An Approach for Scale Suspicious Network Events Detection

被引:0
|
作者
Dong, Cong [1 ]
Chen, YuFan [2 ]
Zhang, YunJian [1 ]
Jiang, Bo [1 ]
Han, DongXu [1 ]
Liu, BaoXu [1 ]
机构
[1] Chinese Acad Sci, Sch Cyber Secur, Univ Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Tianjin Univ, Coll Management & Econ, Tianjin, Peoples R China
关键词
alert correlation; network security; stacking model; map reduce; big data; ALERT CORRELATION;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Detecting the real suspicious events from a large number of low-quality alerts is a severe challenge to the security operations center teams. In this paper, we present an approach to this problem by following the sequence of machine learning steps. The highlight of our approach is the method to generate two simple but effective categories of features based on group and aggregation operations, which can scale with a large number of alerts using MapReduce framework. The two generated types of features are local features and global features. The local features cover the alert aggregation information of the same group of events, while the global features cover the network aggregation information of different groups of events. Moreover, we also introduce the model stacking mechanism to enhance the robustness of the model. The proposed approach achieves AUC scores of 0.9512 on the validating dataset and 0.9303 on the test set, which is the 2nd highest final score in the competition.
引用
收藏
页码:5854 / 5863
页数:10
相关论文
共 50 条
  • [1] An hnsemble Approach for Suspicious Traffic Detection from High Recall Network Alerts
    Wu, Peilin
    Li, Jinlei
    Meng, Yan
    Zhu, Haojin
    2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 5937 - 5944
  • [2] AN APPROACH TO AUTOMATIC DETECTION OF SUSPICIOUS INDIVIDUALS IN A CROWD
    Lucci, Stephen
    Mukherjee, Satabdi
    Gertner, Izidor
    AUTOMATIC TARGET RECOGNITION XXV, 2015, 9476
  • [3] Centrality Approach for Community Detection in Large Scale Network
    Behera, Ranjan Kumar
    Naik, Debadatta
    Sahoo, Bibhudatta
    Rath, Santanu Ku.
    COMPUTE 2016, 2016, : 115 - 124
  • [4] Graphical analysis of captured network packets for detection of suspicious network nodes
    Aryeh, Felix Larbi
    Alese, Boniface Kayode
    Olasehinde, Olayemi
    2020 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA 2020), 2020,
  • [5] Suspicious Customer Detection on the Blockchain Network for Cryptocurrency Exchanges
    Jiang, Haiou
    Zhang, Keming
    Ma, Xinjian
    Sun, Yanchun
    Ma, Yun
    BLOCKCHAIN AND TRUSTWORTHY SYSTEMS, BLOCKSYS 2022, 2022, 1679 : 265 - 277
  • [6] A Data Visualization Tool for Assisting in Finding Suspicious Network Flow Events
    Yeh, Chun-Chao
    Chen, Chin-Hong
    ADVANCED SCIENCE LETTERS, 2014, 20 (02) : 375 - 380
  • [7] A novel approach for suspicious activity detection with deep learning
    Dwivedi, Neelam
    Singh, Dushyant Kumar
    Kushwaha, Dharmender Singh
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (21) : 32397 - 32420
  • [8] A novel approach for suspicious activity detection with deep learning
    Neelam Dwivedi
    Dushyant Kumar Singh
    Dharmender Singh Kushwaha
    Multimedia Tools and Applications, 2023, 82 : 32397 - 32420
  • [9] A HIERARCHICAL APPROACH FOR VISUAL SUSPICIOUS BEHAVIOR DETECTION IN AIRCRAFTS
    Arsic, D.
    Hoernler, B.
    Schuller, B.
    Rigoll, G.
    2009 16TH INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING, VOLS 1 AND 2, 2009, : 639 - 645
  • [10] E-Audit: Distinguishing and investigating suspicious events for APTs attack detection
    Patil, Rajendra
    Muneeswaran, Sivaanandh
    Sachidananda, Vinay
    Gurusamy, Mohan
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 144