Building a Machine Learning Model for the SOC, by the Input from the SOC, and Analyzing it for the SOC

被引:0
作者
Sopan, Awalin [1 ]
Berninger, Matthew [1 ]
Mulakaluri, Murali [1 ]
Katakam, Raj [1 ]
机构
[1] FireEye Inc, Milpitas, CA 95035 USA
来源
2018 IEEE SYMPOSIUM ON VISUALIZATION FOR CYBER SECURITY (VIZSEC 2018) | 2018年
关键词
Cyber security; Machine Learning; Information Visualization; Security Operations Center;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work demonstrates an ongoing effort to employ and explain machine learning model predictions for classifying alerts in Security Operations Centers (SOC). Our ultimate goal is to reduce analyst workload by automating the process of decision making for investigating alerts using the machine learning model in cases where we can completely trust the model. This way, SOC analysts will be able to focus their time and effort to investigate more complex cases of security alerts. To achieve this goal, we developed a system that shows the prediction for an alert and the prediction explanation to security analysts during their daily workflow of investigating individual security alerts. Another part of our system presents the aggregated model analytics to the managers and stakeholders to help them understand the model and decide, on when to trust the model and let the model make the final decision. Using our prediction explanation visualization, security analysts will be able to classify oncoming alerts more efficiently and gain insight into how a machine learning model generates predictions. Our model performance analysis dashboard helps decision makers analyze the model in signature level granularity and gain more insights about the model.
引用
收藏
页数:8
相关论文
共 17 条
  • [1] Agrawal A., 2018, Prediction Machines: The Simple Economics of Artificial Intelligence, DOI DOI 10.1080/15228053.2019.1673511
  • [2] Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey
    Akhtar, Naveed
    Mian, Ajmal
    [J]. IEEE ACCESS, 2018, 6 : 14410 - 14430
  • [3] Angelini Marco, 2017, VIZSEC
  • [4] Enhancing the Cybersecurity Workforce
    Assante, Michael J.
    Tobey, David H.
    [J]. IT PROFESSIONAL, 2011, 13 (01) : 12 - 15
  • [5] A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
    Buczak, Anna L.
    Guven, Erhan
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02): : 1153 - 1176
  • [6] Cappers Bram C.M., 2016, VIZSEC
  • [7] An introduction to ROC analysis
    Fawcett, Tom
    [J]. PATTERN RECOGNITION LETTERS, 2006, 27 (08) : 861 - 874
  • [8] Interacting with Predictions: Visual Inspection of Black-box Machine Learning Models
    Krause, Josua
    Perer, Adam
    Ng, Kenney
    [J]. 34TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, CHI 2016, 2016, : 5686 - 5697
  • [9] Krause Josua, 2017, WORKFLOW VISUAL DIAG
  • [10] LeDoux C, 2015, STUD COMPUT INTELL, V563, P1, DOI 10.1007/978-3-319-08624-8_1