IEEE BigData 2019 Cup: Suspicious Network Event Recognition

被引:0
|
作者
Janusz, Andrzej [1 ,2 ]
Kaluza, Daniel [1 ,2 ]
Chadzynska-Krasowska, Agnieszka [3 ,4 ]
Konarski, Bartek [4 ]
Holland, Joel [4 ]
Slezak, Dominik [1 ,2 ,4 ]
机构
[1] Univ Warsaw, Inst Informat, Warsaw, Poland
[2] QED Software, Warsaw, Poland
[3] Polish Japanese Acad Informat Technol, Warsaw, Poland
[4] Secur On Demand, San Diego, CA USA
关键词
Data mining competitions; cybersecurity analytics; network event processing; relational feature engineering;
D O I
10.1109/bigdata47090.2019.9005668
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
"IEEE BigData 2019 Cup: SuspiciousNetwork Event Recognition" was a data mining competition organized jointly by companies Security On -Demand and QED Software at the KnowledgePit online platform, in association with the IEEE BigData 2019 conference. The scope of this challenge referred to the notions of cybersecurity analytics and network alert evaluation. In this paper, we summarize the results of our competition. We explain how data sets had been prepared before it was possible to make them available to competition participants. We describe the baseline scoring models that we designed as a reference for participants, and we demonstrate how critical for their performance was the aspect of appropriate feature engineering. We also discuss the results of experiments conducted to verify the (un)suitability of deep recurrent neural networks in this particular case. In some sense, we show that there are no "perfect" machine learning approaches that could be applied equally successfully to every data science undertaking.
引用
收藏
页码:5881 / 5887
页数:7
相关论文
共 50 条
  • [1] IEEE BigData 2019 Cup: Binary Classification via Tensor Completion
    Ranadive, Teresa M.
    Coley, Christopher J.
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 5908 - 5914
  • [2] IEEE BigData 2021 Cup: Soft Sensing at Scale
    Petrov, Sergei
    Zhang, Chao
    Yella, Jaswanth
    Huang, Yu
    Qian, Xiaoye
    Bom, Sthitie
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2021, : 5780 - 5785
  • [3] Suspicious Network Event Recognition Leveraging on Machine Learning
    Sartiano, Daniele
    Attardi, Giuseppe
    Deri, Luca
    Martinelli, Maurizio
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 5915 - 5920
  • [4] Predicting Victories in Video Games - IEEE BigData 2021 Cup Report
    Matraszek, Maciej
    Janusz, Andrzej
    Swiechowski, Maciej
    Slezak, Dominik
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2021, : 5664 - 5671
  • [5] Predicting escalations in customer support with gradient boosting at the IEEE BigData 2020 Cup
    Klimov, Peter
    Funtikov, Vladimir
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2020, : 5527 - 5532
  • [6] Models and Features with Covariate Shift Adaptation for Suspicious Network Event Recognition
    Xie, Shu-Yi
    Ma, Jian
    Luo, Yu-Bin
    Jiang, Lian-Xin
    Jin, Shirly
    Mo, Yang
    Shen, Jian-Ping
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 5945 - 5950
  • [7] An Apriori-based Data Analysis on Suspicious Network Event Recognition
    Jian, Zhiwen
    Sakai, Hiroshi
    Watada, Junzo
    Roy, Arunava
    Hassan, M. Hilmi B.
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 5888 - 5896
  • [8] Suspicious Network Event Recognition Using Modified Stacking Ensemble Machine Learning
    Huang, Angus F. M.
    Yang Chi-Wei
    Tai, Hsiao-Chi
    Chuan, Yang
    Huang, Jay J. C.
    Liao, Yu-Han
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 5873 - 5880
  • [9] Suspicious event recognition using infrared imagery
    Fernandes, Henrique C.
    Maldague, Xavier
    Batista, Marcos A.
    Barcelos, Celia A. Z.
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2011, : 2186 - 2191
  • [10] Network Event Recognition
    Karthikeyan Bhargavan
    Carl A. Gunter
    [J]. Formal Methods in System Design, 2005, 27 : 213 - 251