A Deep Belief Network Based Machine Learning System for Risky Host Detection
نویسندگان
چکیده
To assure enterprise security, typically a SIEM (Security Information and Event Management) system is built to correlate security events from different preventive technologies and flag alerts. Analysts in a security operations center (SOC) investigate the alerts to decide whether the related hosts are malicious or not. However, the number of alerts is overwhelming which exceeds the SOC’s capacity to handle and the false positive rate is also really high. Consequently, there is a great need to reduce the false alarms as much as possible. Instead of detecting network intrusion from outside of the enterprise, this paper focuses on detecting compromised hosts within enterprise by an intelligent Deep learning system. Our system leverages alert information, various security logs and analysts’ investigation results in a real enterprise environment to identify hosts with high likelihood of being compromised. Text mining and graph-based method are used to generate targets and extract features. In order to validate the effectiveness of our model, other machine learning algorithms such as Multi-layer Neural Network, Deep Neural Network, Random Forest etc. are applied to the same enterprise data. The results indicate that the Deep Belief Network (DBN) performs much better than other algorithms and is 6 times more effective than the current rule-based system. What is more, due to its effectiveness, this compromised host detection system has been implemented in a real enterprise production environment, which includes data collection, label creation, feature engineering and host score generation. Keywords—machine learning system; deep belief network; risky host detection
منابع مشابه
Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism
Today, the use of the Internet and Internet sites has been an integrated part of the people’s lives, and most activities and important data are in the Internet websites. Thus, attempts to intrude into these websites have grown exponentially. Intrusion detection systems (IDS) of web attacks are an approach to protect users. But, these systems are suffering from such drawbacks as low accuracy in ...
متن کاملA Hybrid Machine Learning Method for Intrusion Detection
Data security is an important area of concern for every computer system owner. An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations. Already various techniques of artificial intelligence have been used for intrusion detection. The main challenge in this area is the running speed of the available implemen...
متن کاملNon-melanoma skin cancer diagnosis with a convolutional neural network
Background: The most common types of non-melanoma skin cancer are basal cell carcinoma (BCC), and squamous cell carcinoma (SCC). AKIEC -Actinic keratoses (Solar keratoses) and intraepithelial carcinoma (Bowen’s disease)- are common non-invasive precursors of SCC, which may progress to invasive SCC, if left untreated. Due to the importance of early detection in cancer treatment, this study aimed...
متن کاملA Hybrid Malicious Code Detection Method based on Deep Learning
In this paper, we propose a hybrid malicious code detection scheme based on AutoEncoder and DBN (Deep Belief Networks). Firstly, we use the AutoEncoder deep learning method to reduce the dimensionality of data. This could convert complicated high-dimensional data into low dimensional codes with the nonlinear mapping, thereby reducing the dimensionality of data, extracting the main features of t...
متن کاملComparative Analysis of Machine Learning Algorithms with Optimization Purposes
The field of optimization and machine learning are increasingly interplayed and optimization in different problems leads to the use of machine learning approaches. Machine learning algorithms work in reasonable computational time for specific classes of problems and have important role in extracting knowledge from large amount of data. In this paper, a methodology has been employed to opt...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1801.00025 شماره
صفحات -
تاریخ انتشار 2017