Skip to main content
Erschienen in: Neural Computing and Applications 9/2020

27.07.2019 | Emerging Trends of Applied Neural Computation - E_TRAINCO

Gryphon: a semi-supervised anomaly detection system based on one-class evolving spiking neural network

verfasst von: Konstantinos Demertzis, Lazaros Iliadis, Ilias Bougoudis

Erschienen in: Neural Computing and Applications | Ausgabe 9/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The backbone of the economy, security and sustainability of a state is inseparably linked to the security of its critical infrastructure. Critical infrastructures define goods, systems or subsystems that are essential to maintain the vital functions of society, health, physical protection, security plus economic and social well-being of citizens. The digital security of critical infrastructures is a very important priority for the well-being of every country, especially nowadays, because of the direct threats dictated by the current international conjuncture and due to the emerging interactions or interconnections developed between the National Critical Infrastructures, internationally. The aim of this research is the development and testing of an Anomaly Detection intelligent algorithm that has the advantage to run very fast with a small portion of the available data and to perform equally well with the existing approaches. Such a system must be characterized by high efficiency and very fast execution. Thus, we present the Gryphon advanced intelligence system. Gryphon is a Semi-Supervised Unary Anomaly Detection System for big industrial data which is employing an evolving Spiking Neural Network (eSNN) One-Class Classifier (eSNN-OCC). This machine learning algorithm corresponds to a model capable of detecting very fast and efficiently, divergent behaviors and abnormalities associated with cyberattacks, which are known as Advanced Persistent Threat (APT). The training process is performed on data related to the normal function of a critical infrastructure.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Hurst W, Merabti M, Fergus P (2014) A survey of critical infrastructure security. In: Butts J, Shenoi S (eds) Critical infrastructure protection VIII. ICCIP 2014. IFIP Advances in information and communication technology, vol 441. Springer, Berlin Hurst W, Merabti M, Fergus P (2014) A survey of critical infrastructure security. In: Butts J, Shenoi S (eds) Critical infrastructure protection VIII. ICCIP 2014. IFIP Advances in information and communication technology, vol 441. Springer, Berlin
2.
Zurück zum Zitat Yusufovna F, Alisherovich F, Choi M, Cho E, Abdurashidovich F, Kim T (2009) Research on critical infrastructures and critical information infrastructures. In: Proceedings of the symposium on bio-inspired learning and intelligent systems for security, pp 97–101 Yusufovna F, Alisherovich F, Choi M, Cho E, Abdurashidovich F, Kim T (2009) Research on critical infrastructures and critical information infrastructures. In: Proceedings of the symposium on bio-inspired learning and intelligent systems for security, pp 97–101
3.
Zurück zum Zitat Hurst W, Merabti M, Fergus P (2013) Behavioral observation for critical infrastructure security support. In: Proceedings of the seventh IEEE European modeling symposium, pp 36–41 Hurst W, Merabti M, Fergus P (2013) Behavioral observation for critical infrastructure security support. In: Proceedings of the seventh IEEE European modeling symposium, pp 36–41
4.
Zurück zum Zitat Wang C, Fang L, Dai Y (2010) A simulation environment for SCADA security analysis and assessment. In: Proceedings of the international conference on measuring technology and mechatronics automation, vol 1, pp 342–347 Wang C, Fang L, Dai Y (2010) A simulation environment for SCADA security analysis and assessment. In: Proceedings of the international conference on measuring technology and mechatronics automation, vol 1, pp 342–347
5.
Zurück zum Zitat Walker J, Williams B, Skelton G (2010) Cyber security for emergency management. In: Proceedings of the IEEE international conference on technologies for homeland security, pp 476–480 Walker J, Williams B, Skelton G (2010) Cyber security for emergency management. In: Proceedings of the IEEE international conference on technologies for homeland security, pp 476–480
6.
Zurück zum Zitat Jeun I, Lee Y, Won D (2012) A practical study on advanced persistent threats. In: Kim T et al (eds) Computer applications for security, control and system engineering. Communications in computer and information science, vol 339. Springer, Berlin Jeun I, Lee Y, Won D (2012) A practical study on advanced persistent threats. In: Kim T et al (eds) Computer applications for security, control and system engineering. Communications in computer and information science, vol 339. Springer, Berlin
7.
Zurück zum Zitat Demertzis K, Iliadis LS, Anezakis V-D (2018) An innovative soft computing system for smart energy grids cybersecurity. In: Santamouris M (ed) Advances in building energy research. Taylor & Francis, London, pp 1–22 Demertzis K, Iliadis LS, Anezakis V-D (2018) An innovative soft computing system for smart energy grids cybersecurity. In: Santamouris M (ed) Advances in building energy research. Taylor & Francis, London, pp 1–22
8.
Zurück zum Zitat Demertzis K, Iliadis L (2014) A hybrid network anomaly and intrusion detection approach based on evolving spiking neural network classification. In: Sideridis A, Kardasiadou Z, Yialouris C, Zorkadis V (eds) E-democracy, security, privacy and trust in a digital world. e-Democracy 2013. Communications in computer and information science, vol 441. Springer, Cham Demertzis K, Iliadis L (2014) A hybrid network anomaly and intrusion detection approach based on evolving spiking neural network classification. In: Sideridis A, Kardasiadou Z, Yialouris C, Zorkadis V (eds) E-democracy, security, privacy and trust in a digital world. e-Democracy 2013. Communications in computer and information science, vol 441. Springer, Cham
9.
Zurück zum Zitat Demertzis K, Iliadis L (2014) Evolving computational intelligence system for malware detection. In: Iliadis L, Papazoglou M, Pohl K (eds) Advanced information systems engineering workshops. CAiSE 2014. Lecture notes in business information processing, vol 178. Springer, Cham. https://doi.org/10.1007/978-3-319-07869-4_30 Demertzis K, Iliadis L (2014) Evolving computational intelligence system for malware detection. In: Iliadis L, Papazoglou M, Pohl K (eds) Advanced information systems engineering workshops. CAiSE 2014. Lecture notes in business information processing, vol 178. Springer, Cham. https://​doi.​org/​10.​1007/​978-3-319-07869-4_​30
10.
Zurück zum Zitat Demertzis K, Iliadis L (2014) Bio-inspired hybrid artificial intelligence framework for cyber security. In: Daras N, Rassias M (eds) Computation, cryptography, and network security. Springer, Cham Demertzis K, Iliadis L (2014) Bio-inspired hybrid artificial intelligence framework for cyber security. In: Daras N, Rassias M (eds) Computation, cryptography, and network security. Springer, Cham
11.
Zurück zum Zitat Demertzis K, Iliadis L (2014d) Bio-inspired hybrid intelligent method for detecting android malware. In: Iliadis L, Papazoglou M, Pohl K (eds) Advanced information systems engineering workshops. CAiSE 2014. Lecture notes in business information processing, vol 178. Springer, Cham Demertzis K, Iliadis L (2014d) Bio-inspired hybrid intelligent method for detecting android malware. In: Iliadis L, Papazoglou M, Pohl K (eds) Advanced information systems engineering workshops. CAiSE 2014. Lecture notes in business information processing, vol 178. Springer, Cham
12.
Zurück zum Zitat Demertzis K, Iliadis L (2015a) Evolving smart URL filter in a zone-based policy firewall for detecting algorithmically generated malicious domains. In: Gammerman A, Vovk V, Papadopoulos H (eds) Statistical learning and data sciences. SLDS 2015. Lecture notes in computer science, vol 9047. Springer, Cham Demertzis K, Iliadis L (2015a) Evolving smart URL filter in a zone-based policy firewall for detecting algorithmically generated malicious domains. In: Gammerman A, Vovk V, Papadopoulos H (eds) Statistical learning and data sciences. SLDS 2015. Lecture notes in computer science, vol 9047. Springer, Cham
13.
Zurück zum Zitat Demertzis K, Iliadis L (2015b) SAME: an intelligent anti-malware extension for android ART virtual machine. In: Núñez M, Nguyen N, Camacho D, Trawiński B (eds) Computational collective intelligence. Lecture notes in computer science, vol 9330. Springer, Cham Demertzis K, Iliadis L (2015b) SAME: an intelligent anti-malware extension for android ART virtual machine. In: Núñez M, Nguyen N, Camacho D, Trawiński B (eds) Computational collective intelligence. Lecture notes in computer science, vol 9330. Springer, Cham
15.
Zurück zum Zitat Demertzis K, Iliadis L (2016) Ladon: a cyber-threat bio-inspired intelligence management system. J Appl Math Bioinform 6(3):45–64 Demertzis K, Iliadis L (2016) Ladon: a cyber-threat bio-inspired intelligence management system. J Appl Math Bioinform 6(3):45–64
17.
Zurück zum Zitat Mao J, Jain AK, Duin PW (2000) Statistical pattern recognition: a review. IEEE Trans Pattern Anal Mach Intell 22(1):4–37CrossRef Mao J, Jain AK, Duin PW (2000) Statistical pattern recognition: a review. IEEE Trans Pattern Anal Mach Intell 22(1):4–37CrossRef
18.
Zurück zum Zitat Ban T, Abe S (2006) Implementing multi-class classifiers by one-class classification methods. In: International joint conference on neural networks, pp 327–332 Ban T, Abe S (2006) Implementing multi-class classifiers by one-class classification methods. In: International joint conference on neural networks, pp 327–332
21.
Zurück zum Zitat Abe N, Zadrozny B, Langford J (2006) Outlier detection by active learning. In: Proceedings of the 12th ACM SIGKDD international conference on knowledge discovery and data mining, pp 767–772. ACM Press, New York Abe N, Zadrozny B, Langford J (2006) Outlier detection by active learning. In: Proceedings of the 12th ACM SIGKDD international conference on knowledge discovery and data mining, pp 767–772. ACM Press, New York
22.
Zurück zum Zitat Tax DMJ, Muller KR (2004) A consistency-based model selection for one-class classification. In: Proceedings of the 17th international conference on pattern recognition (ICPR 2004), vol 3, pp 363–366 Tax DMJ, Muller KR (2004) A consistency-based model selection for one-class classification. In: Proceedings of the 17th international conference on pattern recognition (ICPR 2004), vol 3, pp 363–366
23.
Zurück zum Zitat Wilk T, Wozniak M (2012) Soft computing methods applied to combination of one-class classifiers. Neurocomputing 75:185–193CrossRef Wilk T, Wozniak M (2012) Soft computing methods applied to combination of one-class classifiers. Neurocomputing 75:185–193CrossRef
24.
Zurück zum Zitat Huang W, Li N, Lin Z, Huang GB, Zong W, Zhou J, Duan Y (2013) Liver tumor detection and segmentation using kernel based extreme learning machine. In: IEEE conference on Engineering in Medicine and Biology Society (EMBC), pp 3662–3665, 3–7 July Huang W, Li N, Lin Z, Huang GB, Zong W, Zhou J, Duan Y (2013) Liver tumor detection and segmentation using kernel based extreme learning machine. In: IEEE conference on Engineering in Medicine and Biology Society (EMBC), pp 3662–3665, 3–7 July
25.
Zurück zum Zitat Zhu WZ (2015) Data and feature mixed ensemble based extreme learning machine for medical object detection and segmentation. Multimed Tools Appl 75:2815–2837CrossRef Zhu WZ (2015) Data and feature mixed ensemble based extreme learning machine for medical object detection and segmentation. Multimed Tools Appl 75:2815–2837CrossRef
26.
Zurück zum Zitat Juszczak P (2006) Learning to recognize. A study on one-class classification and active learning. Ph.D. thesis, Delft University of Technology Juszczak P (2006) Learning to recognize. A study on one-class classification and active learning. Ph.D. thesis, Delft University of Technology
27.
Zurück zum Zitat Luo J, Ding L, Pan Z, Ni G, Hu G (2007) Research on cost-sensitive learning in one-class anomaly detection algorithms. In: Xiao B, Yang LT, Ma J, Muller-Schloer C, Hua Y (eds) Autonomic and trusted computing, vol 4610. Lecture notes in computer science. Springer, Berlin, pp 259–268CrossRef Luo J, Ding L, Pan Z, Ni G, Hu G (2007) Research on cost-sensitive learning in one-class anomaly detection algorithms. In: Xiao B, Yang LT, Ma J, Muller-Schloer C, Hua Y (eds) Autonomic and trusted computing, vol 4610. Lecture notes in computer science. Springer, Berlin, pp 259–268CrossRef
28.
Zurück zum Zitat Tax DMJ, Laskov P (2003) Online SVM learning: from classification to data description and back. In: IEEE 13th workshop on neural networks for signal processing, (NNSP’03), pp 499–508. IEEE Tax DMJ, Laskov P (2003) Online SVM learning: from classification to data description and back. In: IEEE 13th workshop on neural networks for signal processing, (NNSP’03), pp 499–508. IEEE
29.
Zurück zum Zitat Manevitz L, Yousef M (2001) One-class SVM for document classification. J Mach Learn Res 2:139–154MATH Manevitz L, Yousef M (2001) One-class SVM for document classification. J Mach Learn Res 2:139–154MATH
30.
Zurück zum Zitat Manevitz L, Yousef M (2007) One-class document classification via neural networks. Neurocomputing 70:1466–1481CrossRef Manevitz L, Yousef M (2007) One-class document classification via neural networks. Neurocomputing 70:1466–1481CrossRef
31.
Zurück zum Zitat Shieh AD, Kamm DF (2009) Ensembles of one class support vector machines, vol 5519. Lecture notes in computer science. Springer, Berlin, pp 181–190 Shieh AD, Kamm DF (2009) Ensembles of one class support vector machines, vol 5519. Lecture notes in computer science. Springer, Berlin, pp 181–190
32.
Zurück zum Zitat Chen Q, Abdelwahed S (2013) A model-based approach to self-protection in computing system. In: Proceeding CAC ‘13 of the ACM cloud and autonomic computing conference, article No. 16 Chen Q, Abdelwahed S (2013) A model-based approach to self-protection in computing system. In: Proceeding CAC ‘13 of the ACM cloud and autonomic computing conference, article No. 16
34.
Zurück zum Zitat Tao X, Renmu H, Peng W, Dongjie X (2004) Applications of data mining technique for power system transient stability prediction. Proc IEEE Electr Util Deregul Restruct Power Technol 1:389–392CrossRef Tao X, Renmu H, Peng W, Dongjie X (2004) Applications of data mining technique for power system transient stability prediction. Proc IEEE Electr Util Deregul Restruct Power Technol 1:389–392CrossRef
35.
Zurück zum Zitat Yasakethu SLP, Jiang J (2013) Intrusion detection via machine learning for SCADA system protection, learning and development ltd. In: Proceedings of the 1st international symposium for ICS and SCADA cyber security research Yasakethu SLP, Jiang J (2013) Intrusion detection via machine learning for SCADA system protection, learning and development ltd. In: Proceedings of the 1st international symposium for ICS and SCADA cyber security research
36.
Zurück zum Zitat Weiss J (2003) Current status of cybersecurity of control systems. In: Presentation to Georgia Tech protective relay conference Weiss J (2003) Current status of cybersecurity of control systems. In: Presentation to Georgia Tech protective relay conference
37.
Zurück zum Zitat Boyer SΑ (2010) SCADA: supervisory control and data acquisition, 4th edn. International Society of Automation, Research Triangle Park Boyer SΑ (2010) SCADA: supervisory control and data acquisition, 4th edn. International Society of Automation, Research Triangle Park
38.
Zurück zum Zitat Demertzis K, Iliadis L, Spartalis S (2017) A spiking one-class anomaly detection framework for cyber-security on industrial control systems. In: Boracchi G, Iliadis L, Jayne C, Likas A (eds) Engineering applications of neural networks. EANN 2017. Communications in computer and information science, vol 744. Springer, Cham Demertzis K, Iliadis L, Spartalis S (2017) A spiking one-class anomaly detection framework for cyber-security on industrial control systems. In: Boracchi G, Iliadis L, Jayne C, Likas A (eds) Engineering applications of neural networks. EANN 2017. Communications in computer and information science, vol 744. Springer, Cham
39.
Zurück zum Zitat Bougoudis I, Demertzis K, Iliadis L, Anezakis VD, Papaleonidas A (2016) Semi-supervised hybrid modeling of atmospheric pollution in urban centers. In: Proceedings engineering applications of neural networks. EANN 2016. Communications in computer and information science, vol 629. Springer Bougoudis I, Demertzis K, Iliadis L, Anezakis VD, Papaleonidas A (2016) Semi-supervised hybrid modeling of atmospheric pollution in urban centers. In: Proceedings engineering applications of neural networks. EANN 2016. Communications in computer and information science, vol 629. Springer
40.
Zurück zum Zitat Kecman V (2001) Learning and soft computing. MIT Press, CambridgeMATH Kecman V (2001) Learning and soft computing. MIT Press, CambridgeMATH
41.
Zurück zum Zitat Iliadis L (2007) Intelligent systems and application in risk estimation. In: Stamoulis A (eds) Thessaloniki, Greece. ISBN: 978-960-6741-33-3 Iliadis L (2007) Intelligent systems and application in risk estimation. In: Stamoulis A (eds) Thessaloniki, Greece. ISBN: 978-960-6741-33-3
42.
Zurück zum Zitat Iliadis L, Papaleonidas A (2016) Computational intelligence an intelligent agents. In: Tziolas A (eds) Thessaloniki, Greece. ISBN: 978-960-418-601-3 Iliadis L, Papaleonidas A (2016) Computational intelligence an intelligent agents. In: Tziolas A (eds) Thessaloniki, Greece. ISBN: 978-960-418-601-3
44.
Zurück zum Zitat Sjostrom J, Gerstner W (2010) Spike-timing dependent plasticity. In: Scholarpedia 5.2. Revision 142314, p 1362 Sjostrom J, Gerstner W (2010) Spike-timing dependent plasticity. In: Scholarpedia 5.2. Revision 142314, p 1362
45.
Zurück zum Zitat Swiercz W, Swiercz W, Cios KJ, Staley K, Kurgan L, Accurso F, Sagel S (2006) A new synaptic plasticity rule for networks of spiking neurons. IEEE Trans Neural Netw 17(1):94–105CrossRef Swiercz W, Swiercz W, Cios KJ, Staley K, Kurgan L, Accurso F, Sagel S (2006) A new synaptic plasticity rule for networks of spiking neurons. IEEE Trans Neural Netw 17(1):94–105CrossRef
46.
Zurück zum Zitat Sen P, Namata G, Bilgic M, Getoor L, Galligher B, Rad ET (2008) Collective classification in network data. Adv Artif Intell 29(3):93–106 Sen P, Namata G, Bilgic M, Getoor L, Galligher B, Rad ET (2008) Collective classification in network data. Adv Artif Intell 29(3):93–106
47.
Zurück zum Zitat Zwillinger D, Kokoska S (2000) CRC standard probability and statistics tables and formulae. CRC Press, Boca RatonMATH Zwillinger D, Kokoska S (2000) CRC standard probability and statistics tables and formulae. CRC Press, Boca RatonMATH
48.
Zurück zum Zitat Morris TH, Thornton Z, Turnipseed I (2015) Industrial control system simulation and data logging for intrusion detection system research. Int J Netw Secur (IJNS) 17(2):174–188 Morris TH, Thornton Z, Turnipseed I (2015) Industrial control system simulation and data logging for intrusion detection system research. Int J Netw Secur (IJNS) 17(2):174–188
Metadaten
Titel
Gryphon: a semi-supervised anomaly detection system based on one-class evolving spiking neural network
verfasst von
Konstantinos Demertzis
Lazaros Iliadis
Ilias Bougoudis
Publikationsdatum
27.07.2019
Verlag
Springer London
Erschienen in
Neural Computing and Applications / Ausgabe 9/2020
Print ISSN: 0941-0643
Elektronische ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-019-04363-x

Weitere Artikel der Ausgabe 9/2020

Neural Computing and Applications 9/2020 Zur Ausgabe