引:0
作者
Lorenzen, Casey [1 ]
Agrawal, Rajeev [1 ]
King, Jason [1 ]
机构
[1] US Army Engineer Res & Dev Ctr, Informat Technol Lab, Vicksburg, MS 39180 USA
来源
2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA) | 2018年
关键词
Deep Learning; Cybersecurity; High Performance Computing;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Department of Defense currently maintains a network known as the Defense Research Engineering Network (DREN), which provides various Department of Defense (DoD) sites across the nation connectivity to HPC resource centers. To ensure the security of the DREN system, a defense system known as the Cybersecurity Environment for Detection, Analysis, and Reporting (CEDAR) was created. CEDAR contains a variety of cybersecurity sensors, which constantly monitor and record real time network activity on the DREN. Over time, CEDAR has accumulated massive quantities of valuable cybersecurity data, which necessitates a form of automation in the process of reviewing this data. We propose the application of deep learning techniques to CEDAR data in an attempt to automatically detect potentially malicious activity in a more agile and adaptable manner. These deep learning techniques can be carried out in a high performance computing (HPC) environment, allowing for the rapid utilization of large amounts of data. Our most effective model is able to classify CEDAR alerts as malicious with an accuracy sufficient to greatly reduce human analyst workloads.
引用
收藏
页码:4806 / 4811
页数:6
相关论文
共 50 条
  • [41] Deep Learning for Predictive Analytics in Reversible Steganography
    Chang, Ching-Chun
    Wang, Xu
    Chen, Sisheng
    Echizen, Isao
    Sanchez, Victor
    Li, Chang-Tsun
    IEEE ACCESS, 2023, 11 : 3494 - 3510
  • [42] Deep learning for EEG data analytics: A survey
    Li, Gen
    Lee, Chang Ha
    Jung, Jason J.
    Youn, Young Chul
    Camacho, David
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (18)
  • [43] Big Data Analytics - an Influence of Deep Learning
    Chandralekha, C.
    Divya, S.
    Aiswarya, N.
    BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2020, 13 (06): : 220 - 223
  • [44] Parking Analytics Framework using Deep Learning
    Benjdira, Bilel
    Koubaa, Anis
    Boulila, Wadii
    Ammar, Adel
    2022 2ND INTERNATIONAL CONFERENCE OF SMART SYSTEMS AND EMERGING TECHNOLOGIES (SMARTTECH 2022), 2022, : 200 - 205
  • [45] Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems
    Macas, Mayra
    Wu, Chunming
    Fuertes, Walter
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 238
  • [46] Cybersecurity Management Through Logging Analytics
    Muggler, Michael
    Eshwarappa, Rekha
    Cankaya, Ebru Celikel
    ADVANCES IN HUMAN FACTORS IN CYBERSECURITY, 2018, 593 : 3 - 15
  • [47] A Brief Survey of Deep Learning Approaches for Learning Analytics on MOOCs
    Sun, Zhongtian
    Harit, Anoushka
    Yu, Jialin
    Cristea, Alexandra, I
    Shi, Lei
    INTELLIGENT TUTORING SYSTEMS (ITS 2021), 2021, 12677 : 28 - 37
  • [48] Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey
    Zhang, Jun
    Pan, Lei
    Han, Qing-Long
    Chen, Chao
    Wen, Sheng
    Xiang, Yang
    IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2022, 9 (03) : 377 - 391
  • [49] IIoT Malware Detection Using Edge Computing and Deep Learning for Cybersecurity in Smart Factories
    Kim, Ho-myung
    Lee, Kyung-ho
    APPLIED SCIENCES-BASEL, 2022, 12 (15):
  • [50] An efficient cybersecurity framework for facial video forensics detection based on multimodal deep learning
    Sedik, Ahmed
    Faragallah, Osama S.
    El-sayed, Hala S.
    El-Banby, Ghada M.
    Abd El-Samie, Fathi E.
    Khalaf, Ashraf A. M.
    El-Shafai, Walid
    NEURAL COMPUTING & APPLICATIONS, 2022, 34 (02) : 1251 - 1268