Two-stage multi-datasource machine learning for attack technique and lifecycle detection

被引:0
|
作者
Lin, Ying-Dar [1 ]
Yang, Shin-Yi [1 ]
Sudyana, Didik [1 ]
Yudha, Fietyata [1 ]
Lai, Yuan-Cheng [2 ]
Hwang, Ren-Hung [3 ]
机构
[1] Natl Yang Ming Chiao Tung Univ, Dept Comp Sci, Hsinchu 300, Taiwan
[2] Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei 10607, Taiwan
[3] Natl Yang Ming Chiao Tung Univ, Coll Artificial Intelligence, Tainan 711, Taiwan
关键词
Ml-based IDS; Attack lifecycle detection; Multi-datasource IDS; Two-stage lifecycle detection; CHALLENGES;
D O I
10.1016/j.cose.2024.103859
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection systems (IDS) have increasingly adopted machine learning (ML) techniques to enhance their ability to detect a wide range of attack variants. However, the traditional focus in current research primarily revolves around identifying specific attack types or techniques using a single data source. However, this approach lacks a holistic perspective on attacks, which can result in missed detections. To improve the effectiveness of responding to detected attacks, it is essential to identify them based on their lifecycles and incorporate information from multiple data sources. In this study, we present three distinct approaches for detecting attack lifecycles, each leveraging different ML methodologies: a single -stage ML model, a two -stage ML+ML approach, and ML with sequence matching (ML+SM). Simultaneously, we explore the benefits of utilizing multiple data sources, including network traffic, system logs, and host statistics, to enhance technique detection capabilities. Our evaluation of these methods reveals that on lifecycle detection, the two -stage ML+ML approach outperforms the others, achieving an impressive F1 score of 0.994. In contrast, the singlestage and ML+SM methods yield F1 scores of 0.887 and 0.189, respectively. Furthermore, the integration of multiple data sources proves highly advantageous, with the combination of all three sources yielding the highest F1 score of 0.922 on technique detection.
引用
收藏
页数:14
相关论文
共 50 条
  • [21] Equity Factor Timing: A Two-Stage Machine Learning Approach
    DiCiurcio, Kevin J.
    Wu, Boyu
    Xu, Fei
    Rodemer, Scott
    Wang, Qian
    JOURNAL OF PORTFOLIO MANAGEMENT, 2024, 50 (03): : 132 - 148
  • [22] A Novel Two-Stage Selection of Feature Subsets in Machine Learning
    Kamala, F. Rosita
    Thangaiah, P. Ranjit Jeba
    ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2019, 9 (03) : 4169 - 4175
  • [23] Two-stage Unsupervised Multiple Kernel Extreme Learning Machine
    Zhao, Guohan
    Xiang, Lingyun
    Zhu, Chengzhang
    Li, Feng
    2018 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2018, : 800 - 805
  • [24] A Novel Two-Stage Multi-Crieteria Evaluation for Internal Attack in WSN
    Ahmed, Muhammad R.
    Huang, Xu
    Cui, Hongyan
    Srinath, N. K.
    2013 13TH INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES (ISCIT): COMMUNICATION AND INFORMATION TECHNOLOGY FOR NEW LIFE STYLE BEYOND THE CLOUD, 2013, : 198 - 203
  • [25] A Two-stage User Intent Detection Model on Complicated Utterances with Multi-task Learning
    Song, Shuangyong
    Chen, Xiangyan
    Wang, Chao
    Yu, Xiaoguang
    Wang, Jia
    He, Xiaodong
    COMPANION PROCEEDINGS OF THE WEB CONFERENCE 2022, WWW 2022 COMPANION, 2022, : 197 - 200
  • [26] Two-Stage Uplink Training for Pilot Spoofing Attack Detection and Secure Transmission
    Xie, Jiandong
    Liang, Ying-Chang
    Fang, Jun
    Kang, Xin
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [27] Two-Stage Method To Solve the Multi-UCAV Attack Multi-Target Problem
    Zhao, Zhe
    Yang, Jian
    Niu, Yifeng
    Wang, Chang
    2018 37TH CHINESE CONTROL CONFERENCE (CCC), 2018, : 10071 - 10076
  • [28] Unified Face Attack Detection with Micro Disturbance and a Two-Stage Training Strategy
    Yu, Jiaruo
    Lu, Dagong
    Shi, Xingyue
    Qu, Chenfan
    Guo, Fengjun
    2024 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS, CVPRW, 2024, : 960 - 969
  • [29] Detection of Malicious PDF Files Using a Two-Stage Machine Learning AlgorithmInspec keywordsOther keywordsKey words
    He, Kang
    Zhu, Yuefei
    He, Yubo
    Liu, Long
    Lu, Bin
    Lin, Wei
    CHINESE JOURNAL OF ELECTRONICS, 2020, 29 (06) : 1165 - 1177
  • [30] Two-Stage Structured Learning Approach for Stable Occupancy Detection
    Liu, Tianchi
    Li, Yue
    Bai, Zuo
    De, Jaydeep
    Cao Vinh Le
    Lin, Zhiping
    Lin, Shih-Hsiang
    Huang, Guang-Bin
    Cui, Dongshun
    2016 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2016, : 2306 - 2312