Two-stage multi-datasource machine learning for attack technique and lifecycle detection

被引:0
|
作者
Lin, Ying-Dar [1 ]
Yang, Shin-Yi [1 ]
Sudyana, Didik [1 ]
Yudha, Fietyata [1 ]
Lai, Yuan-Cheng [2 ]
Hwang, Ren-Hung [3 ]
机构
[1] Natl Yang Ming Chiao Tung Univ, Dept Comp Sci, Hsinchu 300, Taiwan
[2] Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei 10607, Taiwan
[3] Natl Yang Ming Chiao Tung Univ, Coll Artificial Intelligence, Tainan 711, Taiwan
关键词
Ml-based IDS; Attack lifecycle detection; Multi-datasource IDS; Two-stage lifecycle detection; CHALLENGES;
D O I
10.1016/j.cose.2024.103859
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection systems (IDS) have increasingly adopted machine learning (ML) techniques to enhance their ability to detect a wide range of attack variants. However, the traditional focus in current research primarily revolves around identifying specific attack types or techniques using a single data source. However, this approach lacks a holistic perspective on attacks, which can result in missed detections. To improve the effectiveness of responding to detected attacks, it is essential to identify them based on their lifecycles and incorporate information from multiple data sources. In this study, we present three distinct approaches for detecting attack lifecycles, each leveraging different ML methodologies: a single -stage ML model, a two -stage ML+ML approach, and ML with sequence matching (ML+SM). Simultaneously, we explore the benefits of utilizing multiple data sources, including network traffic, system logs, and host statistics, to enhance technique detection capabilities. Our evaluation of these methods reveals that on lifecycle detection, the two -stage ML+ML approach outperforms the others, achieving an impressive F1 score of 0.994. In contrast, the singlestage and ML+SM methods yield F1 scores of 0.887 and 0.189, respectively. Furthermore, the integration of multiple data sources proves highly advantageous, with the combination of all three sources yielding the highest F1 score of 0.922 on technique detection.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Host-based intrusion detection with multi-datasource and deep learning
    Hwang, Ren-Hung
    Lee, Chieh-Lun
    Lin, Ying-Dar
    Lin, Po-Chin
    Wu, Hsiao-Kuang
    Lai, Yuan-Cheng
    Chen, C. K.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 78
  • [2] Multi-datasource machine learning in intrusion detection: Packet flows, system logs and host statistics
    Lin, Ying-Dar
    Wang, Ze-Yu
    Lin, Po-Ching
    Nguyen, Van-Linh
    Hwang, Ren-Hung
    Lai, Yuan-Cheng
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 68
  • [3] Two-stage pedestrian detection based on multiple features and machine learning
    Chong, Y.-W. (apollobest@126.com), 1600, Science Press (38):
  • [4] Two-stage extreme learning machine for regression
    Lan, Yuan
    Soh, Yeng Chai
    Huang, Guang-Bin
    NEUROCOMPUTING, 2010, 73 (16-18) : 3028 - 3038
  • [5] Two-stage optimization for machine learning workflow
    Quemy, Alexandre
    INFORMATION SYSTEMS, 2020, 92
  • [6] A Fast Two-Stage Extreme Learning Machine
    Lai, Jie
    Wang, Xiaodan
    Li, Rui
    Gu, Jinghao
    ICDLT 2019: 2019 3RD INTERNATIONAL CONFERENCE ON DEEP LEARNING TECHNOLOGIES, 2019, : 16 - 22
  • [7] Detection of Malicious PDF Files Using a Two-Stage Machine Learning Algorithm
    HE Kang
    ZHU Yuefei
    HE Yubo
    LIU Long
    LU Bin
    LIN Wei
    ChineseJournalofElectronics, 2020, 29 (06) : 1165 - 1177
  • [8] Two-Stage Ransomware Detection Using Dynamic Analysis and Machine Learning Techniques
    Hwang, Jinsoo
    Kim, Jeankyung
    Lee, Seunghwan
    Kim, Kichang
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 112 (04) : 2597 - 2609
  • [9] Two-Stage Ransomware Detection Using Dynamic Analysis and Machine Learning Techniques
    Jinsoo Hwang
    Jeankyung Kim
    Seunghwan Lee
    Kichang Kim
    Wireless Personal Communications, 2020, 112 : 2597 - 2609
  • [10] A multi-label network attack detection approach based on two-stage model fusion
    Huang, Yongqing
    Gou, Jin
    Fan, Zongwen
    Liao, Yongxin
    Zhuang, Yanmin
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 83