Cargando…

Sec2graph: Network Attack Detection Based on Novelty Detection on Graph Structured Data

Being able to timely detect new kinds of attacks in highly distributed, heterogeneous and evolving networks without generating too many false alarms is especially challenging. Many researchers proposed various anomaly detection techniques to identify events that are inconsistent with past observatio...

Descripción completa

Detalles Bibliográficos
Autores principales: Leichtnam, Laetitia, Totel, Eric, Prigent, Nicolas, Mé, Ludovic
Formato: Online Artículo Texto
Lenguaje:English
Publicado: 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7338149/
http://dx.doi.org/10.1007/978-3-030-52683-2_12
_version_ 1783554619106918400
author Leichtnam, Laetitia
Totel, Eric
Prigent, Nicolas
Mé, Ludovic
author_facet Leichtnam, Laetitia
Totel, Eric
Prigent, Nicolas
Mé, Ludovic
author_sort Leichtnam, Laetitia
collection PubMed
description Being able to timely detect new kinds of attacks in highly distributed, heterogeneous and evolving networks without generating too many false alarms is especially challenging. Many researchers proposed various anomaly detection techniques to identify events that are inconsistent with past observations. While supervised learning is often used to that end, security experts generally do not have labeled datasets and labeling their data would be excessively expensive. Unsupervised learning, that does not require labeled data should then be used preferably, even if these approaches have led to less relevant results. We introduce in this paper a unified and unique graph representation called security objects’ graphs. This representation mixes and links events of different kinds and allows a rich description of the activities to be analyzed. To detect anomalies in these graphs, we propose an unsupervised learning approach based on auto-encoder. Our hypothesis is that as security objects’ graphs bring a rich vision of the normal situation, an auto-encoder is able to build a relevant model of this situation. To validate this hypothesis, we apply our approach to the CICIDS2017 dataset and show that although our approach is unsupervised, its detection results are as good, and even better than those obtained by many supervised approaches.
format Online
Article
Text
id pubmed-7338149
institution National Center for Biotechnology Information
language English
publishDate 2020
record_format MEDLINE/PubMed
spelling pubmed-73381492020-07-07 Sec2graph: Network Attack Detection Based on Novelty Detection on Graph Structured Data Leichtnam, Laetitia Totel, Eric Prigent, Nicolas Mé, Ludovic Detection of Intrusions and Malware, and Vulnerability Assessment Article Being able to timely detect new kinds of attacks in highly distributed, heterogeneous and evolving networks without generating too many false alarms is especially challenging. Many researchers proposed various anomaly detection techniques to identify events that are inconsistent with past observations. While supervised learning is often used to that end, security experts generally do not have labeled datasets and labeling their data would be excessively expensive. Unsupervised learning, that does not require labeled data should then be used preferably, even if these approaches have led to less relevant results. We introduce in this paper a unified and unique graph representation called security objects’ graphs. This representation mixes and links events of different kinds and allows a rich description of the activities to be analyzed. To detect anomalies in these graphs, we propose an unsupervised learning approach based on auto-encoder. Our hypothesis is that as security objects’ graphs bring a rich vision of the normal situation, an auto-encoder is able to build a relevant model of this situation. To validate this hypothesis, we apply our approach to the CICIDS2017 dataset and show that although our approach is unsupervised, its detection results are as good, and even better than those obtained by many supervised approaches. 2020-06-11 /pmc/articles/PMC7338149/ http://dx.doi.org/10.1007/978-3-030-52683-2_12 Text en © Springer Nature Switzerland AG 2020 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic.
spellingShingle Article
Leichtnam, Laetitia
Totel, Eric
Prigent, Nicolas
Mé, Ludovic
Sec2graph: Network Attack Detection Based on Novelty Detection on Graph Structured Data
title Sec2graph: Network Attack Detection Based on Novelty Detection on Graph Structured Data
title_full Sec2graph: Network Attack Detection Based on Novelty Detection on Graph Structured Data
title_fullStr Sec2graph: Network Attack Detection Based on Novelty Detection on Graph Structured Data
title_full_unstemmed Sec2graph: Network Attack Detection Based on Novelty Detection on Graph Structured Data
title_short Sec2graph: Network Attack Detection Based on Novelty Detection on Graph Structured Data
title_sort sec2graph: network attack detection based on novelty detection on graph structured data
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7338149/
http://dx.doi.org/10.1007/978-3-030-52683-2_12
work_keys_str_mv AT leichtnamlaetitia sec2graphnetworkattackdetectionbasedonnoveltydetectionongraphstructureddata
AT toteleric sec2graphnetworkattackdetectionbasedonnoveltydetectionongraphstructureddata
AT prigentnicolas sec2graphnetworkattackdetectionbasedonnoveltydetectionongraphstructureddata
AT meludovic sec2graphnetworkattackdetectionbasedonnoveltydetectionongraphstructureddata