A Deep Belief Network Based Machine Learning System for Risky Host Detection

نویسندگان

  • Wangyan Feng
  • Shuning Wu
  • Xiaodan Li
  • Kevin Kunkle
چکیده

To assure enterprise security, typically a SIEM (Security Information and Event Management) system is built to correlate security events from different preventive technologies and flag alerts. Analysts in a security operations center (SOC) investigate the alerts to decide whether the related hosts are malicious or not. However, the number of alerts is overwhelming which exceeds the SOC’s capacity to handle and the false positive rate is also really high. Consequently, there is a great need to reduce the false alarms as much as possible. Instead of detecting network intrusion from outside of the enterprise, this paper focuses on detecting compromised hosts within enterprise by an intelligent Deep learning system. Our system leverages alert information, various security logs and analysts’ investigation results in a real enterprise environment to identify hosts with high likelihood of being compromised. Text mining and graph-based method are used to generate targets and extract features. In order to validate the effectiveness of our model, other machine learning algorithms such as Multi-layer Neural Network, Deep Neural Network, Random Forest etc. are applied to the same enterprise data. The results indicate that the Deep Belief Network (DBN) performs much better than other algorithms and is 6 times more effective than the current rule-based system. What is more, due to its effectiveness, this compromised host detection system has been implemented in a real enterprise production environment, which includes data collection, label creation, feature engineering and host score generation. Keywords—machine learning system; deep belief network; risky host detection

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism

Today, the use of the Internet and Internet sites has been an integrated part of the people’s lives, and most activities and important data are in the Internet websites. Thus, attempts to intrude into these websites have grown exponentially. Intrusion detection systems (IDS) of web attacks are an approach to protect users. But, these systems are suffering from such drawbacks as low accuracy in ...

متن کامل

A Hybrid Machine Learning Method for Intrusion Detection

Data security is an important area of concern for every computer system owner. An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations. Already various techniques of artificial intelligence have been used for intrusion detection. The main challenge in this area is the running speed of the available implemen...

متن کامل

Non-melanoma skin cancer diagnosis with a convolutional neural network

Background: The most common types of non-melanoma skin cancer are basal cell carcinoma (BCC), and squamous cell carcinoma (SCC). AKIEC -Actinic keratoses (Solar keratoses) and intraepithelial carcinoma (Bowen’s disease)- are common non-invasive precursors of SCC, which may progress to invasive SCC, if left untreated. Due to the importance of early detection in cancer treatment, this study aimed...

متن کامل

A Hybrid Malicious Code Detection Method based on Deep Learning

In this paper, we propose a hybrid malicious code detection scheme based on AutoEncoder and DBN (Deep Belief Networks). Firstly, we use the AutoEncoder deep learning method to reduce the dimensionality of data. This could convert complicated high-dimensional data into low dimensional codes with the nonlinear mapping, thereby reducing the dimensionality of data, extracting the main features of t...

متن کامل

Comparative Analysis of Machine Learning Algorithms with Optimization Purposes

The field of optimization and machine learning are increasingly interplayed and optimization in different problems leads to the use of machine learning approaches‎. ‎Machine learning algorithms work in reasonable computational time for specific classes of problems and have important role in extracting knowledge from large amount of data‎. ‎In this paper‎, ‎a methodology has been employed to opt...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1801.00025  شماره 

صفحات  -

تاریخ انتشار 2017