Two-stage multi-datasource machine learning for attack technique and lifecycle detection

被引:0
|
作者
Lin, Ying-Dar [1 ]
Yang, Shin-Yi [1 ]
Sudyana, Didik [1 ]
Yudha, Fietyata [1 ]
Lai, Yuan-Cheng [2 ]
Hwang, Ren-Hung [3 ]
机构
[1] Natl Yang Ming Chiao Tung Univ, Dept Comp Sci, Hsinchu 300, Taiwan
[2] Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei 10607, Taiwan
[3] Natl Yang Ming Chiao Tung Univ, Coll Artificial Intelligence, Tainan 711, Taiwan
关键词
Ml-based IDS; Attack lifecycle detection; Multi-datasource IDS; Two-stage lifecycle detection; CHALLENGES;
D O I
10.1016/j.cose.2024.103859
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection systems (IDS) have increasingly adopted machine learning (ML) techniques to enhance their ability to detect a wide range of attack variants. However, the traditional focus in current research primarily revolves around identifying specific attack types or techniques using a single data source. However, this approach lacks a holistic perspective on attacks, which can result in missed detections. To improve the effectiveness of responding to detected attacks, it is essential to identify them based on their lifecycles and incorporate information from multiple data sources. In this study, we present three distinct approaches for detecting attack lifecycles, each leveraging different ML methodologies: a single -stage ML model, a two -stage ML+ML approach, and ML with sequence matching (ML+SM). Simultaneously, we explore the benefits of utilizing multiple data sources, including network traffic, system logs, and host statistics, to enhance technique detection capabilities. Our evaluation of these methods reveals that on lifecycle detection, the two -stage ML+ML approach outperforms the others, achieving an impressive F1 score of 0.994. In contrast, the singlestage and ML+SM methods yield F1 scores of 0.887 and 0.189, respectively. Furthermore, the integration of multiple data sources proves highly advantageous, with the combination of all three sources yielding the highest F1 score of 0.922 on technique detection.
引用
收藏
页数:14
相关论文
共 50 条
  • [41] Predicting Stock Price Using Two-Stage Machine Learning Techniques
    Zhang, Jun
    Li, Lan
    Chen, Wei
    COMPUTATIONAL ECONOMICS, 2021, 57 (04) : 1237 - 1261
  • [42] A Two-Stage Machine Learning Approach to Forecast the Lifetime of Movies in a Multiplex
    Ragav, Abhijith
    Venkatesh, Sai Vishwanath
    Murugappan, Ramanathan
    Vijayaraghavan, Vineeth
    ADVANCES IN INFORMATION AND COMMUNICATION, VOL 2, 2020, 1130 : 480 - 493
  • [43] Prediction of lattice thermal conductivity with two-stage interpretable machine learning
    胡锦龙
    左钰婷
    郝昱州
    舒国钰
    王洋
    冯敏轩
    李雪洁
    王晓莹
    孙军
    丁向东
    高志斌
    朱桂妹
    李保文
    ChinesePhysicsB, 2023, 32 (04) : 26 - 33
  • [44] Two-stage credit rating prediction using machine learning techniques
    Wu, Hsu-Che
    Hu, Ya-Han
    Huang, Yen-Hao
    KYBERNETES, 2014, 43 (07) : 1098 - 1113
  • [45] Two-Stage Metric Learning
    Wang, Jun
    Sun, Ke
    Sha, Fei
    Marchand-Maillet, Stephane
    Kalousis, Alexandros
    INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 32 (CYCLE 2), 2014, 32 : 370 - 378
  • [46] A two-stage hybrid classification technique for network intrusion detection system
    Hussain, Jamal
    Lalmuanawma, Samuel
    Chhakchhuak, Lalrinfela
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2016, 9 (05) : 863 - 875
  • [47] A two-stage hybrid classification technique for network intrusion detection system
    Jamal Hussain
    Samuel Lalmuanawma
    Lalrinfela Chhakchhuak
    International Journal of Computational Intelligence Systems, 2016, 9 : 863 - 875
  • [48] Learning a two-stage CNN model for multi-sized building detection in remote sensing images
    Chen, Chaoyue
    Gong, Weiguo
    Chen, Yongliang
    Li, Weihong
    REMOTE SENSING LETTERS, 2019, 10 (02) : 103 - 110
  • [49] A multi-output two-stage locally regularized model construction method using the extreme learning machine
    Du, Dajun
    Li, Kang
    Li, Xue
    Fei, Minrui
    Wang, Haikuan
    NEUROCOMPUTING, 2014, 128 : 104 - 112
  • [50] Wormhole attack detection in ad hoc network using machine learning technique
    Prasad, Mahendra
    Tripathi, Sachin
    Dahal, Keshav
    2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,