首页> 外文会议>Cyber Security Cryptography and Machine Learning >Learning Representations for Log Data in Cybersecurity
【24h】

Learning Representations for Log Data in Cybersecurity

机译:学习网络安全中日志数据的表示形式

获取原文
获取原文并翻译 | 示例

摘要

We introduce a framework for exploring and learning representations of log data generated by enterprise-grade security devices with the goal of detecting advanced persistent threats (APTs) spanning over several weeks. The presented framework uses a divide-and-conquer strategy combining behavioral analytics, time series modeling and representation learning algorithms to model large volumes of data. In addition, given that we have access to human-engineered features, we analyze the capability of a series of representation learning algorithms to complement human-engineered features in a variety of classification approaches. We demonstrate the approach with a novel dataset extracted from 3 billion log lines generated at an enterprise network boundaries with reported command and control communications. The presented results validate our approach, achieving an area under the ROC curve of 0.943 and 95 true positives out of the Top 100 ranked instances on the test data set.
机译:我们引入了一个框架,用于探索和学习由企业级安全设备生成的日志数据的表示形式,目的是检测跨越数周的高级持久性威胁(APT)。提出的框架使用分而治之的策略,结合了行为分析,时间序列建模和表示学习算法,以对大量数据进行建模。此外,鉴于我们可以使用人为设计的功能,因此我们分析了一系列表示学习算法在各种分类方法中补充人为设计功能的能力。我们用从报告的命令和控制通信在企业网络边界生成的30亿条日志行中提取的新颖数据集来演示该方法。提出的结果验证了我们的方法,在测试数据集上排名前100位的实例中,ROC曲线下的面积达到0.943,真实阳性数为95。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号