Adversarial Anomaly Detection Using Centroid-Based Clustering

作者: Imrul Chowdhury Anindya , Murat Kantarcioglu

DOI: 10.1109/IRI.2018.00009

关键词: Cluster analysisAnomaly detectionRobustness (computer science)ScalabilityComputer scienceComputer securityAdversaryBig dataData modelingRule-based system

摘要: As cyber attacks are growing with an unprecedented rate in the recent years, organizations seeking efficient and scalable solution towards a holistic protection system. adversaries becoming more skilled organized, traditional rule based detection systems have been proved to be quite ineffective against continuously evolving attacks. Consequently, security researchers focusing on applying machine learning techniques big data analytics defend Over several anomaly claimed successful sophisticated including previously unseen zero-day But often, these do not consider adversary's adaptive attacking behavior for bypassing procedure. result, deploying active real-world scenarios fails provide significant benefits presence of intelligent that carefully manipulating attack vectors. In this work, we analyze adversarial impact models built upon centroid-based clustering from game-theoretic aspect propose technique models. The experimental results show our can withstand effectively compared

参考文章(24)
Richard A. Kemmerer, Christopher Kruegel, Darren Mutz, Giovanni Vigna, William Robertson, Reverse Engineering of Network Signatures ,(2005)
Samuel Patton, An Achilles Heel in Signature-Based IDS : Squealing False Positives in SNORT Proceedings of RAID2001, Davis, CA, USA. ,(2001)
Pavel Laskov, Marius Kloft, Online Anomaly Detection under Adversarial Impact international conference on artificial intelligence and statistics. pp. 405- 412 ,(2010)
James Newsome, Brad Karp, Dawn Song, Paragraph: Thwarting Signature Learning by Training Maliciously Lecture Notes in Computer Science. pp. 81- 105 ,(2006) , 10.1007/11856214_5
Scott A. Crosby, Dan S. Wallach, Denial of service via algorithmic complexity attacks usenix security symposium. pp. 3- 3 ,(2003)
Tianyi Wang, Ben Y. Zhao, Haitao Zhang, Gang Wang, Man vs. machine: practical adversarial detection of malicious crowdsourcing workers usenix security symposium. pp. 239- 254 ,(2014)
J.G. Dutrisac, D.B. Skillicorn, Hiding clusters in adversarial settings intelligence and security informatics. pp. 185- 187 ,(2008) , 10.1109/ISI.2008.4565051
J.D. Tygar, Adversarial Machine Learning IEEE Internet Computing. ,vol. 15, pp. 4- 6 ,(2011) , 10.1109/MIC.2011.112
DAVID J. KETCHEN Jr., CHRISTOPHER L. SHOOK, THE APPLICATION OF CLUSTER ANALYSIS IN STRATEGIC MANAGEMENT RESEARCH: AN ANALYSIS AND CRITIQUE Strategic Management Journal. ,vol. 17, pp. 441- 458 ,(1996) , 10.1002/(SICI)1097-0266(199606)17:6<441::AID-SMJ819>3.0.CO;2-G
Arthur Zimek, Erich Schubert, Hans-Peter Kriegel, A survey on unsupervised outlier detection in high-dimensional numerical data Statistical Analysis and Data Mining. ,vol. 5, pp. 363- 387 ,(2012) , 10.1002/SAM.11161