Unsupervised Anomaly Detection Using a New Knowledge Graph Model for Network Activity and Events

被引:1
作者
Quinan, Paulo Gustavo [1 ]
Traore, Issa [1 ]
Gondhi, Ujwal Reddy [1 ]
Woungang, Isaac [2 ]
机构
[1] Univ Victoria, ECE Dept, Victoria, BC, Canada
[2] Ryerson Univ, Dept Comp Sci, Toronto, ON, Canada
来源
MACHINE LEARNING FOR NETWORKING, MLN 2021 | 2022年 / 13175卷
关键词
Anomaly detection; Graph database; Unsupervised machine learning; Intrusion detection system;
D O I
10.1007/978-3-030-98978-1_8
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The activity and event network (AEN) is a new knowledge graph used to develop and maintain a model for a whole network under monitoring and the relationships between the different network entities as they change through time. In this paper, we show how the AEN graph model can be used for threat identification by introducing an unsupervised anomaly detection model that leverages the probabilistic characteristics of the graph and the bits of meta rarity metric. A series of statistical features and underlying distributions are computed based on the graphical model of network activity and events. The anomaly scores of events are calculated by applying the bits of meta rarity to the aforementioned feature model and underlying distributions. Experimental evaluation is conducted a public cloud-based IDS yielding encouraging performance results.
引用
收藏
页码:117 / 130
页数:14
相关论文
共 8 条
[1]   Hypervisor-based cloud intrusion detection through online multivariate statistical change tracking [J].
Aldribi, Abdulaziz ;
Traore, Issa ;
Moa, Belaid ;
Nwamuo, Onyekachi .
COMPUTERS & SECURITY, 2020, 88
[2]  
Aldribi A, 2018, STUD BIG DATA, V39, P333, DOI 10.1007/978-3-319-73676-1_13
[3]  
Ferragut E., 2012, P 2012 11 INT C MACH
[4]   A Context-Based Detection Framework for Advanced Persistent Threats [J].
Giura, Paul ;
Wang, Wei .
2012 ASE INTERNATIONAL CONFERENCE ON CYBER SECURITY (CYBERSECURITY), 2012, :69-74
[5]   Semantics-aware detection of targeted attacks: a survey [J].
Luh R. ;
Marschalek S. ;
Kaiser M. ;
Janicke H. ;
Schrittwieser S. .
Luh, Robert (robert.luh@fhstp.ac.at), 1600, Springer-Verlag France (13) :47-85
[6]   Outside the Closed World: On Using Machine Learning For Network Intrusion Detection [J].
Sommer, Robin ;
Paxson, Vern .
2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, :305-316
[7]  
Tandon G., 2009, P 2009 SIAM INT C DA, P871, DOI [10.1137/1.9781611972795.75, DOI 10.1137/1.9781611972795.75]
[8]  
Traore I., 2020, ACTIVITY EVENT NETWO