论文标题
为麻烦做准备,使其两倍。监督和无监督的堆叠,以进行分析的侵入检测
Prepare for Trouble and Make it Double. Supervised and Unsupervised Stacking for AnomalyBased Intrusion Detection
论文作者
论文摘要
在过去的几十年中,研究人员,从业人员和公司努力制定机制来检测恶意活动,起源于安全威胁。在许多解决方案中,网络入侵检测成为分析网络流量并根据规则或机器学习者(MLS)检测持续入侵的最受欢迎的网络入侵检测,该检测是处理此类流量并学习模型以怀疑入侵的模型。监督的MLS在检测已知威胁方面非常有效,但在识别零日攻击方面(在学习阶段未知)方面挣扎,而可以通过无监督的MLS检测到。不幸的是,关于两种方法的联合使用网络入侵检测,都没有明确的答案。在本文中,我们首先扩大了零日攻击的问题,并激发了组合受监督和无监督算法的需求。我们建议以两层堆叠器的形式采用元学习,以创建一种混合方法,以发现已知和未知威胁。然后,我们通过一项实验活动来实施并经验评估堆栈器,该活动允许i)关于通过无监督的基础水平学习者制作的元功能进行辩论,ii)选举最有前途的元级别分类器,以及iiii)基准分类的分类尺寸,以对堆栈者进行监督和不受监督和不受监督的分类者。最后,我们将解决方案与最近文献的现有作品进行了比较。总体而言,我们的堆叠器减少了我们考虑的所有7个公共数据集中(联合国)监督的ML算法的错误分类,并且在这7个数据集中有6个中的6个研究中的现有研究优于现有研究。特别是,事实证明,它在检测零日攻击方面比监督算法更有效,从而限制了它们的主要弱点,但仍保持足够的能力来检测已知攻击。
In the last decades, researchers, practitioners and companies struggled in devising mechanisms to detect malicious activities originating security threats. Amongst the many solutions, network intrusion detection emerged as one of the most popular to analyze network traffic and detect ongoing intrusions based on rules or by means of Machine Learners (MLs), which process such traffic and learn a model to suspect intrusions. Supervised MLs are very effective in detecting known threats, but struggle in identifying zero-day attacks (unknown during learning phase), which instead can be detected through unsupervised MLs. Unfortunately, there are no definitive answers on the combined use of both approaches for network intrusion detection. In this paper we first expand the problem of zero-day attacks and motivate the need to combine supervised and unsupervised algorithms. We propose the adoption of meta-learning, in the form of a two-layer Stacker, to create a mixed approach that detects both known and unknown threats. Then we implement and empirically evaluate our Stacker through an experimental campaign that allows i) debating on meta-features crafted through unsupervised base-level learners, ii) electing the most promising supervised meta-level classifiers, and iii) benchmarking classification scores of the Stacker with respect to supervised and unsupervised classifiers. Last, we compare our solution with existing works from the recent literature. Overall, our Stacker reduces misclassifications with respect to (un)supervised ML algorithms in all the 7 public datasets we considered, and outperforms existing studies in 6 out of those 7 datasets. In particular, it turns out to be more effective in detecting zero-day attacks than supervised algorithms, limiting their main weakness but still maintaining adequate capabilities in detecting known attacks.