The Holy Grail of "Systems for Machine Learning": Teaming humans and machine learning for detecting cyber threats

作者: Ignacio Arnaldo , Kalyan Veeramachaneni

DOI: 10.1145/3373464.3373472

关键词:

摘要: Although there is a large corpus of research focused on using machine learning to detect cyber threats, the solutions presented are rarely actually adopted in real world. In this paper, we discuss challenges that currently limit adoption security operations, with special focus label acquisition, model deployment, and integration findings into existing investigation workflows. Moreover, posit conventional approach development models, whereby researchers work offline representative datasets develop accurate not valid for many cybersecurity use cases. Instead, different needed: integrate creation maintenance models operations themselves.

参考文章(30)
Seyed Ali Mirheidari, Sajjad Arshad, Rasool Jalili, Alert Correlation Algorithms: A Survey and Taxonomy International Symposium on Cyberspace Safety and Security. pp. 183- 197 ,(2013) , 10.1007/978-3-319-03584-0_14
Harald Lampesberger, Philipp Winter, Markus Zeilinger, Eckehard Hermann, An On-Line Learning Statistical Model to Detect Malicious Web Requests Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. pp. 19- 38 ,(2012) , 10.1007/978-3-642-31909-9_2
Alexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, Giovanni Vigna, None, Revolver: an automated approach to the detection of evasiveweb-based malware usenix security symposium. pp. 637- 652 ,(2013)
Will Landecker, Michael D. Thomure, Luis M. A. Bettencourt, Melanie Mitchell, Garrett T. Kenyon, Steven P. Brumby, Interpreting individual classifications of hierarchical networks 2013 IEEE Symposium on Computational Intelligence and Data Mining (CIDM). pp. 32- 38 ,(2013) , 10.1109/CIDM.2013.6597214
Aric Hagberg, Nathan Lemons, Alex Kent, Joshua Neil, Connected Components and Credential Hopping in Authentication Graphs signal-image technology and internet-based systems. pp. 416- 423 ,(2014) , 10.1109/SITIS.2014.95
Elaheh Biglar Beigi, Hossein Hadian Jazi, Natalia Stakhanova, Ali A. Ghorbani, Towards effective feature selection in machine learning-based botnet detection approaches communications and networking symposium. pp. 247- 255 ,(2014) , 10.1109/CNS.2014.6997492
Alexander Zien, Nicole Krämer, Sören Sonnenburg, Gunnar Rätsch, The Feature Importance Ranking Measure european conference on machine learning. pp. 694- 709 ,(2009) , 10.1007/978-3-642-04174-7_45
M. Robnik-Sikonja, I. Kononenko, Explaining Classifications For Individual Instances IEEE Transactions on Knowledge and Data Engineering. ,vol. 20, pp. 589- 600 ,(2008) , 10.1109/TKDE.2007.190734
Paulo Cortez, Mark J. Embrechts, Opening black box Data Mining models using Sensitivity Analysis computational intelligence and data mining. pp. 341- 348 ,(2011) , 10.1109/CIDM.2011.5949423