Determining Viability of Deep Learning on Cybersecurity Log Analytics

被引:0
|
作者
Lorenzen, Casey [1 ]
Agrawal, Rajeev [1 ]
King, Jason [1 ]
机构
[1] US Army Engineer Res & Dev Ctr, Informat Technol Lab, Vicksburg, MS 39180 USA
关键词
Deep Learning; Cybersecurity; High Performance Computing;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Department of Defense currently maintains a network known as the Defense Research Engineering Network (DREN), which provides various Department of Defense (DoD) sites across the nation connectivity to HPC resource centers. To ensure the security of the DREN system, a defense system known as the Cybersecurity Environment for Detection, Analysis, and Reporting (CEDAR) was created. CEDAR contains a variety of cybersecurity sensors, which constantly monitor and record real time network activity on the DREN. Over time, CEDAR has accumulated massive quantities of valuable cybersecurity data, which necessitates a form of automation in the process of reviewing this data. We propose the application of deep learning techniques to CEDAR data in an attempt to automatically detect potentially malicious activity in a more agile and adaptable manner. These deep learning techniques can be carried out in a high performance computing (HPC) environment, allowing for the rapid utilization of large amounts of data. Our most effective model is able to classify CEDAR alerts as malicious with an accuracy sufficient to greatly reduce human analyst workloads.
引用
收藏
页码:4806 / 4811
页数:6
相关论文
共 50 条
  • [31] The Significance of Machine Learning and Deep Learning Techniques in Cybersecurity: A Comprehensive Review
    Mijwil M.M.
    Salem I.E.
    Ismaeel M.M.
    Iraqi Journal for Computer Science and Mathematics, 2023, 4 (01): : 87 - 101
  • [32] LEARNING ANALYTICS FOR PERSONAL LEARNING ENVIRONMENTS: DETERMINING JOURNAL PUBLICATION TRENDS
    Mustu Yaldiz, Damla
    Kuleli, Saniye
    Soydan Oktay, Ozlem
    Copgeven, Nedime Selin
    Akyol Emmungil, Elif
    Yildirim, Yusuf
    Sosuncu, Firat
    Firat, Mehmet
    TURKISH ONLINE JOURNAL OF DISTANCE EDUCATION, 2023, 25 (03): : 141 - 166
  • [33] Log Analytics in HPC: A Data-driven Reinforcement Learning Framework
    Luo, Zhengping
    Hou, Tao
    Nguyen, Tung Thanh
    Zeng, Hui
    Lu, Zhuo
    IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2020, : 550 - 555
  • [34] Deep Learning for Multiwell Automatic Log Correction
    Simoes, Vanessa
    Maniar, Hiren
    Abubakar, Aria
    Zhao, Tao
    PETROPHYSICS, 2022, 63 (06): : 724 - 747
  • [35] Deep Learning for Predictive Analytics in Reversible Steganography
    Chang, Ching-Chun
    Wang, Xu
    Chen, Sisheng
    Echizen, Isao
    Sanchez, Victor
    Li, Chang-Tsun
    IEEE ACCESS, 2023, 11 : 3494 - 3510
  • [36] Editorial: Deep Learning for Big Data Analytics
    Yulei Wu
    Fei Hao
    Sambit Bakshi
    Haojun Huang
    Mobile Networks and Applications, 2021, 26 : 2315 - 2317
  • [37] Is Deep Learning a Game Changer for Marketing Analytics?
    Urban, Glen
    Timoshenko, Artem
    Dhillon, Paramveer
    Hauser, John R.
    MIT SLOAN MANAGEMENT REVIEW, 2020, 61 (02) : 71 - 76
  • [38] Deep learning for EEG data analytics: A survey
    Li, Gen
    Lee, Chang Ha
    Jung, Jason J.
    Youn, Young Chul
    Camacho, David
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (18):
  • [39] Big Data Analytics - an Influence of Deep Learning
    Chandralekha, C.
    Divya, S.
    Aiswarya, N.
    BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2020, 13 (06): : 220 - 223
  • [40] Editorial: Deep Learning for Big Data Analytics
    Wu, Yulei
    Hao, Fei
    Bakshi, Sambit
    Huang, Haojun
    MOBILE NETWORKS & APPLICATIONS, 2021, 26 (06): : 2315 - 2317