Determining Viability of Deep Learning on Cybersecurity Log Analytics

被引:0
|
作者
Lorenzen, Casey [1 ]
Agrawal, Rajeev [1 ]
King, Jason [1 ]
机构
[1] US Army Engineer Res & Dev Ctr, Informat Technol Lab, Vicksburg, MS 39180 USA
关键词
Deep Learning; Cybersecurity; High Performance Computing;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Department of Defense currently maintains a network known as the Defense Research Engineering Network (DREN), which provides various Department of Defense (DoD) sites across the nation connectivity to HPC resource centers. To ensure the security of the DREN system, a defense system known as the Cybersecurity Environment for Detection, Analysis, and Reporting (CEDAR) was created. CEDAR contains a variety of cybersecurity sensors, which constantly monitor and record real time network activity on the DREN. Over time, CEDAR has accumulated massive quantities of valuable cybersecurity data, which necessitates a form of automation in the process of reviewing this data. We propose the application of deep learning techniques to CEDAR data in an attempt to automatically detect potentially malicious activity in a more agile and adaptable manner. These deep learning techniques can be carried out in a high performance computing (HPC) environment, allowing for the rapid utilization of large amounts of data. Our most effective model is able to classify CEDAR alerts as malicious with an accuracy sufficient to greatly reduce human analyst workloads.
引用
收藏
页码:4806 / 4811
页数:6
相关论文
共 50 条
  • [1] Learning Representations for Log Data in Cybersecurity
    Arnaldo, Ignacio
    Cuesta-Infante, Alfredo
    Arun, Ankit
    Lam, Mei
    Bassias, Costas
    Veeramachaneni, Kalyan
    CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING (CSCML 2017), 2017, 10332 : 250 - 268
  • [2] Deep Analytics for Management and Cybersecurity of the National Energy Grid
    Zhao, Ying
    COMPUTATIONAL SCIENCE - ICCS 2020, PT V, 2020, 12141 : 302 - 315
  • [3] CROSS-LINGUAL CYBERSECURITY ANALYTICS IN THE INTERNATIONAL DARK WEB WITH ADVERSARIAL DEEP REPRESENTATION LEARNING
    Ebrahimi, Mohammadreza
    Chai, Yidong
    Samtani, Sagar
    Chen, Hsinchun
    MIS QUARTERLY, 2022, 46 (02) : 1209 - 1226
  • [4] Data Analytics for Cybersecurity Based on Machine Learning Algorithms
    Wang, Lidong
    Mosher, Reed L.
    Duett, Patti
    Falls, Terril C.
    SOUTHEASTCON 2023, 2023, : 810 - 814
  • [5] Machine Learning and Deep Learning Methods for Cybersecurity
    Xin, Yang
    Kong, Lingshuang
    Liu, Zhi
    Chen, Yuling
    Li, Yanmiao
    Zhu, Hongliang
    Gao, Mingcheng
    Hou, Haixia
    Wang, Chunhua
    IEEE ACCESS, 2018, 6 : 35365 - 35381
  • [6] Application of deep learning to cybersecurity: A survey
    Mandavifar, Samaneh
    Ghorbani, Ali A.
    NEUROCOMPUTING, 2019, 347 : 149 - 176
  • [7] Deep Learning in Cybersecurity: Challenges and Approaches
    Imamverdiyev, Yadigar N.
    Abdullayeva, Fargana J.
    INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2020, 10 (02) : 82 - 105
  • [8] A Scalable Vertical Federated Learning Framework for Analytics in the Cybersecurity Domain
    Folino, Francesco
    Folino, Gianluigi
    Pisani, Francesco Sergio
    Sabatino, Pietro
    Pontieri, Luigi
    2024 32ND EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING, PDP 2024, 2024, : 245 - 252
  • [9] Learning Analytics Perspective: Evidencing Learning from Digital Datasets in Cybersecurity Exercises
    Maennel, Kaie
    2020 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2020), 2020, : 27 - 36
  • [10] Machine Learning and Deep Learning Approaches for CyberSecurity: A Review
    Halbouni, Asmaa
    Gunawan, Teddy Surya
    Habaebi, Mohamed Hadi
    Halbouni, Murad
    Kartiwi, Mira
    Ahmad, Robiah
    IEEE ACCESS, 2022, 10 : 19572 - 19585