Unsupervised Anomaly Detectors to Detect Intrusions in the Current Threat Landscape

T. Zoppi, A. Ceccarelli, Tommaso Capecchi, A. Bondavalli
{"title":"Unsupervised Anomaly Detectors to Detect Intrusions in the Current Threat Landscape","authors":"T. Zoppi, A. Ceccarelli, Tommaso Capecchi, A. Bondavalli","doi":"10.1145/3441140","DOIUrl":null,"url":null,"abstract":"Anomaly detection aims at identifying unexpected fluctuations in the expected behavior of a given system. It is acknowledged as a reliable answer to the identification of zero-day attacks to such extent, several ML algorithms that suit for binary classification have been proposed throughout years. However, the experimental comparison of a wide pool of unsupervised algorithms for anomaly-based intrusion detection against a comprehensive set of attacks datasets was not investigated yet. To fill such gap, we exercise 17 unsupervised anomaly detection algorithms on 11 attack datasets. Results allow elaborating on a wide range of arguments, from the behavior of the individual algorithm to the suitability of the datasets to anomaly detection. We conclude that algorithms as Isolation Forests, One-Class Support Vector Machines, and Self-Organizing Maps are more effective than their counterparts for intrusion detection, while clustering algorithms represent a good alternative due to their low computational complexity. Further, we detail how attacks with unstable, distributed, or non-repeatable behavior such as Fuzzing, Worms, and Botnets are more difficult to detect. Ultimately, we digress on capabilities of algorithms in detecting anomalies generated by a wide pool of unknown attacks, showing that achieved metric scores do not vary with respect to identifying single attacks.","PeriodicalId":93404,"journal":{"name":"ACM/IMS transactions on data science","volume":" ","pages":"1 - 26"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3441140","citationCount":"19","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM/IMS transactions on data science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3441140","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 19

Abstract

Anomaly detection aims at identifying unexpected fluctuations in the expected behavior of a given system. It is acknowledged as a reliable answer to the identification of zero-day attacks to such extent, several ML algorithms that suit for binary classification have been proposed throughout years. However, the experimental comparison of a wide pool of unsupervised algorithms for anomaly-based intrusion detection against a comprehensive set of attacks datasets was not investigated yet. To fill such gap, we exercise 17 unsupervised anomaly detection algorithms on 11 attack datasets. Results allow elaborating on a wide range of arguments, from the behavior of the individual algorithm to the suitability of the datasets to anomaly detection. We conclude that algorithms as Isolation Forests, One-Class Support Vector Machines, and Self-Organizing Maps are more effective than their counterparts for intrusion detection, while clustering algorithms represent a good alternative due to their low computational complexity. Further, we detail how attacks with unstable, distributed, or non-repeatable behavior such as Fuzzing, Worms, and Botnets are more difficult to detect. Ultimately, we digress on capabilities of algorithms in detecting anomalies generated by a wide pool of unknown attacks, showing that achieved metric scores do not vary with respect to identifying single attacks.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
在当前威胁环境中检测入侵的无监督异常检测器
异常检测旨在识别给定系统预期行为中的意外波动。它被认为是识别零日攻击的可靠答案,在这种程度上,多年来已经提出了几种适合二进制分类的ML算法。然而,针对一组全面的攻击数据集,对基于异常的入侵检测的大量无监督算法进行实验比较尚未进行研究。为了填补这一空白,我们对11个攻击数据集进行了17种无监督异常检测算法。结果允许对广泛的争论进行阐述,从单个算法的行为到数据集的适用性到异常检测。我们得出结论,隔离森林、单类支持向量机和自组织映射等算法在入侵检测方面比它们的同类算法更有效,而聚类算法由于其较低的计算复杂度而代表了一个很好的替代方案。此外,我们详细介绍了不稳定,分布式或不可重复行为的攻击,如模糊,蠕虫和僵尸网络,如何更难检测。最后,我们偏离了算法在检测由大量未知攻击产生的异常方面的能力,表明实现的度量分数在识别单个攻击方面没有变化。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Recent Developments in Privacy-Preserving Mining of Clinical Data. PoBery: Possibly-complete Big Data Queries with Probabilistic Data Placement and Scanning A Survey on the Role of Centrality as Seed Nodes for Information Propagation in Large Scale Network DataStorm: Coupled, Continuous Simulations for Complex Urban Environments TabReformer: Unsupervised Representation Learning for Erroneous Data Detection
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1