MIDAS: Multi-layered attack detection architecture with decision optimisation

IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Computers & Security Pub Date : 2024-10-16 DOI:10.1016/j.cose.2024.104154
Kieran Rendall , Alexios Mylonas , Stilianos Vidalis , Dimitris Gritzalis
{"title":"MIDAS: Multi-layered attack detection architecture with decision optimisation","authors":"Kieran Rendall ,&nbsp;Alexios Mylonas ,&nbsp;Stilianos Vidalis ,&nbsp;Dimitris Gritzalis","doi":"10.1016/j.cose.2024.104154","DOIUrl":null,"url":null,"abstract":"<div><div>The proliferation of cyber attacks has led to the use of data-driven detection countermeasures, in an effort to mitigate this threat. Machine learning techniques, such as the use of neural networks, have become mainstream and proven effective in attack detection. However, these data-driven solutions are limited by: <em>a)</em> high computational overhead associated with data pre-processing and inference cost, <em>b)</em> inability to scale beyond a centralised deployment to cope with environmental variances, and c) requirement to use multiple bespoke detection models for effective attack detection coverage across the cyber kill chain. In this context, this paper introduces MIDAS, a cost-effective framework for attack detection, which introduces a dynamic decision boundary that is used in a multi-layered detection architecture. This is achieved by modelling the decision confidence of the participating detection models and judging its benefits using a novel reward policy. Specifically, a reward is assigned to a set of available actions, corresponding to a decision boundary, based on its cost-to-performance, where an <em>overall</em> cost-saving is prioritised. We evaluate our approach on two widely used datasets representing two of the most common threats today, <em>i.e.,</em> phishing and malware. MIDAS shows that it effectively reduces the expenditure on detection inference and processing costs by controlling the frequency of expensive detection operations. This is achieved without significant sacrifice of attack detection performance.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8000,"publicationDate":"2024-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Security","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167404824004590","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

The proliferation of cyber attacks has led to the use of data-driven detection countermeasures, in an effort to mitigate this threat. Machine learning techniques, such as the use of neural networks, have become mainstream and proven effective in attack detection. However, these data-driven solutions are limited by: a) high computational overhead associated with data pre-processing and inference cost, b) inability to scale beyond a centralised deployment to cope with environmental variances, and c) requirement to use multiple bespoke detection models for effective attack detection coverage across the cyber kill chain. In this context, this paper introduces MIDAS, a cost-effective framework for attack detection, which introduces a dynamic decision boundary that is used in a multi-layered detection architecture. This is achieved by modelling the decision confidence of the participating detection models and judging its benefits using a novel reward policy. Specifically, a reward is assigned to a set of available actions, corresponding to a decision boundary, based on its cost-to-performance, where an overall cost-saving is prioritised. We evaluate our approach on two widely used datasets representing two of the most common threats today, i.e., phishing and malware. MIDAS shows that it effectively reduces the expenditure on detection inference and processing costs by controlling the frequency of expensive detection operations. This is achieved without significant sacrifice of attack detection performance.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
MIDAS:具有决策优化功能的多层攻击检测架构
网络攻击的激增促使人们使用数据驱动的检测对策,以努力减轻这种威胁。机器学习技术(如使用神经网络)已成为主流,并在攻击检测中被证明是有效的。然而,这些数据驱动型解决方案受到以下限制:a) 与数据预处理和推理成本相关的计算开销较高;b) 无法超越集中部署的范围以应对环境变化;c) 需要使用多个定制检测模型才能有效覆盖整个网络杀伤链的攻击检测。在此背景下,本文介绍了 MIDAS,这是一种经济高效的攻击检测框架,它引入了动态决策边界,用于多层检测架构。这是通过模拟参与检测模型的决策置信度,并使用新颖的奖励政策来判断其效益来实现的。具体来说,根据成本-性能为一组与决策边界相对应的可用行动分配奖励,其中优先考虑总体成本节约。我们在两个广泛使用的数据集上评估了我们的方法,这两个数据集代表了当今最常见的两种威胁,即网络钓鱼和恶意软件。结果表明,MIDAS 通过控制昂贵的检测操作频率,有效降低了检测推理和处理成本。在实现这一点的同时,并没有明显牺牲攻击检测性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Computers & Security
Computers & Security 工程技术-计算机:信息系统
CiteScore
12.40
自引率
7.10%
发文量
365
审稿时长
10.7 months
期刊介绍: Computers & Security is the most respected technical journal in the IT security field. With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world. Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.
期刊最新文献
GRAIN: Graph neural network and reinforcement learning aided causality discovery for multi-step attack scenario reconstruction Multi-perspective API call sequence behavior analysis and fusion for malware classification Adversarial attacks based on time-series features for traffic detection Thread-sensitive fuzzing for concurrency bug detection Enhanced cell phone security: An ultrasonic and sensor fusion-based persistent cell phone protection method integrating anti-theft & identity authentication
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1