Determining Viability of Deep Learning on Cybersecurity Log Analytics

被引:0
|
作者
Lorenzen, Casey [1 ]
Agrawal, Rajeev [1 ]
King, Jason [1 ]
机构
[1] US Army Engineer Res & Dev Ctr, Informat Technol Lab, Vicksburg, MS 39180 USA
关键词
Deep Learning; Cybersecurity; High Performance Computing;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Department of Defense currently maintains a network known as the Defense Research Engineering Network (DREN), which provides various Department of Defense (DoD) sites across the nation connectivity to HPC resource centers. To ensure the security of the DREN system, a defense system known as the Cybersecurity Environment for Detection, Analysis, and Reporting (CEDAR) was created. CEDAR contains a variety of cybersecurity sensors, which constantly monitor and record real time network activity on the DREN. Over time, CEDAR has accumulated massive quantities of valuable cybersecurity data, which necessitates a form of automation in the process of reviewing this data. We propose the application of deep learning techniques to CEDAR data in an attempt to automatically detect potentially malicious activity in a more agile and adaptable manner. These deep learning techniques can be carried out in a high performance computing (HPC) environment, allowing for the rapid utilization of large amounts of data. Our most effective model is able to classify CEDAR alerts as malicious with an accuracy sufficient to greatly reduce human analyst workloads.
引用
收藏
页码:4806 / 4811
页数:6
相关论文
共 50 条
  • [21] Analytics for Smart Grid Cybersecurity
    Choucri, Nazli
    Agarwal, Gaurav
    2017 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2017,
  • [22] Deep learning for cybersecurity in smart grids: Review and perspectives
    Ruan, Jiaqi
    Liang, Gaoqi
    Zhao, Junhua
    Zhao, Huan
    Qiu, Jing
    Wen, Fushuan
    Dong, Zhao Yang
    Energy Conversion and Economics, 2023, 4 (04): : 233 - 251
  • [23] Applications of educational data mining and learning analytics on data from cybersecurity training
    Valdemar Švábenský
    Jan Vykopal
    Pavel Čeleda
    Lydia Kraus
    Education and Information Technologies, 2022, 27 : 12179 - 12212
  • [24] Cybersecurity in Deep Learning Techniques: Detecting Network Attacks
    Ghazal, Shatha Fawaz
    Mjlae, Salameh A.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (11) : 221 - 230
  • [25] Applications of educational data mining and learning analytics on data from cybersecurity training
    Svabensky, Valdemar
    Vykopal, Jan
    Celeda, Pavel
    Kraus, Lydia
    EDUCATION AND INFORMATION TECHNOLOGIES, 2022, 27 (09) : 12179 - 12212
  • [26] A Review of Deep Learning Strategies for Enhancing Cybersecurity in Networks
    Bhuvaneshwari, A. J.
    Kaythry, P.
    JOURNAL OF SCIENTIFIC & INDUSTRIAL RESEARCH, 2023, 82 (12): : 1316 - 1330
  • [27] Attacks to Automatous Vehicles: A Deep Learning Algorithm for Cybersecurity
    Aldhyani, Theyazn H. H.
    Alkahtani, Hasan
    SENSORS, 2022, 22 (01)
  • [28] A Survey of Deep Learning Techniques for Cybersecurity in Mobile Networks
    Rodriguez, Eva
    Otero, Beatriz
    Gutierrez, Norma
    Canal, Ramon
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2021, 23 (03): : 1920 - 1955
  • [29] A survey on deep learning for cybersecurity: Progress, challenges, and opportunities
    Macas, Mayra
    Wu, Chunming
    Fuertes, Walter
    COMPUTER NETWORKS, 2022, 212
  • [30] Hierarchical Deep Learning for Cybersecurity of Critical Service Systems
    Gupta, Lay
    PROCEEDINGS OF THE 2020 FOURTH WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4 2020), 2020, : 346 - 351