scispace - formally typeset
Proceedings ArticleDOI

AI^2: Training a Big Data Machine to Defend

Reads0
Chats0
TLDR
The system presents four key features: a big data behavioral analytics platform, an outlier detection system, a mechanism to obtain feedback from security analysts, and a supervised learning module, which is capable of learning to defend against unseen attacks.
Abstract
We present AI2, an analyst-in-the-loop security system where Analyst Intuition (AI) is put together with state-of-the-art machine learning to build a complete end-to-end Artificially Intelligent solution (AI). The system presents four key features: a big data behavioral analytics platform, an outlier detection system, a mechanism to obtain feedback from security analysts, and a supervised learning module. We validate our system with a real-world data set consisting of 3.6 billion log lines and 70.2 million entities. The results show that the system is capable of learning to defend against unseen attacks. With respect to unsupervised outlier analysis, our system improves the detection rate in 2.92× and reduces false positives by more than 5×.

read more

Citations
More filters
Journal ArticleDOI

N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders

TL;DR: N-BaIoT as discussed by the authors is a network-based anomaly detection method for the IoT that extracts behavior snapshots of the network and uses deep autoencoders to detect anomalous network traffic from compromised IoT devices.
Posted Content

Deep Learning for Anomaly Detection: A Survey.

TL;DR: A structured and comprehensive overview of research methods in deep learning-based anomaly detection, grouped state-of-the-art research techniques into different categories based on the underlying assumptions and approach adopted.
Journal ArticleDOI

A survey on addressing high-class imbalance in big data

TL;DR: This paper provides a large survey of published studies within the last 8 years, focusing on high-class imbalance in big data in order to assess the state-of-the-art in addressing adverse effects due to class imbalance.
Journal ArticleDOI

Combining unsupervised and supervised learning in credit card fraud detection

TL;DR: This paper presents a hybrid technique that combines supervised and unsupervised techniques to improve the fraud detection accuracy and shows that the combination is efficient and does indeed improve the accuracy of the detection.
Journal ArticleDOI

Survey of Attack Projection, Prediction, and Forecasting in Cyber Security

TL;DR: This paper provides a survey of prediction, and forecasting methods used in cyber security, and discusses machine learning and data mining approaches, that have gained a lot of attention recently and appears promising for such a constantly changing environment, which is cyber security.
References
More filters
Journal ArticleDOI

Anomaly detection: A survey

TL;DR: This survey tries to provide a structured and comprehensive overview of the research on anomaly detection by grouping existing techniques into different categories based on the underlying approach adopted by each technique.
Journal ArticleDOI

A Survey of Outlier Detection Methodologies

TL;DR: A survey of contemporary techniques for outlier detection is introduced and their respective motivations are identified and distinguish their advantages and disadvantages in a comparative review.
Proceedings ArticleDOI

Query by committee

TL;DR: It is suggested that asymptotically finite information gain may be an important characteristic of good query algorithms, in which a committee of students is trained on the same data set.
Book

Outlier Analysis

TL;DR: Outlier Analysis is a comprehensive exposition, as understood by data mining experts, statisticians and computer scientists, and emphasis was placed on simplifying the content, so that students and practitioners can also benefit.
Book ChapterDOI

Heterogenous uncertainty sampling for supervised learning

TL;DR: This work test the use of one classifier (a highly efficient probabilistic one) to select examples for training another (the C4.5 rule induction program) and finds that the uncertainty samples yielded classifiers with lower error rates than random samples ten times larger.
Related Papers (5)