An Anomaly Contribution Explainer for Cyber-Security Applications

12/01/2019
by   Xiao Zhang, et al.
0

In this paper, we introduce Anomaly Contribution Explainer or ACE, a tool to explain security anomaly detection models in terms of the model features through a regression framework, and its variant, ACE-KL, which highlights the important anomaly contributors. ACE and ACE-KL provide insights in diagnosing which attributes significantly contribute to an anomaly by building a specialized linear model to locally approximate the anomaly score that a black-box model generates. We conducted experiments with these anomaly detection models to detect security anomalies on both synthetic data and real data. In particular, we evaluate performance on three public data sets: CERT insider threat, netflow logs, and Android malware. The experimental results are encouraging: our methods consistently identify the correct contributing feature in the synthetic data where ground truth is available; similarly, for real data sets, our methods point a security analyst in the direction of the underlying causes of an anomaly, including in one case leading to the discovery of previously overlooked network scanning activity. We have made our source code publicly available.

READ FULL TEXT

page 6

page 10

research
09/06/2023

A Critical Review of Common Log Data Sets Used for Evaluation of Sequence-based Anomaly Detection Techniques

Log data store event execution patterns that correspond to underlying wo...
research
02/08/2019

BINet: Multi-perspective Business Process Anomaly Classification

In this paper, we introduce BINet, a neural network architecture for rea...
research
02/28/2015

Sequential Feature Explanations for Anomaly Detection

In many applications, an anomaly detection system presents the most anom...
research
03/24/2020

Attention-Based Self-Supervised Feature Learning for Security Data

While applications of machine learning in cyber-security have grown rapi...
research
03/03/2015

A Meta-Analysis of the Anomaly Detection Problem

This article provides a thorough meta-analysis of the anomaly detection ...
research
03/01/2012

Learning a Common Substructure of Multiple Graphical Gaussian Models

Properties of data are frequently seen to vary depending on the sampled ...

Please sign up or login with your details

Forgot password? Click here to reset