Skip to main content

2019 | OriginalPaper | Buchkapitel

Cyber-Typhon: An Online Multi-task Anomaly Detection Framework

verfasst von : Konstantinos Demertzis, Lazaros Iliadis, Panayiotis Kikiras, Nikos Tziritas

Erschienen in: Artificial Intelligence Applications and Innovations

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

According to the Greek mythology, Typhon was a gigantic monster with one hundred dragon heads, bigger than all mountains. His open hands were extending from East to West, his head could reach the sky and flames were coming out of his mouth. His body below the waste consisted of curled snakes. This research effort introduces the “Cyber-Typhon” (CYTY) an Online Multi-Task Anomaly Detection Framework. It aims to fully upgrade old passive infrastructure through an intelligent mechanism, using advanced Computational Intelligence (COIN) algorithms. More specifically, it proposes an intelligent Multi-Task Learning framework, which combines On-Line Sequential Extreme Learning Machines (OS-ELM) and Restricted Boltzmann Machines (RBMs) in order to control data flows. The final target of this model is the intelligent classification of Critical Infrastructures’ network flow, resulting in Anomaly Detection due to Advanced Persistent Threat (APT) attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
4.
Zurück zum Zitat Demertzis, K., Iliadis, L.: A hybrid network anomaly and intrusion detection approach based on evolving spiking neural network classification. In: Sideridis, A.B., Kardasiadou, Z., Yialouris, C.P., Zorkadis, V. (eds.) e-Democracy 2013. CCIS, vol. 441, pp. 11–23. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-11710-2_2CrossRef Demertzis, K., Iliadis, L.: A hybrid network anomaly and intrusion detection approach based on evolving spiking neural network classification. In: Sideridis, A.B., Kardasiadou, Z., Yialouris, C.P., Zorkadis, V. (eds.) e-Democracy 2013. CCIS, vol. 441, pp. 11–23. Springer, Cham (2014). https://​doi.​org/​10.​1007/​978-3-319-11710-2_​2CrossRef
5.
Zurück zum Zitat Krawczyk, B., Cano, A.: Online ensemble learning with abstaining classifiers for drifting and noisy data streams. Appl. Soft Comput. J. 68, 677–692 (2018)CrossRef Krawczyk, B., Cano, A.: Online ensemble learning with abstaining classifiers for drifting and noisy data streams. Appl. Soft Comput. J. 68, 677–692 (2018)CrossRef
6.
Zurück zum Zitat Baytas, I.M., Yan, M., Jain, A.K., Zhou, J.: Asynchronous multi-task learning. In: ICDM, pp. 11–20 (2016) Baytas, I.M., Yan, M., Jain, A.K., Zhou, J.: Asynchronous multi-task learning. In: ICDM, pp. 11–20 (2016)
7.
Zurück zum Zitat Zhang, Y.: Parallel multi-task learning. In: ICDM, pp. 629–638 (2015) Zhang, Y.: Parallel multi-task learning. In: ICDM, pp. 629–638 (2015)
8.
Zurück zum Zitat Chen, Q., Abdelwahed, S.: A model-based approach to self-protection in computing system. In: Proceeding CAC 2013 Proceedings of the ACM Cloud and Autonomic Computing Conference, Article no. 16 (2013) Chen, Q., Abdelwahed, S.: A model-based approach to self-protection in computing system. In: Proceeding CAC 2013 Proceedings of the ACM Cloud and Autonomic Computing Conference, Article no. 16 (2013)
10.
Zurück zum Zitat Zhu, W.T., et al.: Detecting node replication attacks in wireless sensor networks: a survey. J. Netw. Comput. Appl. 35(3), 1022–1034 (2012)CrossRef Zhu, W.T., et al.: Detecting node replication attacks in wireless sensor networks: a survey. J. Netw. Comput. Appl. 35(3), 1022–1034 (2012)CrossRef
11.
Zurück zum Zitat Cruz, T., et al.: Improving cyber-security awareness on industrial control systems: the CockpitCI approach. J. Inf. Warfare 13(4) (2015). ISSN 1445 3347 (online), ISSN 445-3312 (printed) Cruz, T., et al.: Improving cyber-security awareness on industrial control systems: the CockpitCI approach. J. Inf. Warfare 13(4) (2015). ISSN 1445 3347 (online), ISSN 445-3312 (printed)
12.
Zurück zum Zitat Zhang, Y., Yeung, D.: A convex formulation for learning task relationships in multi-task learning. In: UAI, pp. 733–742 (2010) Zhang, Y., Yeung, D.: A convex formulation for learning task relationships in multi-task learning. In: UAI, pp. 733–742 (2010)
13.
Zurück zum Zitat Wang, J., Kolar, M., Srebro, N.: Distributed multi-task learning. In: AISTATS, pp. 751–760 (2016) Wang, J., Kolar, M., Srebro, N.: Distributed multi-task learning. In: AISTATS, pp. 751–760 (2016)
14.
Zurück zum Zitat Xing, E.P., Ho, Q., Xie, P., Wei, D.: Strategies and principles of distributed machine learning on big data. Engineering 2(2), 179–195 (2016)CrossRef Xing, E.P., Ho, Q., Xie, P., Wei, D.: Strategies and principles of distributed machine learning on big data. Engineering 2(2), 179–195 (2016)CrossRef
15.
Zurück zum Zitat Cavallanti, G., Cesa-Bianchi, N., Gentile, C.: Linear algorithms for online multitask classification. In: COLT 2008, Helsinki, Finland, June 2008 Cavallanti, G., Cesa-Bianchi, N., Gentile, C.: Linear algorithms for online multitask classification. In: COLT 2008, Helsinki, Finland, June 2008
20.
Zurück zum Zitat Demertzis, K., Kikiras, P., Tziritas, N., Sanchez, S.L., Iliadis, L.: The next generation cognitive security operations center: network flow forensics using cybersecurity intelligence. Big Data Cogn. Comput. 2, 35 (2018)CrossRef Demertzis, K., Kikiras, P., Tziritas, N., Sanchez, S.L., Iliadis, L.: The next generation cognitive security operations center: network flow forensics using cybersecurity intelligence. Big Data Cogn. Comput. 2, 35 (2018)CrossRef
21.
Zurück zum Zitat Demertzis, K., Tziritas, N., Kikiras, P., Sanchez, S.L., Iliadis, L.: The next generation cognitive security operations center: adaptive analytic lambda architecture for efficient defense against adversarial attacks. Big Data Cogn. Comput. 3, 6 (2019)CrossRef Demertzis, K., Tziritas, N., Kikiras, P., Sanchez, S.L., Iliadis, L.: The next generation cognitive security operations center: adaptive analytic lambda architecture for efficient defense against adversarial attacks. Big Data Cogn. Comput. 3, 6 (2019)CrossRef
22.
Zurück zum Zitat Cyber-Security and Information Warfare. Cybercrime and Cybersecurity Research. NOVA Science Publishers. ISBN 978-1-53614-385-0. Chap. 5 Cyber-Security and Information Warfare. Cybercrime and Cybersecurity Research. NOVA Science Publishers. ISBN 978-1-53614-385-0. Chap. 5
23.
Zurück zum Zitat Huang, G.-B., Zhu, Q.-Y., Siew, C.-K.: Extreme learning machine: theory and applications. Neurocomputing 70(1–3), 489–501 (2006)CrossRef Huang, G.-B., Zhu, Q.-Y., Siew, C.-K.: Extreme learning machine: theory and applications. Neurocomputing 70(1–3), 489–501 (2006)CrossRef
24.
Zurück zum Zitat El-Yaniv, R., Nisenson, M.: Optimal single-class classification strategies. In: Proceedings of the 2006 NIPS Conference, vol. 19, pp. 377–384. MIT Press (2007) El-Yaniv, R., Nisenson, M.: Optimal single-class classification strategies. In: Proceedings of the 2006 NIPS Conference, vol. 19, pp. 377–384. MIT Press (2007)
25.
Zurück zum Zitat Munroe, D.T., Madden, M.G.: Multi-class and single-class classification approaches to vehicle model recognition from images. In: Proceedings of Artificial Intelligence and Cognitive Science, Portstewart (2005) Munroe, D.T., Madden, M.G.: Multi-class and single-class classification approaches to vehicle model recognition from images. In: Proceedings of Artificial Intelligence and Cognitive Science, Portstewart (2005)
27.
Zurück zum Zitat Ma, X., Wang, X.: Convergence analysis of contrastive divergence algorithm based on gradient method with errors (2015). [Research article]MathSciNetMATH Ma, X., Wang, X.: Convergence analysis of contrastive divergence algorithm based on gradient method with errors (2015). [Research article]MathSciNetMATH
29.
Zurück zum Zitat Morris, T.H., Thornton, Z., Turnipseed, I.: Industrial control system simulation and data logging for intrusion detection system research. Int. J. Netw. Secur. (IJNS) 17(2), 174–188 (2015) Morris, T.H., Thornton, Z., Turnipseed, I.: Industrial control system simulation and data logging for intrusion detection system research. Int. J. Netw. Secur. (IJNS) 17(2), 174–188 (2015)
30.
Zurück zum Zitat Zwillinger, D., Kokoska, S.: CRC Standard Probability and Statistics Tables and Formulae, p. 18. CRC Press, Boca Raton (2000). ISBN 1-58488-059-7 Zwillinger, D., Kokoska, S.: CRC Standard Probability and Statistics Tables and Formulae, p. 18. CRC Press, Boca Raton (2000). ISBN 1-58488-059-7
34.
Metadaten
Titel
Cyber-Typhon: An Online Multi-task Anomaly Detection Framework
verfasst von
Konstantinos Demertzis
Lazaros Iliadis
Panayiotis Kikiras
Nikos Tziritas
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-19823-7_2